2010 2nd International Conference on Computer Engineering and Technology 2010
DOI: 10.1109/iccet.2010.5485995
|View full text |Cite
|
Sign up to set email alerts
|

Research and implementation of fragile watermark for vector graphics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Apart from the embedding distortion, our method can detect and locate modifications to single entity. The precision is higher than the methods in [6,12,22,[27][28][29] for they can only detect and locate the modifications to certain groups or regions. Based on this feature, our method is more practical in collaborative design.…”
Section: Performance Comparison Between the Proposed Methods And The ...mentioning
confidence: 98%
See 1 more Smart Citation
“…Apart from the embedding distortion, our method can detect and locate modifications to single entity. The precision is higher than the methods in [6,12,22,[27][28][29] for they can only detect and locate the modifications to certain groups or regions. Based on this feature, our method is more practical in collaborative design.…”
Section: Performance Comparison Between the Proposed Methods And The ...mentioning
confidence: 98%
“…Although it can verify the integrity of the watermarked vector map and detect modification and label them with rectangles, the detection precision still needs to be improved. After that, they proposed another scheme [28]. The linear entities of vector graphics were divided into different groups and watermark was embedded into these groups.…”
Section: Related Workmentioning
confidence: 99%
“…impossible, it fails to locate tampered blocks. Another scheme was presented by Zheng et al (2010), in which the features are divided into different groups and the watermarks are embedded group by group independently. To locate tampered data accurately, Wang and Men (2012) set marks on each Polyline/Polygon through vertex insertion and hide the authentication watermark using the difference expansion technique (Wang et al, 2007).…”
mentioning
confidence: 99%