2017
DOI: 10.1016/j.image.2017.07.001
|View full text |Cite
|
Sign up to set email alerts
|

An efficient reversible image authentication method using improved PVO and LSB substitution techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(22 citation statements)
references
References 37 publications
0
22
0
Order By: Relevance
“…For the first trio, because b 1 − a 1 = 39 − 23 = 16 ≤ T, we embed 16 bits into the bitmap B 1 by replacing B 1 with the first 16 bits 0010001001100000 2 of S. Since the bitmap is replaced, a pair of quantization levels (â 1 ,b 1 ) has to find such that the distortion due to the bitmap replacement is the smallest.â 1 = 31 andb 1 = 23 can be obtained by solving Equation (6) the embedding parameters used, and the required reference table 16 R is shown in Figure 2. In this example, the bitmap is capable of carrying 16 bits while the pair of quantization levels are able to carry 2 log 16 4 = bits.…”
Section: A Simple Examplementioning
confidence: 99%
See 2 more Smart Citations
“…For the first trio, because b 1 − a 1 = 39 − 23 = 16 ≤ T, we embed 16 bits into the bitmap B 1 by replacing B 1 with the first 16 bits 0010001001100000 2 of S. Since the bitmap is replaced, a pair of quantization levels (â 1 ,b 1 ) has to find such that the distortion due to the bitmap replacement is the smallest.â 1 = 31 andb 1 = 23 can be obtained by solving Equation (6) the embedding parameters used, and the required reference table 16 R is shown in Figure 2. In this example, the bitmap is capable of carrying 16 bits while the pair of quantization levels are able to carry 2 log 16 4 = bits.…”
Section: A Simple Examplementioning
confidence: 99%
“…In this section, the embedding performance of the proposed method is compared with other recently published methods, including Huang 16, respectively, to accommodate the given payload. In Ou and Sun's method, the lossless embedding is also implemented to achieve the best performance.…”
Section: Comparison With Previous Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…In recent years, researchers have been focusing more on image-splicing localization and achieved promising results [7] thanks to the advances in machine learning and deep learning [8][9][10]. Tampered regions of grayscale images were localized by different image-authentication techniques [11,12]. In Reference [6], a convolutional neural network (CNN)-based algorithm was proposed to extract features capturing characteristic traces from different camera models.…”
Section: Introductionmentioning
confidence: 99%
“…Weng et al [11] improved PVO method through embedding data adaptively into each block according to a local complexity analysis. Apart from the above methods, there are some other research directions of RDH, such as RDH in encrypted domain [12][13][14], RDH for JPEG images [15,16], RDH for RGB color images [17,18], RDH with the capability of image integrity authentication [19,20], RDH with image enhancement [21,22], and RDH with dual-image mechanism [23][24][25][26][27][28][29][30][31][32].…”
Section: Introductionmentioning
confidence: 99%