2015
DOI: 10.1007/s11042-015-3018-2
|View full text |Cite
|
Sign up to set email alerts
|

Authentication of images using Zernike moment watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…Pseudo-Zernike moments (PZM) are due to Pseudo-Zernike polynomials and these are complex-valued polynomials which are orthogonal sets defined within the unit circle's interior x 2 + y 2 > =1 [33,49]. The polynomials set is represented by P nm (x,y)} and it is given as, where, ρ sqrt(x 2 + y 2 ), θ = tan−1(y/x).…”
Section: Pseudo-zernike Momentsmentioning
confidence: 99%
See 1 more Smart Citation
“…Pseudo-Zernike moments (PZM) are due to Pseudo-Zernike polynomials and these are complex-valued polynomials which are orthogonal sets defined within the unit circle's interior x 2 + y 2 > =1 [33,49]. The polynomials set is represented by P nm (x,y)} and it is given as, where, ρ sqrt(x 2 + y 2 ), θ = tan−1(y/x).…”
Section: Pseudo-zernike Momentsmentioning
confidence: 99%
“…Most semi-fragile watermarking systems use Zernike moments-based feature vectors for tamper localization and recovery [40]. Some use edge features and Zernike features for the same [49]. Using semi-fragile watermarking and error-locating codes in the DWT domain, we offer an approach for localizing image tampering in this paper.…”
Section: Introductionmentioning
confidence: 99%
“…From the study conducted on the existing watermarking based authentication schemes [7,10,15,16,18,21,24,33,35,38], it is observed that the host image is modified to embed the watermark which degrades its visual quality. Also, to retrieve the watermark from the marked image, watermark extraction algorithm is followed, that increases the computation cost of the scheme.…”
Section: Motivation For the Proposed Workmentioning
confidence: 99%
“…Unlike the existing authentication schemes [24,15,7,21,10,18,16] based on watermarking, the watermark is not embedded inside the host image, but it is used to construct shares. This makes it very difficult to detect or recover the watermark from marked image, thereby making the scheme more secure.…”
Section: Construction Of Sharesmentioning
confidence: 99%
“…The authors of the work [95] propose a scheme of image authentication using a semi-fragile watermarking system.…”
mentioning
confidence: 99%