2019
DOI: 10.22266/ijies2019.0831.07
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Self-Embedding Fragile Watermarking Method for Image Tamper Detection and Recovery

Abstract: The increasingly rapid use of digital images makes data security technology become an important issue to ensure the integrity and ownership of the received image. Watermarking technique is a technique that ensures data security including for checking the authenticity of an image. Current developments, not only can test the authenticity of an image, but also can determine the location of damage while fixing it. The method proposed in this paper is through using the block-based technique of self-embedding fragil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…For each block, we adopt method [26] to generate two parts that will be respectively used for tampered area localization and content recovery. Assume that the number of MSB layers used for the generation of recovery bits is denoted as .…”
Section: Fragile Watermark Embeddingmentioning
confidence: 99%
“…For each block, we adopt method [26] to generate two parts that will be respectively used for tampered area localization and content recovery. Assume that the number of MSB layers used for the generation of recovery bits is denoted as .…”
Section: Fragile Watermark Embeddingmentioning
confidence: 99%
“…Many RDH algorithms have been developed in various methods and applications, which are analyzed from different aspects, like in encrypted images [5], digital audio-based classification [6], trends of digital image-based data hiding [7], attack to cipher images [8], two-layer embedding [9], and predictor-based RDH [10]. In detail, the introduced methods include difference expansion (DE), histogram shifting (HS), and pixel value ordering (PVO), for various purposes, like file tampering detection [11] and watermarking [12]. Furthermore, RDH can be developed in various media, like image [7], audio [6], and video [13], with either spatial or frequency domain.…”
Section: Introductionmentioning
confidence: 99%
“…There are also several complex attacks, these attacks are generally designed to hide interference, some of these attacks include vector quantization attack (VQA), collage attack (CA), content only attack (COA), constant feature attack (CFA) [2,10]. The ability of the fragile watermarking method to detect tampering can be determined by measuring tools such as the true positive rate (𝑇𝑃𝑅) or often also called the tamper detection rate (𝑇𝐷𝑅), true negative rate (𝑇𝑁𝑅) or false positive rate (𝐹𝑃𝑅), and precision (𝑝), where when these three measuring instruments have a value close to 1, it means that the quality of tamper detection is getting better [2,11,12]. The imperceptibility aspect also determines the quality of fragile image watermarking.…”
Section: Introductionmentioning
confidence: 99%
“…The most widely used instruments to measure imperceptibility quality are PSNR and SSIM [13]. Fragile image watermarking can be designed in the spatial domain as in research [11,[14][15][16] or transformation domain [1,17,18] or these combination [2,19,20]. Determination of methods and domains can influence the results and advantages of the method in certain aspects.…”
Section: Introductionmentioning
confidence: 99%