2022
DOI: 10.1007/s00034-021-01926-z
|View full text |Cite
|
Sign up to set email alerts
|

Multipurpose Image Watermarking: Ownership Check, Tamper Detection and Self-recovery

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 33 publications
0
6
0
Order By: Relevance
“…Our method uses VI and RI for dual tampering detection in each block, resulting in higher tampering detection accuracy compared to the single tampering detection approach of the other methods. Figure 11 shows the PSNR and SSIM comparison results between recovered images and cover images at different tampering rates compared to the methods of Tohidi [13], Aminuddin [17], Renklier [19], Haghighi [25], Li [26], Sinhal [27]. When the tampering rate is low, our method obtains higher PSNR and SSIM values.…”
Section: Tampering Detection and Recoverymentioning
confidence: 97%
See 1 more Smart Citation
“…Our method uses VI and RI for dual tampering detection in each block, resulting in higher tampering detection accuracy compared to the single tampering detection approach of the other methods. Figure 11 shows the PSNR and SSIM comparison results between recovered images and cover images at different tampering rates compared to the methods of Tohidi [13], Aminuddin [17], Renklier [19], Haghighi [25], Li [26], Sinhal [27]. When the tampering rate is low, our method obtains higher PSNR and SSIM values.…”
Section: Tampering Detection and Recoverymentioning
confidence: 97%
“…Li et al [26] proposed a four-layer tampering detection algorithm to achieve high identification accuracy for the tampered region. Sinhal et al [27] embedded both a robust watermark and a fragile watermark in the cover image.…”
Section: Introductionmentioning
confidence: 99%
“…Further, embed the watermark bit w r bit by adjusting the coefficient (C) values of LH2 and HL2 sub-bands as described in Eqs. ( 1) and ( 2) respectively [28]. Here, a is the embedding factor value, which can be adjusted to set the tradeoff line in between robustness and imperceptibility features.…”
Section: Robust Watermark Insertionmentioning
confidence: 99%
“…With the rapid development of technologies such as the Internet, big data, and artificial intelligence, the financial technology service industry is undergoing unprecedented changes [1][2][3][4]. In this process, deep learning-based intelligent image recognition technology has attracted widespread attention as an important computer vision technology [5][6][7][8][9][10][11]. The financial technology service industry involves a large number of image and text information processing tasks, such as customer identity verification, loan approval, and credit evaluation.…”
Section: Introductionmentioning
confidence: 99%