2020
DOI: 10.1109/tla.2020.9082736
|View full text |Cite
|
Sign up to set email alerts
|

Watermarking Framework for Authentication and Self-recovery of Tampered Colour Images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 0 publications
0
8
0
Order By: Relevance
“…The distribution of the DCT coefficients is utilized for the localization of tampered regions. Some other techniques are used to detect the traces via median filtering, resampling, contrast enhancement, scaling, and so forth 33‐37 …”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The distribution of the DCT coefficients is utilized for the localization of tampered regions. Some other techniques are used to detect the traces via median filtering, resampling, contrast enhancement, scaling, and so forth 33‐37 …”
Section: Introductionmentioning
confidence: 99%
“…Some other techniques are used to detect the traces via median filtering, resampling, contrast enhancement, scaling, and so forth. [33][34][35][36][37] However, the availability of versatile photo/video manipulation technologies allows illicit activities such as illegal duplication and deliberate editing of digital files, even though it is difficult to determine whether or not an image has been modified. [38][39][40][41] For the secret revival, parallel or distributed computing methods are widely deployed to overlaps the diverse hares spread over the computer network.…”
mentioning
confidence: 99%
“…The blind fragile technique of watermarking has been suggested for the detection of image tampering where the watermark embedded in the least significant bit of Red, Green and Blue (RGB) image blocks and the information is retrieved on strong damages (Sinhal et al , 2020) and operations have been placed on non-overlapping and XOR with halftoning (Molina et al , 2020). A semi-blind technique has been proposed to resolve the problem of digital data in terms of copyrights.…”
Section: Introductionmentioning
confidence: 99%
“…Due to the technological advancement, potential attackers are now better equipped with various tools to illegally copy, copy-move, retouch, manipulate, or distribute digital data. To alleviate illegal operations, various techniques have been developed that encrypt or watermark the data as a line of defence to provide data confidentiality and copyright protection, respectively, [1][2][3].…”
Section: Introductionmentioning
confidence: 99%
“…Due to the technological advancement, potential attackers are now better equipped with various tools to illegally copy, copy-move, retouch, manipulate, or distribute digital data. To alleviate illegal operations, various techniques have been developed that encrypt or watermark the data as a line of defence to provide data confidentiality and copyright protection, respectively, [1][2][3].The development of various image editing technologies has eased the image manipulating while making it difficult to distinguish between altered and natural images [4]. Image tampering methods primarily include image retouching, image morphing, resampling, splicing copy move forgery, image generation, and colourisation [4][5][6].…”
mentioning
confidence: 99%