2016 9th International Kharkiv Symposium on Physics and Engineering of Microwaves, Millimeter and Submillimeter Waves (MSMW) 2016
DOI: 10.1109/msmw.2016.7538148
|View full text |Cite
|
Sign up to set email alerts
|

Watermarking algorithm for authentication and self-recovery of tampered images using DWT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…According to the domain embedded, digital watermark embedding algorithms are divided into timespatial embedding, which is fast and relatively easy to operate but is easy to be erased by geometrical attack, and transform domain embedding [16][17][18][19], which is good at resisting geometrical attack but is fragile facing filtering. Moreover, according to the preknowledge related to data before embedding, we classify the embedding method into preknowledge dependent embedding and preknowledge independent embedding.…”
Section: Digital Watermark Digital Watermark (W) Is a Signalmentioning
confidence: 99%
See 1 more Smart Citation
“…According to the domain embedded, digital watermark embedding algorithms are divided into timespatial embedding, which is fast and relatively easy to operate but is easy to be erased by geometrical attack, and transform domain embedding [16][17][18][19], which is good at resisting geometrical attack but is fragile facing filtering. Moreover, according to the preknowledge related to data before embedding, we classify the embedding method into preknowledge dependent embedding and preknowledge independent embedding.…”
Section: Digital Watermark Digital Watermark (W) Is a Signalmentioning
confidence: 99%
“…Homomorphic encryption [18] can translate some operations on plain text into other operations on ciphertext. In our solution, we require that data should be encrypted during transferring and embedding process.…”
Section: Homomorphic Encryption (He)mentioning
confidence: 99%
“…Other methods proposed in [14] are as follows: selecting key information from an image by performing discrete wavelet transform (DWT), and taking the coefficients from low frequency (LL sub band) of the DWT level-1 and level-2 as watermark, and work on the block with the size of less small, 2 × 2 pixels, so that they can make better image resolution after the error recovery. There is a drawback in this method, that the use of the watermark sub band LL resulting from the two-level DWT is not efficient, because the information from the LL sub band level-1 is the most representative for the reconstruction error.…”
Section: Introductionmentioning
confidence: 99%
“…The methods in References [1][2][3][4] are all based on discrete cosine transforms (DCT). Javier et al [5] introduced a watermark scheme for authentication and self-recovery. Inverse halftoning techniques and median filtering were also used to improve the quality of the recovered image.…”
Section: Introductionmentioning
confidence: 99%
“…Inverse halftoning techniques and median filtering were also used to improve the quality of the recovered image. However, to prevent image tampering attacks, both [4] and [5] take only JPEG compression into account.…”
Section: Introductionmentioning
confidence: 99%