2020
DOI: 10.1007/s12559-019-09700-9
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Semi-fragile Watermarking Method for Image Authentication Based on Lifting Wavelet Transform and Feed-Forward Neural Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(10 citation statements)
references
References 44 publications
0
9
0
Order By: Relevance
“…Here, the BPFNN network is fed with an input having π‘›π‘’π‘šπ‘’π‘™(𝐸 πΏπ‘œπ‘ ) elements. For a compromise between complexity and performance, the size of π‘›π‘’π‘šπ‘’π‘™(𝐸 πΏπ‘œπ‘ )] was set within [6][7][8]. Here, the BFNN unit takes place in two stages:…”
Section: The Bpfnn Neural Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…Here, the BPFNN network is fed with an input having π‘›π‘’π‘šπ‘’π‘™(𝐸 πΏπ‘œπ‘ ) elements. For a compromise between complexity and performance, the size of π‘›π‘’π‘šπ‘’π‘™(𝐸 πΏπ‘œπ‘ )] was set within [6][7][8]. Here, the BFNN unit takes place in two stages:…”
Section: The Bpfnn Neural Networkmentioning
confidence: 99%
“…Robust watermarking can be utilized for copyright protection [5], where it is designed to resist any anticipated attacks that attempt to destroy or remove the watermark. Semi-fragile watermarking has the main feature of reconstructing tampered information, which allows a certain degree of robustness against various attacks [7]. Methods based on fragile watermarking are very sensitive to even minor modifications and are concerned with the integrity protection [6].…”
Section: Introductionmentioning
confidence: 99%
“…The test results show the validity in terms of imperceptibility and performance of the proposed approach to secure and robust assaults. B. Bolourian Haghighi & et al [70], proposes a novel watermarking technique focused on (LWT) and (FNN) to detect and restore manipulation by hiding half-fragile data. The proposed approach outperforms similar works in terms of dominance, performance, and efficacy for applications including tamper detection and recovery.…”
Section: Extensive Research On Fragile Watermark As Follow;mentioning
confidence: 99%
“…But the most important DCT, DWT, and SVD technologies are used with hybrid methods for more image security. It should be noted that the robustness of data rates and imperceptibility also needs to be handled and that the optimal swap will depend on the application [43,64,[68][69][70]73].…”
Section: Assessments and Recommenda-tionsmentioning
confidence: 99%
“…From the experimental results, it is noted that the method provides better performance in terms of security, quality and robustness; however, the complexity and cost are high. Haghighi et al [27] implemented LWT, DCT and a feed-forward neural network-based semi-fragile scheme for temper detection and recovery. Using the inverse halftoning technique, the tempered regions are identi ed in the recovery stage.…”
Section: Related Workmentioning
confidence: 99%