2017
DOI: 10.14569/ijacsa.2017.080527
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent Watermarking Scheme for image Authentication and Recovery

Abstract: Abstract-Recently, researchers have proposed semi-fragile watermarking techniques with the additional capability of image recovery. However, these approaches have certain limitations with respect to capacity, imperceptibility, and robustness. In this paper, we are proposing two independent watermarks, one for image recovery and the other for authentication. The first watermark (image digest), a highly compressed version of the original image itself, is used to recover the distorted image. Unlike the traditiona… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…Ullah and Ali [35] proposed a smart watermarking image authentication and recovery algorithm by combining the DCT domain method and the IWT domain method together. The HVS based on genetic programming (GP) is used in this algorithm.…”
Section: Other Transform Domainsmentioning
confidence: 99%
“…Ullah and Ali [35] proposed a smart watermarking image authentication and recovery algorithm by combining the DCT domain method and the IWT domain method together. The HVS based on genetic programming (GP) is used in this algorithm.…”
Section: Other Transform Domainsmentioning
confidence: 99%