2011
DOI: 10.1016/j.sigpro.2010.06.017
|View full text |Cite
|
Sign up to set email alerts
|

Watermarking in halftone images with parity-matched error diffusion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 30 publications
0
10
0
Order By: Relevance
“…For example, if a binary visual pattern is embedded, then it may be visually recognized from as low as 70% of its bits. 8,38 But if sensitive data is embedded, such as names, ID numbers or URLs, then nothing less than CDR = 100% may be acceptable. We also note that error correction coding (ECC) techniques may be used to ensure perfect data recovery from the prints at the expense of reducing the amount of embedded actual useful data.…”
Section: Data Capacitymentioning
confidence: 99%
“…For example, if a binary visual pattern is embedded, then it may be visually recognized from as low as 70% of its bits. 8,38 But if sensitive data is embedded, such as names, ID numbers or URLs, then nothing less than CDR = 100% may be acceptable. We also note that error correction coding (ECC) techniques may be used to ensure perfect data recovery from the prints at the expense of reducing the amount of embedded actual useful data.…”
Section: Data Capacitymentioning
confidence: 99%
“…For example, if a binary visual pattern is embedded, then it may be visually recognized from as low as 70% of its bits. 8,38 But if sensitive data is embedded, such as names, ID numbers or URLs, then nothing less than CDR = 100% may be acceptable. We also note that error correction coding (ECC) techniques may be used to ensure perfect data recovery from the prints at the expense of reducing the amount of embedded actual useful data.…”
Section: Data Capacitymentioning
confidence: 99%
“…Recently, many watermarking schemes [1,4,7,8] have been proposed to embed a watermark into binary images for image authentication with small distortion. If the image was modified, the recovery operation was used to reconstruct the modified regions.…”
Section: Introductionmentioning
confidence: 99%
“…Lee et al's scheme also reduced the high pixel-flipping rate. Guo et al [4] then presented a parity-matched error diffusion watermarking scheme, based on a block-wised, majority voting strategy for image authentication. To increase the security, this scheme spread the watermark bit to each pixel of the cover image block.…”
Section: Introductionmentioning
confidence: 99%