2020
DOI: 10.22266/ijies2020.1031.18
|View full text |Cite
|
Sign up to set email alerts
|

Blind Robust and Self-Embedding Fragile Image Watermarking for Image Authentication and Copyright Protection with Recovery Capability

Abstract: This paper proposes a dual watermarking scheme that can integrate the functions of authentication, copyright protection, and image recovery in the same cover image. The robust watermarking utilizes a single watermark using the discrete cosine transform (DCT) domain for copyright protection, while the fragile scheme utilizes two self-embedding watermarks in a spatial domain for authenticating and restoring digital image content. The mechanism of the two schemes is carried out sequentially and uses a block-based… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 22 publications
(51 reference statements)
0
10
0
1
Order By: Relevance
“…The scheme performed competitively in terms of imperceptibility and robustness. Authors of [20] a multipurpose watermarking scheme that serves for authentication, image recovery, and copyright protection, also the scheme utilizes the embedding of multi watermarks one for robustness purpose and the others for both authentication and restoration of the digital image. The robust watermark embedding uses the intermediate coefficients quotative property besides an adaptive selection for encoding strength in order to achieve balance between transparency and robustness.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The scheme performed competitively in terms of imperceptibility and robustness. Authors of [20] a multipurpose watermarking scheme that serves for authentication, image recovery, and copyright protection, also the scheme utilizes the embedding of multi watermarks one for robustness purpose and the others for both authentication and restoration of the digital image. The robust watermark embedding uses the intermediate coefficients quotative property besides an adaptive selection for encoding strength in order to achieve balance between transparency and robustness.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The authors [17] present a dual watermarking technique capable of integrating authentication, copyright protection, and image recovery functionalities into a single cover image. The robust scheme protects against copyright infringement by utilizing a single watermark in the discrete cosine transform (DCT) domain, whereas the fragile scheme protects against copyright infringement by utilizing two self-embedding watermarks in a spatial domain for authenticating and restoring digital image content.…”
Section: A Integrity and Authentication Of Digital Imagesmentioning
confidence: 99%
“…Some of those techniques such as Least Significant Bit (LSB) [30,31], bit-plane index manipulation [32], Fibonacci-like employing bit-plane(s) mapping [33], and the early introduced Difference Expansion (DE) [34] have become fundamental for the development of new techniques such as FCM Clustering [35], Generalized Difference Expansion (GDE) [20], Least Significant Digit (LSD) [36], Pixel Value Modification (PVD) [37] and Prediction Error Expansion (PEE) [29,38]. Some of these techniques can also be further enhanced with optimization methods; some also proposed a data hiding scheme with an encrypted image [39], watermarking encryption [40] or fragile watermarking for the authentication purpose [41].…”
Section: Data Hiding Techniquesmentioning
confidence: 99%