2009
DOI: 10.1016/j.eswa.2007.11.018
|View full text |Cite
|
Sign up to set email alerts
|

A fuzzy c-means clustering-based fragile watermarking scheme for image authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
56
0
3

Year Published

2009
2009
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 108 publications
(63 citation statements)
references
References 16 publications
0
56
0
3
Order By: Relevance
“…An authentication data is generated for each block by using a pseudo random sequence seeded with a secret key. In [5] the authors shown that the blockwise independency watermarking scheme can detect tamper on various types of attack, as "cut and paste" and "vector quantization counterfeiting" attacks. The authors show that the tamper detection results are better that those ones obtained with the approaches described in [4,16].…”
Section: Tamper Analysismentioning
confidence: 99%
See 4 more Smart Citations
“…An authentication data is generated for each block by using a pseudo random sequence seeded with a secret key. In [5] the authors shown that the blockwise independency watermarking scheme can detect tamper on various types of attack, as "cut and paste" and "vector quantization counterfeiting" attacks. The authors show that the tamper detection results are better that those ones obtained with the approaches described in [4,16].…”
Section: Tamper Analysismentioning
confidence: 99%
“…Section 2 describes the image compression method realized with the F-transforms, in Section 3 we recall briefly the FCM method. In Section 4 we describe the Chen and Wang [5] watermarking scheme and in Section 5 we present our fragile watermarking process. Section 6 contains the results of our tests made on a well known image and final considerations are reported in Section 7.…”
Section: Tamper Analysismentioning
confidence: 99%
See 3 more Smart Citations