2023
DOI: 10.3390/e25030508
|View full text |Cite
|
Sign up to set email alerts
|

A Fragile Image Watermarking Scheme in DWT Domain Using Chaotic Sequences and Error-Correcting Codes

Abstract: With the rapid development of digital signal processing tools, image contents can be easily manipulated or maliciously tampered with. Fragile watermarking has been largely used for content authentication purposes. This article presents a new proposal for image fragile watermarking algorithms for tamper detection and image recovery. The watermarked bits are obtained from the parity bits of an error-correcting code whose message is formed from a binary chaotic sequence (generated from a secret key known to all l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 51 publications
0
3
0
Order By: Relevance
“…The parameter ACC shown in Eq. (26) represent the extent to which the tampered pixels are identified E Q -T A R G E T ; t e m p : i n t r a l i n k -; e 0 2 5 ; 1 1 4 ; 1 0 6…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The parameter ACC shown in Eq. (26) represent the extent to which the tampered pixels are identified E Q -T A R G E T ; t e m p : i n t r a l i n k -; e 0 2 5 ; 1 1 4 ; 1 0 6…”
Section: Resultsmentioning
confidence: 99%
“…High embedding capacity is achieved. Ramos et al 26 proposed a fragile watermarking scheme with tamper detection and recovery. They generated the WBs from parity bits of an error correcting code and inserted in certain sub-bands of the discrete wavelength transform.…”
Section: Related Workmentioning
confidence: 99%
“…In the face of high-intensity attacks, the computed watermark information may be incomplete. To address this deficiency, we plan to introduce error-correcting code data-encoding techniques in future algorithmic research [20]. This approach aims to recover lost data using known key point information and encoding constraints.…”
Section: Discussionmentioning
confidence: 99%