2022
DOI: 10.1007/s12553-021-00632-9
|View full text |Cite
|
Sign up to set email alerts
|

Hash-based image watermarking technique for tamper detection and localization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 52 publications
0
6
0
Order By: Relevance
“…Tamper detection and localization is one of the most important processes in fragile image watermarking. The procedure for the tamper detection process is to identify and locate areas of the image that are suspected of having been tampered with or manipulated [1,2,18]. This is done by using an extracted watermark compared to the original.…”
Section: Tamper Detection and Localizationmentioning
confidence: 99%
See 2 more Smart Citations
“…Tamper detection and localization is one of the most important processes in fragile image watermarking. The procedure for the tamper detection process is to identify and locate areas of the image that are suspected of having been tampered with or manipulated [1,2,18]. This is done by using an extracted watermark compared to the original.…”
Section: Tamper Detection and Localizationmentioning
confidence: 99%
“…The rapid development of technology in information and communication technology has a positive impact on people's lives, namely sending text messages and even multimedia such as digital images [1]. Currently, there are many valuable applications for manipulating digital images, where this manipulation cannot be detected by the human visual system (HVS) [2].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, authentication of images has become an important issue. Fragile watermarking [1][2][3][4][5] is a common technique used in image authentication by embedding watermark data into images. If pixels were tampered with, the embedded data could be retrieved to authenticate the image.…”
Section: Introductionmentioning
confidence: 99%
“…Step 3: If b i − a i ≥ T, employ K to generate i , and construct the R i 64 by Equation (4). Besides, B i and i are employed to regenerate ac i by Equation (5). Then, use APPM to extract eac i embedded in ( a i , b i ).…”
mentioning
confidence: 99%