2007 IEEE International Symposium on Signal Processing and Information Technology 2007
DOI: 10.1109/isspit.2007.4458195
|View full text |Cite
|
Sign up to set email alerts
|

Tamper Detection with Self-Correction Hybrid Spatial-DCT Domains Image Authentication Technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 29 publications
0
9
0
Order By: Relevance
“…Semi-fragile and fragile watermarks are being used to carry much information about itself, its owner's metadata, its distribution, etc., and are thus used for annotation (e.g., hiding ETR or EPR, etc.) [15,55,57,61,65,87] and integrity control (e.g., tamper detection and recovery) [8,59,[88][89][90].…”
Section: Choice Of Design and Evaluation Parametersmentioning
confidence: 99%
See 1 more Smart Citation
“…Semi-fragile and fragile watermarks are being used to carry much information about itself, its owner's metadata, its distribution, etc., and are thus used for annotation (e.g., hiding ETR or EPR, etc.) [15,55,57,61,65,87] and integrity control (e.g., tamper detection and recovery) [8,59,[88][89][90].…”
Section: Choice Of Design and Evaluation Parametersmentioning
confidence: 99%
“…A digital medical image application is therefore one of the prospective target areas of using digital watermarking. Studies show that various watermarking schemes can be used in teleradiology for (1) origin/content authentication [9,13,41,107,[113][114][115][116][117][118][119], (2) EPR annotation [57,65,88,[120][121][122], and (3) tamper detection and recovery of medical images [8,14,59,123,124]. Some important aspects of medical image watermarking schemes for their different objectives are summarized below.…”
Section: Objectives and Applications Of Watermarking For Medical Imagesmentioning
confidence: 99%
“…However, the LSB based self-restoration watermark is fragile and could be easily distorted. To reduce the size of the restoration watermark and to improve the robustness, Region of Interest (ROI) self-restoration schemes were proposed in [10,11]. The two restoration schemes were shown more robust against JPEG compression.…”
Section: Introductionmentioning
confidence: 99%
“…Watermarking, on the other hand, is an image authentication/protection technique that embeds invisible information into an image. Unfortunately, most of the existing watermarking and digital signature based image authentication systems can detect malicious tampering successfully; however there are few system that have recovery capability the tampered region without original image [6], [7]. In [6], a Slant Transform (SLT) based semi-fragile watermarking scheme is proposed.…”
Section: Introductionmentioning
confidence: 99%
“…Authors compressed the image using SLT, and the compressed data is replaced by LSB of the image. In [7], both fragile and semi-fragile watermarks are embedded in spatial and frequency domains, respectively.…”
Section: Introductionmentioning
confidence: 99%