2011 World Congress on Information and Communication Technologies 2011
DOI: 10.1109/wict.2011.6141229
|View full text |Cite
|
Sign up to set email alerts
|

Semi fragile watermarking using Gaussian mixture model for malicious image attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…Table 3 shows the results of false alarm rate and missing alarm rate. Form the results of table 3, the performance of our method is better than that of [ 9] and close to that of [3]. However, the watermarking of [3] is unconcerned with the image, so the original watermarking is required when authenticating.…”
Section: Experiments Of Comparing With Other Methodsmentioning
confidence: 82%
See 1 more Smart Citation
“…Table 3 shows the results of false alarm rate and missing alarm rate. Form the results of table 3, the performance of our method is better than that of [ 9] and close to that of [3]. However, the watermarking of [3] is unconcerned with the image, so the original watermarking is required when authenticating.…”
Section: Experiments Of Comparing With Other Methodsmentioning
confidence: 82%
“…We compare our method with the methods in [3] and [9], which perform better than most of semi-fragile watermarking algorithm. Table 3 shows the results of false alarm rate and missing alarm rate.…”
Section: Experiments Of Comparing With Other Methodsmentioning
confidence: 99%
“…Table 3 shows the results of false alarm rate and missing alarm rate. Form the results of table 3, the performance of our method is better than that of [ 9] and close to that of [3]. However, the watermarking of [3] is unconcerned with the image, so the original watermarking is required when authenticating.…”
Section: B Experiments Of Malicious Tampermentioning
confidence: 82%
“…C. Experiment of comparing with other methods We compare our method with the methods in [3] and [9], which perform better than most of semi-fragile watermarking algorithm. Table 3 shows the results of false alarm rate and missing alarm rate.…”
Section: B Experiments Of Malicious Tampermentioning
confidence: 99%
“…The ultimate result of a typical CNN network structure is often one or more fully-connected layers [17,18,19], however the network itself is typically composed of convolutional and pooling layers. The final output of the layer is obtained by applying a bias to fully connected layer and activation function.…”
Section: Proposed Modelmentioning
confidence: 99%