2001
DOI: 10.1117/1.1391435
|View full text |Cite
|
Sign up to set email alerts
|

Secure discrete cosine transform based technique for recoverable tamper proofing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2004
2004
2019
2019

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…The embedded authentication watermarks are also used as recovery watermarks. Due to the aforementioned reason, Li et al [11,21] utilized the DWT technique to extract image information from low-frequency coefficients and embedded the information in mid-frequency components for tamper detection and recovery. In [43], the authors presented a semi-fragile watermarking method for the automatic authentication and restoration of digital image content.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The embedded authentication watermarks are also used as recovery watermarks. Due to the aforementioned reason, Li et al [11,21] utilized the DWT technique to extract image information from low-frequency coefficients and embedded the information in mid-frequency components for tamper detection and recovery. In [43], the authors presented a semi-fragile watermarking method for the automatic authentication and restoration of digital image content.…”
Section: Related Workmentioning
confidence: 99%
“…For semi-fragile self-recoverable watermarking, some popular schemes have been developed [3,4,11,15,21,28,33,43]. These schemes can be classified into two categories based on the methods and functionalities of embedded watermarks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…20 • Independently authenticated algorithms receive validation based on an image-independent authentication sequence, as in the methods of Eggers,7,21 Fridrich, 16 Lin, Podilchuk, and Delp, 9 Queluz and Lamy, 22,23 Kundur and Hatzinakos, 24,25 Lan, Mansour, and Tewfik, 26 and Gwo, Lu, and Liao. 27 We plan to present a comparative assessment of the statistically authenticated, oblivious, semifragile watermarking techniques.…”
Section: -11mentioning
confidence: 99%
“…It is based on two properties of the DCT coefficient quantization, namely, 1. order invariance, where the order relation of DCT coefficient pairs remains unaltered after JPEG processing, if not set equal; and 2. coefficient invariance, where if a coefficient is quantized to an integer multiple of the step size, its value is not changed after JPEG compression with a smaller step size. A parallel algorithm is that of Hung, Cheng, and Chen, 20 which uses the block vector quantization ͑VQ͒ indices for authentication data. This algorithm, however, results in a large payload of VQ coefficients, and its performance turns out to be rather poor.…”
Section: Lin-chang Algorithmmentioning
confidence: 99%