2011
DOI: 10.1016/j.dsp.2010.04.006
|View full text |Cite
|
Sign up to set email alerts
|

Image self-embedding with high-quality restoration capability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
35
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 86 publications
(35 citation statements)
references
References 6 publications
0
35
0
Order By: Relevance
“…So, the tampering coincidence problem is avoided. This thought is also reflected in the other schemes [14][15][16][17][18][19]. In [17], the reference sharing mechanism for watermark self-embedding is extended.…”
Section: Introductionmentioning
confidence: 93%
See 1 more Smart Citation
“…So, the tampering coincidence problem is avoided. This thought is also reflected in the other schemes [14][15][16][17][18][19]. In [17], the reference sharing mechanism for watermark self-embedding is extended.…”
Section: Introductionmentioning
confidence: 93%
“…The reference information is not the representative data of the original image blocks. The reference data is generated by encoding the representative information [12][13][14][15][16][17][18][19][20][21][22][23]. In [12,13], the reference sharing mechanism for watermark selfembedding is proposed.…”
Section: Introductionmentioning
confidence: 99%
“…The length of the block CC based on DCT can adjust flexibly to the requirement of recovery quality [4]. The block CC based DCT was adopted and improved by many researchers [5][6][7]. Qian et al [6,7] proposed the multi-level encoding to generate the block CC with variable length for various types of blocks.…”
Section: Introductionmentioning
confidence: 99%
“…To accurately identify the tampered blocks, Lin et al [6] proposed a hierarchical digital watermarking scheme for tamper detection and recovery, and he used a 3-level hierarchical structure to locate the tampered regions, but there was no second chance to recover tampered blocks whose watermark bits embedded in the other block were destroyed. To overcome this problem, Qian [7] hided the restoration-bits into the 3-LSB layers of the host image to improve the reconstructed image quality, the quality of recovered image was improved, but the quality of watermarked image decreased due to the increased watermark payload. In [8], the quantized DCT coefficients of each block replaced the 2-LSB of another block.…”
Section: Introductionmentioning
confidence: 99%