2014
DOI: 10.1016/j.ins.2013.07.035
|View full text |Cite
|
Sign up to set email alerts
|

A high capacity reversible watermarking approach for authenticating images: Exploiting down-sampling, histogram processing, and block selection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(13 citation statements)
references
References 36 publications
0
13
0
Order By: Relevance
“…We can see that the proposed predictor provides the smallest error power and the prediction errors are closer to zero. The error power of the other schemes can be estimated by (17), where N is the length of the audio file. For the other clips, the simulation results are similar.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…We can see that the proposed predictor provides the smallest error power and the prediction errors are closer to zero. The error power of the other schemes can be estimated by (17), where N is the length of the audio file. For the other clips, the simulation results are similar.…”
Section: Resultsmentioning
confidence: 99%
“…Thus, the number of the peak frequency bin determines the embedding capacity. These schemes may include blocking or area selection methods just like the approach shown in [17]. Its embedding capacity was usually smaller and the embedding distortion was unstable.…”
Section: Introductionmentioning
confidence: 99%
“…The proof of integrity and authenticity of reversible watermarking has been one large challenge [1][2][3]. In fact, generating a copy of digital signal is just reconstructing one same signal.…”
Section: Introductionmentioning
confidence: 99%
“…At present, there are three existing approaches which respectively named blind detection, image hashing and digital watermarking to deal with the problems of detection of images tamper [1][2][3].…”
Section: Introductionmentioning
confidence: 99%
“…Above all, these approaches have been extensively useful to the literature of copyright protection and tamper authentication. Difference expansion, sorting and prediction [3], histogram modification, lossless compression, prediction-error histogram [4] and hybrid methods [5] are the most common procedure to understand the reversibility of watermarking algorithm. Digital watermarking schemes can be classified according to embedding domain as spatial domain [6][7][8] or frequency domain [9][10][11] techniques.…”
Section: Introductionmentioning
confidence: 99%