2022
DOI: 10.1016/j.sigpro.2021.108342
|View full text |Cite
|
Sign up to set email alerts
|

Efficient image tampering localization using semi-fragile watermarking and error control codes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 28 publications
0
11
0
Order By: Relevance
“…A well-known and powerful tool to enhance the robustness of a watermarking scheme is the use of error-correcting codes which permits to correct errors induced by a given attack [ 28 , 37 , 38 ]. This work employs the binary Bose, Chaudhuri, and Hocquenghem (BCH) code [ 39 ] over the Galois field GF( q ) with codewords of length (where m is an integer), k information bits, parity bits, and error correction capability t bits.…”
Section: Preliminariesmentioning
confidence: 99%
“…A well-known and powerful tool to enhance the robustness of a watermarking scheme is the use of error-correcting codes which permits to correct errors induced by a given attack [ 28 , 37 , 38 ]. This work employs the binary Bose, Chaudhuri, and Hocquenghem (BCH) code [ 39 ] over the Galois field GF( q ) with codewords of length (where m is an integer), k information bits, parity bits, and error correction capability t bits.…”
Section: Preliminariesmentioning
confidence: 99%
“…Pseudo-Zernike moments (PZM) are due to Pseudo-Zernike polynomials and these are complex-valued polynomials which are orthogonal sets defined within the unit circle's interior x 2 + y 2 > =1 [33,49]. The polynomials set is represented by P nm (x,y)} and it is given as, where, ρ sqrt(x 2 + y 2 ), θ = tan−1(y/x).…”
Section: Pseudo-zernike Momentsmentioning
confidence: 99%
“…To justify the proposed system's performance, we implemented the existing tamper detection-based watermarking algorithms [24,33], Zernike moments-based watermarking system [40,49], Pseudo Zernike moments-based watermarking system [60], Dual-tree Complex Wavelet transform-based watermarking algorithm [63], color image watermarking [1] with the dataset used for the proposed work and the same also been compared with the introduction of various attacks. Tables 5, 6, 7, 8 and 9 depicts the interpretations during No or Zero Attack conditions, Unintentional -Image Table 5 clears that the proposed multi-biometric based semi-fragile watermarking system attains higher visual quality on the standard test images lena, cameraman, baboon, elaine, and brandyrose for the value of PSNR value when related to the conventional systems.…”
Section: Comparative Studymentioning
confidence: 99%
See 1 more Smart Citation
“…In the second stage, semi-fragile watermark was embedded by using modified index key based method. Pascal et al 13 . used semi-fragile watermarking and error-locating codes in the DWT domain to achieve efficient image tampering localization.…”
Section: Introductionmentioning
confidence: 99%