2022
DOI: 10.1007/s11042-022-13630-4
|View full text |Cite
|
Sign up to set email alerts
|

Logistic-map based fragile image watermarking scheme for tamper detection and localization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(5 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…In order to explain the steganography stage and extraction stage of this extension scheme more clearly [ 27 ], the information steganography process of this scheme is demonstrated in Table 6 .…”
Section: Methodsmentioning
confidence: 99%
“…In order to explain the steganography stage and extraction stage of this extension scheme more clearly [ 27 ], the information steganography process of this scheme is demonstrated in Table 6 .…”
Section: Methodsmentioning
confidence: 99%
“…One of the polynomial maps that display chaotic behavior is the logistic map. One such map is provided in (1).…”
Section: Encryption and Decryption Using Proposed Hybrid Chaotic Mapp...mentioning
confidence: 99%
“…The rapid development of digital applications and enhanced technologies has simultaneously created a huge demand in the security industry also [1], [2]. Security is one of the most vital parameters required for successfully transmitting information via the network, but is greatly impacted by increase in illegal activities pertaining to information misuse such as copying, editing [3].…”
Section: Introductionmentioning
confidence: 99%
“…This scheme takes advantage of the sensitivity property of the logistic map to generate watermark bits, which are embedded in the rightmost LSBs by performing the logical XOR operation between the first intermediate significant bits and the watermark bits. In [31], logistic-map based fragile image watermarking scheme for tamper detection and localization is proposed, which is blind and the watermark bits are generated using the chaotic system based logistic-map at both the sender and receiving end. Therefore, the quality of the watermarked image is quite superior to that of the other schemes and the outstanding results are achieved with respect to the tamper detection and localization ability.…”
Section: Related Workmentioning
confidence: 99%