2020
DOI: 10.1016/j.jisa.2020.102629
|View full text |Cite
|
Sign up to set email alerts
|

Reversible and recoverable authentication method for demosaiced images using adaptive coding technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…The fragile watermarking technique can be applied to images in spatial [6][7][8][9][10] or compressed [11][12][13] domains. In the spatial domain, data are embedded directly by modifying pixel values.…”
Section: Introductionmentioning
confidence: 99%
“…The fragile watermarking technique can be applied to images in spatial [6][7][8][9][10] or compressed [11][12][13] domains. In the spatial domain, data are embedded directly by modifying pixel values.…”
Section: Introductionmentioning
confidence: 99%
“…Semi-fragile watermarking is not sensitive to minor image modifications (e.g., JPEG compression), but is sensitive to malicious tampering [6]. In contrast, fragile watermarking is sensitive to any tampering [7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25], which protects the image to the largest extent. For the fragile watermarking method, since the embedded authentication code is fragile, tampering with the image will also destroy the authentication code.…”
Section: Introductionmentioning
confidence: 99%
“…This technique requires embedding the authentication code into the image, and the quality of the image will be degraded inevitably. Nevertheless, it has a better detection effect and some of methods [9]- [12] can also recover the tampered regions roughly.…”
Section: Introductionmentioning
confidence: 99%