2019
DOI: 10.1049/iet-ipr.2018.5814
|View full text |Cite
|
Sign up to set email alerts
|

Accommodative extractor for QIM‐based watermarking schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…The hash values of class Ci are calculated as HCi = H(Ci) (i = 1, 2 … n), where H is taken as a hash function [49]. Two contiguous class hash values are grouped and computed simultane- Figure 2 shows the flow of operations in the designed mechanism, which executes the system and consists of five major constituents: LSB replacement watermarking mechanism [46], accommodative extractor [47], watermark validator [48], packet builder, and positional details. The transmitting data is classified into data classes C i (i = 1, 2 .…”
Section: Discussionmentioning
confidence: 99%
“…The hash values of class Ci are calculated as HCi = H(Ci) (i = 1, 2 … n), where H is taken as a hash function [49]. Two contiguous class hash values are grouped and computed simultane- Figure 2 shows the flow of operations in the designed mechanism, which executes the system and consists of five major constituents: LSB replacement watermarking mechanism [46], accommodative extractor [47], watermark validator [48], packet builder, and positional details. The transmitting data is classified into data classes C i (i = 1, 2 .…”
Section: Discussionmentioning
confidence: 99%
“…Based on its objectives, image watermarking can be classified into three categories: robust, fragile and semi‐fragile watermarks [4]. The problem of authentication and integrity verification of digital images can be handled by using a fragile watermark.…”
Section: Introductionmentioning
confidence: 99%
“…Digital property management and especially counterfeit protection mostly depend on watermarking in a variety of environments [37][38][39]. Digital watermarking has been finding its applications in digital cinema in recent years [40,41].…”
Section: Introductionmentioning
confidence: 99%