2015
DOI: 10.17485/ijst/2015/v8i6/70074
|View full text |Cite
|
Sign up to set email alerts
|

Image Tamper Detection Based on Edge Image and Chaotic Arnold Map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…This method is appropriate to identify the splicing of numerous objects. D Vaishnavi et al [17] suggested a technique that works to identify the image splicing which is based on digital watermarking. Spliced image is formed when two images are combined.…”
Section: Related Workmentioning
confidence: 99%
“…This method is appropriate to identify the splicing of numerous objects. D Vaishnavi et al [17] suggested a technique that works to identify the image splicing which is based on digital watermarking. Spliced image is formed when two images are combined.…”
Section: Related Workmentioning
confidence: 99%
“…Hence, the various methods of tampering detection have been offered. In era, fragile watermarking [1][2][3][4][5] and digital signatures [6][7][8] were used to distinguish the image forgeries.…”
Section: Introductionmentioning
confidence: 99%
“…There is a large number of digi-tal watermarking schemes, which the major drawback of them is lack of safety. For last couple of decades, chaotic functions such as coupled chaotic maps, skew tent map, Markov maps, Logistic map, Arnold map, and Bernoulli maps have been widely used to generate watermark sequences [14,15,24,[38][39][40] . These types of watermark generation schemes require two values, the function seed and the initial value, in order to recreate the same watermark at a later stage.…”
Section: Introductionmentioning
confidence: 99%