2014
DOI: 10.1016/j.image.2014.09.001
|View full text |Cite
|
Sign up to set email alerts
|

An effective SVD-based image tampering detection and self-recovery using active watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
41
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 96 publications
(42 citation statements)
references
References 16 publications
0
41
0
1
Order By: Relevance
“…(1) For the blocks whose 2 LSBs are embedded by 8 bits watermark information, the expectation value of MSE is 1.5 2 , then the PSNR's expectation can be computed by: PSNR = 10 log 10 ( 255 2 1.5 2 ) = 44.61 (dB), (12) (2) For the blocks whose 3 LSBs are embedded by 12 bits watermark information, the expectation value of MSE is 3.5 2 , then the PSNR's expectation is calculated by: PSNR = 10 log 10 ( 255 2 3.5 2 ) = 37.25 (dB), (13) In practical application, if the PSNR value of a processed image is larger than 35 dB, people cannot tell the difference between the original image and its processed version. Table 2 gives the analysis of watermark imperceptibility for the test images shown in Figure 5.…”
Section: Imperceptibility Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…(1) For the blocks whose 2 LSBs are embedded by 8 bits watermark information, the expectation value of MSE is 1.5 2 , then the PSNR's expectation can be computed by: PSNR = 10 log 10 ( 255 2 1.5 2 ) = 44.61 (dB), (12) (2) For the blocks whose 3 LSBs are embedded by 12 bits watermark information, the expectation value of MSE is 3.5 2 , then the PSNR's expectation is calculated by: PSNR = 10 log 10 ( 255 2 3.5 2 ) = 37.25 (dB), (13) In practical application, if the PSNR value of a processed image is larger than 35 dB, people cannot tell the difference between the original image and its processed version. Table 2 gives the analysis of watermark imperceptibility for the test images shown in Figure 5.…”
Section: Imperceptibility Analysismentioning
confidence: 99%
“…In addition, the recovered image could be further used for the subsequent image processing. In fragile watermarking scheme with recovery ability, the recovery information for an image block is usually a content representation of the block, like average pixel value [12,13], vector quantization (VQ) index [14], the discrete cosine transform (DCT) coefficients [15,16], etc.…”
Section: Introductionmentioning
confidence: 99%
“…Due to these properties, SVD has been gradually applied in digital watermarking schemes [16][17][18]. Taking N = 4 for example, the SVD can be rewritten as …”
Section: Singular Value Decomposition (Svd)mentioning
confidence: 99%
“…As digital media is becoming an ever-more integral part of daily life, digital image, audio, and video are increasingly being presented in courts of law as evidence of criminal activity or wrongdoing [1]. However, the authenticity of a given digital image has become more difficult to validate, as a consequence of the drastic changes in the production, editing and dissemination of digital image.…”
Section: Introductionmentioning
confidence: 99%