2015
DOI: 10.14257/ijmue.2015.10.5.08
|View full text |Cite
|
Sign up to set email alerts
|

Hop Horse-Image Authentication Scheme

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 25 publications
(25 reference statements)
0
1
0
Order By: Relevance
“…Huang et al [5] focus on medical images using specific EXIF metadata as watermark and BCH codes for the retrieval of the extracted data, performing the embedding into the middle frequency coefficients of each 8x8 pixel non-overlapped DCT block, resulting in an average PSNR value of 45dB; the authentication is performed by comparing modifications in the different extracted watermark strings. In [6], a spatial domain watermarking method is proposed, where the watermark is a hash generated from the histogram of the grayscale image, which is embedded directly into the pixels of the host image. Authentication is performed by comparing the embedded hash with the recalculated one; however, such a watermark is fragile, it is not robust against to some non-intentional or intentional attacks such as JPEG compression.…”
Section: Related Workmentioning
confidence: 99%
“…Huang et al [5] focus on medical images using specific EXIF metadata as watermark and BCH codes for the retrieval of the extracted data, performing the embedding into the middle frequency coefficients of each 8x8 pixel non-overlapped DCT block, resulting in an average PSNR value of 45dB; the authentication is performed by comparing modifications in the different extracted watermark strings. In [6], a spatial domain watermarking method is proposed, where the watermark is a hash generated from the histogram of the grayscale image, which is embedded directly into the pixels of the host image. Authentication is performed by comparing the embedded hash with the recalculated one; however, such a watermark is fragile, it is not robust against to some non-intentional or intentional attacks such as JPEG compression.…”
Section: Related Workmentioning
confidence: 99%