2022
DOI: 10.1007/s10044-022-01104-0
|View full text |Cite
|
Sign up to set email alerts
|

Dual image-based reversible fragile watermarking scheme for tamper detection and localization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 32 publications
(6 citation statements)
references
References 34 publications
0
6
0
Order By: Relevance
“…However, the security of this scheme needs to be improved since it has no resistance to certain common attacks, such as copy-move. Then, Sahu et al [28] proposed a novel dual image-based reversible fragile watermarking scheme, which embeds two secret bits in each host image pixel using a pixel readjustment strategy to obtain dual watermarked images. Although it can accurately detect and locate the tampering regions from an image, the dual watermarked images need more secret bits to obtain the aforementioned performance.…”
Section: Related Workmentioning
confidence: 99%
“…However, the security of this scheme needs to be improved since it has no resistance to certain common attacks, such as copy-move. Then, Sahu et al [28] proposed a novel dual image-based reversible fragile watermarking scheme, which embeds two secret bits in each host image pixel using a pixel readjustment strategy to obtain dual watermarked images. Although it can accurately detect and locate the tampering regions from an image, the dual watermarked images need more secret bits to obtain the aforementioned performance.…”
Section: Related Workmentioning
confidence: 99%
“…Sahu et al [33] proposed a reversible fragile watermarking methodology for tamper detection. In this method, two secrets are embedded into the cover image for a dual watermarking scheme.…”
Section: Related Workmentioning
confidence: 99%
“…Also, several methods have been proposed for achieving secure transmission in telemedicine systems based on wavelet watermarking [ 14 17 ]. However, these methods mainly targeted patient identification and authentication, while other methods targeted tamper detection [ 18 , 19 ].…”
Section: Related Workmentioning
confidence: 99%