2019
DOI: 10.3390/s19102267
|View full text |Cite
|
Sign up to set email alerts
|

Self-Embedding Authentication Watermarking with Effective Tampered Location Detection and High-Quality Image Recovery

Abstract: Recently, sensor networks have emerged as a high-impact research area, and a number of high profile applications have been proposed. Although significant progress has already been made on securing basic network protocols, additional research is needed to produce techniques and methods for protecting canonical tasks in wireless sensor networks. In this paper, we propose an effective self-embedding authentication watermarking method for tampered location detection and image recovery. The proposed detection metho… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
17
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(23 citation statements)
references
References 35 publications
1
17
0
Order By: Relevance
“…In invisible watermarking techniques, information is hidden inside the object [42]. The hidden process can be performed based on three techniques, which are: robust, fragile and semi-fragile techniques [61]. The robust technique is mostly used to verify the intellectual property rights as it is resistant to many various attacks.…”
Section: Human's Perceptionmentioning
confidence: 99%
See 1 more Smart Citation
“…In invisible watermarking techniques, information is hidden inside the object [42]. The hidden process can be performed based on three techniques, which are: robust, fragile and semi-fragile techniques [61]. The robust technique is mostly used to verify the intellectual property rights as it is resistant to many various attacks.…”
Section: Human's Perceptionmentioning
confidence: 99%
“…In [61], the researchers propose a self-embedding authentication process in watermarking technology in order to discover and recover different tampered locations. Two types of detection processes are proposed, which comprise the pixel-wise and block-wise processes.…”
Section: Fragilementioning
confidence: 99%
“…Reference [8] presents a self-embedding authentication method that helps to detect and locate tampered areas as well as to recover the tampered area. They introduced two types of detection method: block-wise and pixel-wise methods.…”
Section: Summary Of the Special Issuementioning
confidence: 99%
“…The other category is random mapping. Lee et al [8] proposed a self-embedded authentication watermarking algorithm, which generates a random sequence through a key and finds the mapping block according to the random sequence. The embedding method from ref.…”
Section: Introductionmentioning
confidence: 99%