2009
DOI: 10.1016/j.ins.2009.07.014
|View full text |Cite
|
Sign up to set email alerts
|

A new data hiding scheme for binary image authentication with small image distortion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 47 publications
(20 citation statements)
references
References 29 publications
(100 reference statements)
0
20
0
Order By: Relevance
“…This simple requirement, in reality, makes digital watermarking a multidisciplinary research problem involving theory of communications, signal processing, multimedia coding, information theory, cryptography, mathematics and computer science etc. [5][6][7][8] Many researchers view digital watermarking as a digital communication problem and accordingly use modulation and multiplexing principles to design efficient watermarking algorithms. Similarly, many watermarking techniques have shown improved performance by exploiting the knowledge of signal processing.…”
Section: 4mentioning
confidence: 99%
See 2 more Smart Citations
“…This simple requirement, in reality, makes digital watermarking a multidisciplinary research problem involving theory of communications, signal processing, multimedia coding, information theory, cryptography, mathematics and computer science etc. [5][6][7][8] Many researchers view digital watermarking as a digital communication problem and accordingly use modulation and multiplexing principles to design efficient watermarking algorithms. Similarly, many watermarking techniques have shown improved performance by exploiting the knowledge of signal processing.…”
Section: 4mentioning
confidence: 99%
“…The effect of host signal interference which affects significantly the detection performance of SS watermarking can be solved to a great extent, if image signal is decomposed in proper direction. Figure 2 shows the correlation between the code patterns and the image decomposition corresponding to Daubechies filters (db4), biorthogonal (6,8) and biorthogonal (4, 4) wavelet filters. Similar experimentations are also done for other wavelet filters and biorthogonal wavelets.…”
Section: Performance Improvement In Spread Spectrum Watermarking Usinmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, many watermarking schemes [1,4,7,8] have been proposed to embed a watermark into binary images for image authentication with small distortion. If the image was modified, the recovery operation was used to reconstruct the modified regions.…”
Section: Introductionmentioning
confidence: 99%
“…Lee et al [8] proposed a Hamming-code-based data embedding method. Lee et al [9] improved the method later by using an edge line similarity measure to select flippable pixels. In the method [10], a hierarchical digital watermarking is discussed.…”
Section: Introductionmentioning
confidence: 99%