2014
DOI: 10.1016/j.jvcir.2013.12.017
|View full text |Cite
|
Sign up to set email alerts
|

Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
24
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 66 publications
(24 citation statements)
references
References 20 publications
0
24
0
Order By: Relevance
“…The generation and the embedding of the watermark are carried out in the image itself, and two watermark tamper evaluation functions are introduced, which can be used to achieve the purpose of distinguishing attacks. Al-Otum et al [22] also put forward a semi-fragile watermarking algorithm that can detect and classify the tamper attacks. The algorithm is an improved algorithm based on the quantization approach in the DWT domain, which adopts the multi-scale expansion bits with adjustable watermarking location to embed the random watermarking bit sequence into the DWT low frequency sub-bands of the 2nd DWT levels (LL 2 , LL LH1 , and LL HL1 ).…”
Section: Dct Domainmentioning
confidence: 99%
“…The generation and the embedding of the watermark are carried out in the image itself, and two watermark tamper evaluation functions are introduced, which can be used to achieve the purpose of distinguishing attacks. Al-Otum et al [22] also put forward a semi-fragile watermarking algorithm that can detect and classify the tamper attacks. The algorithm is an improved algorithm based on the quantization approach in the DWT domain, which adopts the multi-scale expansion bits with adjustable watermarking location to embed the random watermarking bit sequence into the DWT low frequency sub-bands of the 2nd DWT levels (LL 2 , LL LH1 , and LL HL1 ).…”
Section: Dct Domainmentioning
confidence: 99%
“…The scheme includes SVD and Wavelet operations. In 2014, Al-Otum proposed a watermarking technique to verify the authenticity and localize the tampered area [6]. He used DWT to decompose a cover image and conceal a secret message in the low-frequency second-level DWT coefficients.…”
Section: Introductionmentioning
confidence: 99%
“…Multimedia data consists of various data like text, image, sound, video, etc. Multimedia data transmission is generally used in areas such e-learning, web conference, social media, mobile applications, biomedical engineering [1][2][3][4][5].…”
Section: Introductionmentioning
confidence: 99%
“…In addition, an image authentication method should detect any modifications and should robust against cryptanalysis attacks. To provide image authentication by using watermarking, quick response (QR) codes, sparse coding, fuzzy, singular value decomposition (SVD), wavelet transformations, clustering, Chinese remainder theorem (CRT), etc., methods were used in the literature [1][2][3][4][5][6][7][8][9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%