Qin et al., 2016 - Google Patents
Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding modeQin et al., 2016
- Document ID
- 13646178378364921769
- Author
- Qin C
- Wang H
- Zhang X
- Sun X
- Publication year
- Publication venue
- Information sciences
External Links
Snippet
In this paper, we propose a novel self-embedding fragile image watermarking scheme for tampering recovery based on reference-data interleaving mechanism and adaptive selection of embedding mode. During watermark embedding, reference bits are derived …
- 230000003044 adaptive 0 title abstract description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0071—Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0051—Embedding of the watermark in the spatial domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0061—Embedding of the watermark in each block of the image, e.g. segmented watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0083—Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/3232—Robust embedding or watermarking
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Qin et al. | Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode | |
| Singh et al. | Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability | |
| Qin et al. | Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy | |
| Bhalerao et al. | A secure image watermarking for tamper detection and localization | |
| Rakhmawati et al. | A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability | |
| Rawat et al. | A chaotic system based fragile watermarking scheme for image tamper detection | |
| Lee et al. | Dual watermark for image tamper detection and recovery | |
| Kim et al. | Reversible data hiding exploiting spatial correlation between sub-sampled images | |
| Celik et al. | Hierarchical watermarking for secure image authentication with localization | |
| Wang et al. | A majority-voting based watermarking scheme for color image tamper detection and recovery | |
| Qin et al. | Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism | |
| Yang et al. | Recover the tampered image based on VQ indexing | |
| Rajput et al. | Image tamper detection and self-recovery using multiple median watermarking | |
| Cao et al. | Hierarchical recovery for tampered images based on watermark self-embedding | |
| Huo et al. | Alterable-capacity fragile watermarking scheme with restoration capability | |
| Swaraja et al. | Hierarchical multilevel framework using RDWT-QR optimized watermarking in telemedicine | |
| Bravo-Solorio et al. | Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities | |
| Zhang et al. | Self-embedding fragile watermarking based on DCT and fast fractal coding | |
| Prasad et al. | A secure fragile watermarking scheme for protecting integrity of digital images | |
| Singh et al. | An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection | |
| Ernawan et al. | A blind recovery technique with integer wavelet transforms in image watermarking | |
| Wu et al. | A simple image tamper detection and recovery based on fragile watermark with one parity section and two restoration sections | |
| Singh et al. | An efficient self-embedding fragile watermarking scheme for image authentication with two chances for recovery capability | |
| Li et al. | A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure | |
| Shen et al. | A self-embedding fragile image authentication based on singular value decomposition |