2007
DOI: 10.1109/tmm.2006.887990
|View full text |Cite
|
Sign up to set email alerts
|

Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
69
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 123 publications
(69 citation statements)
references
References 21 publications
0
69
0
Order By: Relevance
“…Lie and Lin [17] proposed DCT coefficients following the Laplacian distribution model. Yang and Kot [30] and Fridrich [7] devised DCT coefficients following the GGD statistical model.…”
Section: Histogram Model Of Still Image Dct Coefficientsmentioning
confidence: 99%
“…Lie and Lin [17] proposed DCT coefficients following the Laplacian distribution model. Yang and Kot [30] and Fridrich [7] devised DCT coefficients following the GGD statistical model.…”
Section: Histogram Model Of Still Image Dct Coefficientsmentioning
confidence: 99%
“…The "embeddability" of a block is invariant in the watermark embedding process; hence if want to extract watermark then it can be extracted without referring to the originl image. The "uneven embeddability" of the host image is handled by embedding the watermark in only those "embeddable" blocks in an image [1].…”
Section: Literature Surveymentioning
confidence: 99%
“…Earlier a problem "uneven embeddability" has been identified in [12], in which the "flippable" pixels were distributed uniformly throughout the image by a random shuffling key. They handled this problem by embedding the watermark adaptively in those embeddable blocks.…”
Section: Related Researchmentioning
confidence: 99%
“…Improvements over the visual quality is made by choosing the edge pixels in their paper that is the problem in [12] In [12], the proposed scheme uses a secret key and a weight matrix to protect the hidden data, it also uses a weight matrix to enhance the data hiding ratio. The operator XOR is adopted so that the keys can not be compromised easily.…”
Section: Related Researchmentioning
confidence: 99%