2016
DOI: 10.1016/j.future.2016.04.001
|View full text |Cite
|
Sign up to set email alerts
|

Probability-based reversible image authentication scheme for image demosaicking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…This method was applied on stereoscopic images. Hu et al [16] proposed an image authentication method in order to detect tampered region for demosaicking with the reversibility preserving property. This method suggested for RGB image authentication.…”
Section: Organizationsmentioning
confidence: 99%
“…This method was applied on stereoscopic images. Hu et al [16] proposed an image authentication method in order to detect tampered region for demosaicking with the reversibility preserving property. This method suggested for RGB image authentication.…”
Section: Organizationsmentioning
confidence: 99%
“…Solutions based on public-key infrastructure generally suffer from key management issues, and seeking to address the limitations associated with such an approach, Yu et al [27] propose an identity-based cloud data integrity checking protocol and prove its security. Using a different approach, Hu et al [12] propose an image authentication scheme that allows detecting areas having been tampered with for image demosaicking with the reversibilitypreserving property.…”
Section: Data Integritymentioning
confidence: 99%
“…1 These digital data can easily be modified and manipulated by using digital image editing tools. 2,3 Security of digital data is no longer an abstract concept, but has become a necessity in recent years. 4 The most popular methods used in literature for protecting and authenticating the images are digital signature 5 and digital watermarking.…”
Section: Introductionmentioning
confidence: 99%
“…As a result, people have come to share and store many secure files including digital video, and digital image 1 . These digital data can easily be modified and manipulated by using digital image editing tools 2,3 . Security of digital data is no longer an abstract concept, but has become a necessity in recent years 4 …”
Section: Introductionmentioning
confidence: 99%