2021
DOI: 10.1007/s11042-020-10451-1
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid-Sudoku based fragile watermarking scheme for image tampering detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…Scheme in [4] 37.9 dB [26,29] dB α < 59% Scheme in [7] 37.9 dB 40.7 dB α < 24% Scheme in [10] 51.3 dB [24,36] dB α < 50% Scheme in [18] 37.9 dB +∞ α < 26% Scheme in [23] [37.92, 54.13] dB [28.63, 46.98] dB α < 50% Scheme in [28] 49.76 dB 34.65 dB α < 50% Proposed Scheme 46.8 dB [32,42] dB α < 50%…”
Section: Condition Of Recoverymentioning
confidence: 99%
“…Scheme in [4] 37.9 dB [26,29] dB α < 59% Scheme in [7] 37.9 dB 40.7 dB α < 24% Scheme in [10] 51.3 dB [24,36] dB α < 50% Scheme in [18] 37.9 dB +∞ α < 26% Scheme in [23] [37.92, 54.13] dB [28.63, 46.98] dB α < 50% Scheme in [28] 49.76 dB 34.65 dB α < 50% Proposed Scheme 46.8 dB [32,42] dB α < 50%…”
Section: Condition Of Recoverymentioning
confidence: 99%
“…As a result, people have come to share and store many secure files including digital video, and digital image. 1 These digital data can easily be modified and manipulated by using digital image editing tools. 2,3 Security of digital data is no longer an abstract concept, but has become a necessity in recent years.…”
Section: Introductionmentioning
confidence: 99%
“…These methods are used in critical areas to verify images in fields such as medicine, military, satellite, and forensic. 1,2,17,18 In fragile watermarking methods, a stamp, a logo, or an image can be used as a watermark. Also, a watermark can be generated from hash, chaos, and block information of the cover image.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations