2009 IEEE 13th International Multitopic Conference 2009
DOI: 10.1109/inmic.2009.5383118
|View full text |Cite
|
Sign up to set email alerts
|

Dual watermarking method for secure image authentication and recovery

Abstract: This paper presents a semi-fragile watermarking technique capable of verifying the authenticity and recovery of the image. The proposed approach has the capability to accurately detect and differentiate modifications applied on the watermarked image. Alteration sensitivity has been improved compared to previous approaches and it can concisely determine the region of the watermarked image where the integrity verification fails. Semi-fragility makes the proposed method tolerant against JPEG lossy compression and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…Grouping is different in Table 2 using the frequency domain. Method [4,41,49,54] take advantage of robust watermarking for generating recovery bits inserted into the LL sub band on the DWT. The main drawback of this method is that computing is quite high and the watermark insertion capacity is low.…”
Section: Comparison and Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…Grouping is different in Table 2 using the frequency domain. Method [4,41,49,54] take advantage of robust watermarking for generating recovery bits inserted into the LL sub band on the DWT. The main drawback of this method is that computing is quite high and the watermark insertion capacity is low.…”
Section: Comparison and Discussionmentioning
confidence: 99%
“…According to the mechanism of image capture feature, it can be divided into block-wise and pixel-wise mechanisms as shown in Fig. 1 from Cheng et al [30]; the block-wise algorithm [1][2][3][4][5][6] divides the original image into small blocks to embed a watermark, which may be a hash of the main content taken from each block. The block-wise algorithm can locate the damaged block, but the blocks may contain some original pixels, so that the accuracy of the localisation placement is decreasing.…”
Section: Reviewmentioning
confidence: 99%
See 3 more Smart Citations