2018
DOI: 10.3390/app8040548
|View full text |Cite
|
Sign up to set email alerts
|

A Self-Recovery Fragile Image Watermarking with Variable Watermark Capacity

Abstract: Currently, the watermark capacity of most self-recovery fragile image watermarking schemes is fixed. That means for smooth regions and texture regions, the length of watermark information is always the same. However, it is impractical since more recovery information is needed for the recovery of texture regions. In this paper, a self-recovery fragile image watermarking with variable watermark capacity is proposed. Based on the characteristic of singular value decomposition (SVD), a new block classification met… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
38
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(38 citation statements)
references
References 37 publications
0
38
0
Order By: Relevance
“…The types of attacks include collage attacks and large general tampering. We also compared the performance with the existing block-based approach [1,2,5,9]. All simulation environments were MATLAB R2018b.…”
Section: Experimental Results and Performance Analysismentioning
confidence: 99%
See 3 more Smart Citations
“…The types of attacks include collage attacks and large general tampering. We also compared the performance with the existing block-based approach [1,2,5,9]. All simulation environments were MATLAB R2018b.…”
Section: Experimental Results and Performance Analysismentioning
confidence: 99%
“…Thus, for the mapping sequence, the most significant thing is to ensure the existence of the recovery information under the condition of a large tampering ratio. In [1,9,12], the 1-D transform algorithm was used to build the blocks relationship mapping function. Although the sequence is random, the remainder of the elements in the same column are equal, and the performance in the face of column tampering is poor.…”
Section: Block Mappingmentioning
confidence: 99%
See 2 more Smart Citations
“…The scheme is not dependent on using external metadata. In [26], binary pseudo-random sequences were used to encrypt the watermark before embedding, enhancing the security of the watermarking algorithm. The security requirement can be applied in telemedicine, digital imaging, telecommunications, multimedia data, etc.…”
Section: Securitymentioning
confidence: 99%