2017
DOI: 10.1016/j.aeue.2017.05.027
|View full text |Cite
|
Sign up to set email alerts
|

Watermarking based image authentication and tamper detection algorithm using vector quantization approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(9 citation statements)
references
References 20 publications
0
8
0
1
Order By: Relevance
“…To improve the quality of the watermarked image and the accuracy of tampering location, Tiwari et al [13] proposed a new watermarking algorithm for image authentication based on the vector quantization method. The watermark in the algorithm includes a robust zero-level watermark and a semi-fragile watermark.…”
Section: Spatial Domainmentioning
confidence: 99%
See 1 more Smart Citation
“…To improve the quality of the watermarked image and the accuracy of tampering location, Tiwari et al [13] proposed a new watermarking algorithm for image authentication based on the vector quantization method. The watermark in the algorithm includes a robust zero-level watermark and a semi-fragile watermark.…”
Section: Spatial Domainmentioning
confidence: 99%
“…For semi-fragile watermarking algorithms in spatial domains, the pixels of digital images are processed directly to achieve the purpose of embedding watermarking information [10][11][12][13][14]. For example, some algorithms embed the watermarking information into the least significant bit (LSB) in the image pixels directly [11,12].…”
Section: Spatial Domainmentioning
confidence: 99%
“…Most of the methods differentiate in two major watermark components: authentication/check bits and recovery bits. For tamper recovery, the watermark generation which is selected using the frequency domain [2,42,56] has better results than the watermark generation using spatial domains [5,14,16], i.e. average intensity of blocks.…”
Section: Comparison and Discussionmentioning
confidence: 99%
“…However, it cannot withstand mild distortions such as random noise and JPEG compression; another disadvantage is the possibility of detection errors because the blocks used are too large, so that if one sub-block is damaged then the entire block will be marked as an error. In method [56], all extracted watermark data contribute to the recovery of content, and the accuracy of the restoration coefficient depends on the amount of available watermark data. Furthermore, the paper [44] aims to show that having a known fault location, image damage can be modelled and handled as a deletion error.…”
Section: Comparison and Discussionmentioning
confidence: 99%
“…A quantização vetorial (QV) [1], [2], que pode ser vista como uma extensão da quantização escalar em um espaço multidimensional, tem sido utilizada em diversos sistemas de processamento digital de sinais, com um amplo espectro de aplicações, dentre as quais podem ser citadas: compressão de sinais médicos [3], reconhecimento de padrões [4], compressão de voz [5], compressão de imagem [6], esteganografia e marca d'água digital [7], [8].…”
Section: Introductionunclassified