2021
DOI: 10.9734/ajrcos/2021/v9i330224
|View full text |Cite
|
Sign up to set email alerts
|

Image Authentication Based on Watermarking Approach: Review

Abstract: Digital image authentication techniques have recently gained a lot of attention due to their importance to a large number of military and medical applications, banks, and institutions, which require a high level of security. Generally, digital images are transmitted over insecure media, such as the Internet and computer networks of various kinds. The Internet has become one of the basic pillars of life and a solution to many of the problems left by the coronavirus. As a result, images must be protected from at… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 43 publications
0
7
0
Order By: Relevance
“…The performance of the different digital image watermarking approaches depends on the domain in which they are being implemented. Based on the working domain, digital image watermarking algorithms can be classified into three groups: spatial domain watermarking, transform or frequency domain watermarking, and hybrid domain watermarking [8].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The performance of the different digital image watermarking approaches depends on the domain in which they are being implemented. Based on the working domain, digital image watermarking algorithms can be classified into three groups: spatial domain watermarking, transform or frequency domain watermarking, and hybrid domain watermarking [8].…”
Section: Related Workmentioning
confidence: 99%
“…• Root Mean-Squared Error (RMSE): It is a quality assessment metric that is used for the error magnitude evaluation. It is derived by simply square rooting the MSE as illustrated in equation (8).…”
Section: Imperceptibilitymentioning
confidence: 99%
“…The performance of the different digital image watermarking approaches depends on the domain in which they are being implemented. Based on the working domain, digital image watermarking algorithms can be classified into three groups: spatial domain watermarking, transform or frequency domain watermarking, and hybrid domain watermarking [6].…”
Section: Related Workmentioning
confidence: 99%
“…In authentication, a visual identification of the decrypted image is not required and the nonlinear correlation between decrypted and the original image can be used for verification. This can confuse the attacker and enhance the security of the cryptographic systems [26,[33][34][35]. Thereafter, a variety of encryption and authentication algorithms based on sparsity have been proposed, and most of them are based on the framework of DRPE [23,27,36,37].…”
Section: Introductionmentioning
confidence: 99%
“…Thereafter, a variety of encryption and authentication algorithms based on sparsity have been proposed, and most of them are based on the framework of DRPE [23,27,36,37]. Researchers also proposed a multi-image encryption and authentication algorithm based on the optical interference induced by binary random masks (BRMs) [23,29,34,37]. Various authentication and encryption algorithms have been developed using the PTFT, polarization lights, ghost imaging, compressive sensing, joint transform correlation, ptychography, and sparse representation [23,25,32,[38][39][40][41][42][43].…”
Section: Introductionmentioning
confidence: 99%