2013
DOI: 10.1145/2487268.2487272
|View full text |Cite
|
Sign up to set email alerts
|

A generalized tamper localization approach for reversible watermarking algorithms

Abstract: In general reversible watermarking algorithms, the convention is to reject the entire cover image at the receiver end if it fails authentication, since there is no way to detect the exact locations of tampering. This feature may be exploited by an adversary to bring about a form of DoS attack. Here we provide a solution to this problem in form of a tamper localization mechanism for reversible watermarking algorithms, which allows selective rejection of distorted cover image regions in case of authentication fa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…3. Table 1 reports high PSNR and high correlation values obtained from current multiple image hiding technique [12,13,14]. To our knowledge, substantial amount of work has not been done in the domain of multiple image embedding.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…3. Table 1 reports high PSNR and high correlation values obtained from current multiple image hiding technique [12,13,14]. To our knowledge, substantial amount of work has not been done in the domain of multiple image embedding.…”
Section: Resultsmentioning
confidence: 99%
“…As an extraction [12,13,14] mechanism, 22 and 9 is multiplied and added with 3. The generated result (201) is split into 3 single digit numbers (2, 0, 1 2 714 mod 3 = 2, so we will consider 14 for feather processing.…”
Section: Explanation Of the Proposed Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In [17] a framework for applying reversible data embedding to fragile watermarking is developed. The work divides an image into tamper localization blocks and shows how to embed in these blocks a secure hash (apparently used with a key, thus properly a message authentication code) using any reversible data embedding algorithm; moreover, it uses the idea of merging blocks in case a single block is not able to completely carry a hash.…”
Section: Related Workmentioning
confidence: 99%
“…The image watermarking algorithm is an effective method to recovery images information [3, 5, 7, 9-13, 15-20, 22, 29, 31-33]. The scheme [13] proposed a reversible watermarking algorithm based on a tamper localization mechanism, which allows selective rejection of distorted cover image regions in case of authentication failure. The advantage of the algorithm is a high resolution of tampering detection and results in minimal rejection of no tampered pixels.…”
Section: Introductionmentioning
confidence: 99%