2004
DOI: 10.1016/j.patrec.2004.08.017
|View full text |Cite
|
Sign up to set email alerts
|

Fragile image watermarking using a gradient image for improved localization and security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
39
0

Year Published

2006
2006
2014
2014

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 94 publications
(39 citation statements)
references
References 6 publications
0
39
0
Order By: Relevance
“…A set of minute changes can inadvertently modify it. The key objective of providing sensitivity is established by using stipulated procedures like the ones used in [5][6][7][8][9][10][11]. Authors in ref.…”
Section: Fragile Watermarkingmentioning
confidence: 99%
See 1 more Smart Citation
“…A set of minute changes can inadvertently modify it. The key objective of providing sensitivity is established by using stipulated procedures like the ones used in [5][6][7][8][9][10][11]. Authors in ref.…”
Section: Fragile Watermarkingmentioning
confidence: 99%
“…Here the watermark is used as a synchronization template. Shan Suthaharan in [11] emphasized fragile watermarking algorithm for image authentication and tamper detection over gradient image. It provided more security to certain attacks like vector quantization attack.…”
Section: Fragile Watermarkingmentioning
confidence: 99%
“…For each usable pixel , denoting the value of the unchangeable pixel belonging to a same patch as , calculate the new value of the usable pixel by using a DE operation (4) where is the reference-bit or check-bit mapping the usable pixel. Equation (4) implies that the difference between each usable pixel and its unchangeable pixel is doubled, and the least significant bit of the new difference-value is exploited to accommodate the corresponding watermark-bit. Obviously, new values of all usable pixels are within .…”
Section: ) De Embeddingmentioning
confidence: 99%
“…In addition, the attached signature needs more storage or additional bandwidth, but they may not always be obtained [12]. Suthaharan [13] enhanced Wong's proffered security by using a gradient image and its bit distribution properties to generate a huge key space to counter any vector quantization attack. A geometric attack is recognized as one of the most difficult attacks to resist.…”
Section: Introductionmentioning
confidence: 99%