2011
DOI: 10.1145/2000486.2000489
|View full text |Cite
|
Sign up to set email alerts
|

Protecting the content integrity of digital imagery with fidelity preservation

Abstract: Fragile watermarking is applied to protect the content integrity of digital images. The main concerns related to watermarking include retaining the quality of the watermarked image and retaining the ability to detect whether any manipulation has occurred. Because recent watermarking techniques seriously distort the quality of the protected image after embedding the authentication code into the image content, attention has been drawn to how to satisfy both the need for image fidelity and detection ability. To a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
22
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 41 publications
(24 citation statements)
references
References 27 publications
2
22
0
Order By: Relevance
“…It is known that the watermark length of l m is influenced by the selected hash function. In this regard, simple function is required to select the bits sequentially with respect to n parameter ( n value is same as in step (iii)) as defined below: W={LSBitnormal1n,nnormal8,LSBitnormal1normal8,n>normal8. The selected authentication bits W are hidden into the wavelet coefficients using weighted-sum function, f ( x ) [17]. The block of wavelet coefficients is fed into weighted-function and then the resulting value is compared with selected authentication bits; both values are treated in decimal form.…”
Section: The Proposed Watermarking Methods In the Wavelet Domainmentioning
confidence: 99%
“…It is known that the watermark length of l m is influenced by the selected hash function. In this regard, simple function is required to select the bits sequentially with respect to n parameter ( n value is same as in step (iii)) as defined below: W={LSBitnormal1n,nnormal8,LSBitnormal1normal8,n>normal8. The selected authentication bits W are hidden into the wavelet coefficients using weighted-sum function, f ( x ) [17]. The block of wavelet coefficients is fed into weighted-function and then the resulting value is compared with selected authentication bits; both values are treated in decimal form.…”
Section: The Proposed Watermarking Methods In the Wavelet Domainmentioning
confidence: 99%
“…The method presented in [5] and improved in [6] is an efficient fragile watermarking method in the spatial domain that produces watermarked images with the highest theoretical quality. This method can be used to watermark each channel separately (including the alpha channel).…”
Section: Related Workmentioning
confidence: 99%
“…In the last years numerous image authentication techniques have been devised in pixel domain [1,2] and transform domain, e.g., the Karhunen-Loève transform, [3,4]. Soft computing techniques [5] have been extensively used to improve the efficiency of the watermarking schemes [6][7][8].…”
Section: Introductionmentioning
confidence: 99%