2022
DOI: 10.1016/j.jksuci.2021.12.011
|View full text |Cite
|
Sign up to set email alerts
|

Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 36 publications
0
7
0
Order By: Relevance
“…The state-of-the-art techniques along with evaluation parameters, pros, and cons of classical watermarking techniques for medical image watermarking have been presented in Table 5 [ 14 , 25 , 27 , 33 , 47 , 48 , 56 , 66 , 71 , 86 ].…”
Section: State Of the Art Watermarking Techniques For Medical Imagementioning
confidence: 99%
See 1 more Smart Citation
“…The state-of-the-art techniques along with evaluation parameters, pros, and cons of classical watermarking techniques for medical image watermarking have been presented in Table 5 [ 14 , 25 , 27 , 33 , 47 , 48 , 56 , 66 , 71 , 86 ].…”
Section: State Of the Art Watermarking Techniques For Medical Imagementioning
confidence: 99%
“… • The technique has not been checked for recovery of tampers in the images. Fragile Jana et al [ 33 ] Self-generated watermark AMBTC and Fuzzy logic PSNR, MSE, SSIM, TDR, TRR,TR • Categorizes the blocks as smooth and complex. • It detects, localizes, and recovers the tamper.…”
Section: State Of the Art Watermarking Techniques For Medical Imagementioning
confidence: 99%
“…They got a good peak signal-to-noise ratio (PSNR) and better attack resistance. Jana et al 11 used the similarity matrix concept to classify a group as either smooth or complex. In a smooth group, WBs are created from eight MSBs of the pixels, and the group mean is considered as RBs.…”
Section: Introductionmentioning
confidence: 99%
“…They got a good peak signal-to-noise ratio (PSNR) and better attack resistance. Jana et al 11 . used the similarity matrix concept to classify a group as either smooth or complex.…”
Section: Introductionmentioning
confidence: 99%
“…Meanwhile, the active detection process is carried out more simply through embedding using a watermarking method and perceptual image hash [13]. It is generally used to detect the local tampered region of the image [14]. Active detection is capable of detecting multiple tampering points on an image [15] and has a high level of tampering tolerance [16], thus making it suitable for use in most cases of image manipulation.…”
mentioning
confidence: 99%