2005
DOI: 10.1093/ietfec/e88-a.3.787
|View full text |Cite
|
Sign up to set email alerts
|

Wavelet-Based Semi-Fragile Watermarking with Tamper Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
10
0

Year Published

2006
2006
2013
2013

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 0 publications
0
10
0
Order By: Relevance
“…Ding et al [3] propose a semi-fragile watermarking scheme, which is a wavelet-based chaotic semi-fragile watermarking scheme with more JPEG compression tolerance.…”
Section: Fragile Watermarking Schemesmentioning
confidence: 99%
See 2 more Smart Citations
“…Ding et al [3] propose a semi-fragile watermarking scheme, which is a wavelet-based chaotic semi-fragile watermarking scheme with more JPEG compression tolerance.…”
Section: Fragile Watermarking Schemesmentioning
confidence: 99%
“…Many different watermarking schemes have already been proposed that can be divided in two general categories: those, which are robust watermarking [2], are robust for image processing operations and malicious attacks, and the others, are fragile watermarking schemes [3,4,5,6,7,8], which are very fragile to image tamper. For having a better understanding of what has already been proposed, we can also review more extensive surveys published [9,10].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…As a main type of the digital watermarking, the fragile watermarking is usually used for the content authentication of digital media. Digital watermarking has mostly been implemented either in the spatial domain [3][4][5][6] or transform domain [7][8][9]. However, these domains are not directly suitable for some applications where transformation is needed to compress the images.…”
Section: Introductionmentioning
confidence: 99%
“…For example, JPEG is one of the most popular standards for transmitting and storing images in compressed format in order to make an efficient use of the bandwidth and storage. Although some transform-domain schemes have been proposed to meet this requirement, it is observed that many of the schemes [7][8][9] watermarked only some selected coefficients while leaving most coefficients unprotected in order to minimize the embedding distortion [10]. Therefore, it is highly desirable that we develop data-hiding algorithms that work entirely in the compressed domain [11,12].…”
Section: Introductionmentioning
confidence: 99%