2016
DOI: 10.1016/j.jvcir.2016.02.006
|View full text |Cite
|
Sign up to set email alerts
|

Digital images authentication scheme based on bimodal biometric watermarking in an independent domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0
3

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(21 citation statements)
references
References 21 publications
0
18
0
3
Order By: Relevance
“…The issue of transmitting repetitive information [7] over an uncertain, transfer speed compelled correspondences channel is talked about. A substance proprietor encodes the primary uncompressed picture utilizing a cryptographic key [26]. Using data concealing key the recipient can isolate additional data even the beneficiary has no information about the principal picture content [32].…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The issue of transmitting repetitive information [7] over an uncertain, transfer speed compelled correspondences channel is talked about. A substance proprietor encodes the primary uncompressed picture utilizing a cryptographic key [26]. Using data concealing key the recipient can isolate additional data even the beneficiary has no information about the principal picture content [32].…”
Section: Literature Reviewmentioning
confidence: 99%
“…A large portion of the proposed information hiding plans is not reversible. Reversible information covering up should be possible from multiple points of view like, Integer-toInteger Wavelet Transform, Difference extension, and Histogram change [26]. The principle objective of this work is to execute a Histogram moving (HS) based Reversible Data Hiding (RDH) strategy that can furnish a high inserting limit with least deformation [22,36].…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…Geometric operations such as cropping, removal, rotation, scaling or affine transformation are the principal reasons of this dessynchronization. In the literature, several works are related to robust image watermarking with geometric invariance feature [3][4][5][6][7]. These plans show robustness against rotation and scaling geometric distortions as well as against signal processing operations such as filtering, JPEG compression and among others; because these methods embed the watermark into invariant geometric domains, however, may be typically weak to cropping and removal attacks, affine transformations, and other aggressive distortions.…”
Section: Introductionmentioning
confidence: 99%
“…These plans show robustness against rotation and scaling geometric distortions as well as against signal processing operations such as filtering, JPEG compression and among others; because these methods embed the watermark into invariant geometric domains, however, may be typically weak to cropping and removal attacks, affine transformations, and other aggressive distortions. Additionally, while several watermarking algorithms have been proposed to watermark gray-scale images [3][4][5][6][7], until nowadays only a few have been designed specifically for color images [8]. The use of color information has become an essential property to steganography and watermarking of image and video [8], [9].…”
Section: Introductionmentioning
confidence: 99%
“…Digital watermarking in general is a special case of the general information-hiding problem (Wójtowicz and Ogiela 2016). A digital watermark is a signal that is temporarily or permanently embedded into digital data (audio, images, videos and text), which can be detected or extracted later by means of a computing operation, to make an assertion about the ownership of the data.…”
Section: Introductionmentioning
confidence: 99%