2020
DOI: 10.1007/s11042-020-09132-w
|View full text |Cite
|
Sign up to set email alerts
|

An effective image self-recovery based fragile watermarking using self-adaptive weight-based compressed AMBTC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 34 publications
0
6
0
Order By: Relevance
“…Scheme in [4] 37.9 dB [26,29] dB α < 59% Scheme in [7] 37.9 dB 40.7 dB α < 24% Scheme in [10] 51.3 dB [24,36] dB α < 50% Scheme in [18] 37.9 dB +∞ α < 26% Scheme in [23] [37.92, 54.13] dB [28.63, 46.98] dB α < 50% Scheme in [28] 49.76 dB 34.65 dB α < 50% Proposed Scheme 46.8 dB [32,42] dB α < 50%…”
Section: Condition Of Recoverymentioning
confidence: 99%
See 1 more Smart Citation
“…Scheme in [4] 37.9 dB [26,29] dB α < 59% Scheme in [7] 37.9 dB 40.7 dB α < 24% Scheme in [10] 51.3 dB [24,36] dB α < 50% Scheme in [18] 37.9 dB +∞ α < 26% Scheme in [23] [37.92, 54.13] dB [28.63, 46.98] dB α < 50% Scheme in [28] 49.76 dB 34.65 dB α < 50% Proposed Scheme 46.8 dB [32,42] dB α < 50%…”
Section: Condition Of Recoverymentioning
confidence: 99%
“…To solve such problems, fragile watermarking has been proposed . Additionally, traditional cryptographic schemes have been applied [26][27][28]. Fragile watermarking is a method that exposes changes in the image content by identifying variations in the information of embedded watermark bits.…”
Section: Introductionmentioning
confidence: 99%
“…In [29][30][31], they proposed a fragile watermarking technique based on Block Truncation Coding (BTC). In this method, the bitstream compressed with BTC [32] or AMBTC [33] of the original image was hidden in the LSB and 2LSB of the cover image to store the features of the original image.…”
Section: Introductionmentioning
confidence: 99%
“…The error rate of tamper detection using the XOR operation between the bitmap of each block and the binary random number may higher than that of using the decimal number. Chang et al [31] proposed a method to improve the quality of marked images by enhancing the compression performance of AMBTC encoding bits for the original image.…”
Section: Introductionmentioning
confidence: 99%
“…With the rapid development of the Internet and digital processing technologies, the ownership protection of digital content, such as an image, audio, videos, and so on, has become a crucial issue. As an important research topic, various approaches are employed, i.e., data hiding [1][2][3][4][5] and watermarking techniques [6][7][8][9][10][11][12][13], to protect the legal owner and protect digital data from illegal manipulations. The main objectives of the above approaches can be achieved by concealing watermarks, such as a company's brand logo or an owner's personal signature, in the original content, so that the authenticated owners can claim their ownership of the digital content by successfully extracting the hidden watermark.…”
Section: Introductionmentioning
confidence: 99%