2018
DOI: 10.1016/j.dsp.2017.11.005
|View full text |Cite
|
Sign up to set email alerts
|

Fast fragile watermark embedding and iterative mechanism with high self-restoration performance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(15 citation statements)
references
References 20 publications
0
15
0
Order By: Relevance
“…As shown in the table, the image qualities of all test images of [16] are the lowest when 2-bit ACs are embedded. The reason is that the RT they used is a Sudoku table, which introduces more distortions than the one constructed using Eq (1). Methods [15] and [17] offer almost identical image qualities because both methods adopt the same embedding technique.…”
Section: Plos Onementioning
confidence: 99%
See 1 more Smart Citation
“…As shown in the table, the image qualities of all test images of [16] are the lowest when 2-bit ACs are embedded. The reason is that the RT they used is a Sudoku table, which introduces more distortions than the one constructed using Eq (1). Methods [15] and [17] offer almost identical image qualities because both methods adopt the same embedding technique.…”
Section: Plos Onementioning
confidence: 99%
“…Therefore, authenticating a received image has become crucial for numerous applications. Fragile watermarking [1][2] is a commonly used technique to protect the integrity of digital images by embedding fragile watermarks (or authentication codes, ACs) into images. Since the embedded ACs can be easily destroyed when modifying the marked image, the presence of tampering is detected and tampered trios can be located.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, due to advances in internet technology and powerful image editing tools, protection of image integrity has become an important challenge in many application areas where manipulating content may lead to inadmissible consequences [5]. In order to authenticate the image content, digital signature based cryptographic methods have been developed [39,51].…”
Section: Introductionmentioning
confidence: 99%
“…Digital watermarking is the act of incorporating supplemental information into multimedia material (still images, audio, or video) in such a manner that it does not alter the delivered material and yet still readily exploited by the watermark detector, even after some undesirable operations. An overview of the literature reveals a broad range of application domains including encryption [1], copyright protection [2], integrity verification [3], content restoration [4], and documentation [5].…”
Section: Introductionmentioning
confidence: 99%