2013
DOI: 10.1007/978-3-642-37463-0_10
|View full text |Cite
|
Sign up to set email alerts
|

Self-embedding Pixel Wise Fragile Watermarking Scheme for Image Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…Once the RI for each 16 Γ— 16 non-overlapping block is generated, a reference matrix M as shown in Figure 6 is constructed according to Equation (9). This matrix acts as a reference table to embed recovery information RI into processed image I p .…”
Section: Embedding Strategymentioning
confidence: 99%
See 1 more Smart Citation
“…Once the RI for each 16 Γ— 16 non-overlapping block is generated, a reference matrix M as shown in Figure 6 is constructed according to Equation (9). This matrix acts as a reference table to embed recovery information RI into processed image I p .…”
Section: Embedding Strategymentioning
confidence: 99%
“…Early approaches to fragile watermarking only focused on locating tampered areas in a watermarked image. Later, in order to retain the usability of damaged images, some schemes were designed with recovery features to produce fragile watermarking [4][5][6][7][9][10][11][12]15,16,20,25]. Recovery information stored in nontampered image areas is used to repair the tampered areas as long as the tampered areas are localized.…”
Section: Introductionmentioning
confidence: 99%
“…[(π‘€π‘šπ‘˜ * (p 1 , p 2 ) βˆ’ π‘€π‘šπ‘˜ * )] 2 (11) here "wmk" "wmk * " signifies original and retrieved watermark images while 'π‘€π‘šπ‘˜'and 'π‘€π‘šπ‘˜ * ' denotes mean values of 'wmk' and 'wmk * ' respectively.…”
Section: 𝑁𝐢(π‘€π‘šπ‘˜ π‘€π‘šπ‘˜mentioning
confidence: 99%
“…Hence, this technique conveniently provides remote health monitoring facility. There are different kinds of approaches in which MIW can be easily carried out that is, spatial domain 10,11 and transform domain. 12,13 Transform domain approach is far better as compared to spatial domain in terms of robustness.…”
Section: Introductionmentioning
confidence: 99%
“…In fragile watermark any trivial modification in watermarked image leads to destroy the watermark. [1][2][3] Fragile watermark is used for image tamper detection due to its sensitivity for alteration in image. One type of the fragile watermarking approach divides a host image into small blocks, [4][5][6][7][8] and insert the fragile watermark into these blocks.…”
Section: Introductionmentioning
confidence: 99%