2005
DOI: 10.1109/tie.2004.841083
|View full text |Cite
|
Sign up to set email alerts
|

A Publicly Verifiable Copyright-Proving Scheme Resistant to Malicious Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
69
0
2

Year Published

2008
2008
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 109 publications
(71 citation statements)
references
References 19 publications
0
69
0
2
Order By: Relevance
“…In this paper we used the same original image and binary logo as [4] and [5] for better comparison. Fig.…”
Section: Applying Attacks To the Original Imagementioning
confidence: 99%
See 4 more Smart Citations
“…In this paper we used the same original image and binary logo as [4] and [5] for better comparison. Fig.…”
Section: Applying Attacks To the Original Imagementioning
confidence: 99%
“…Therefore, a new watermarking approach called zero-watermarking has been proposed in which the quality of the original image does not change, but the watermark is constructed by extracting features of the original image. Recently, a group of zero-watermarking methods have been introduced [4,5,6,8,9] that extract some binary features from the host image. Then by applying exclusive-or between these extracted features and the binary logo, a verification map is achieved.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations