Subject
Electrical and Electronic Engineering,Signal Processing,Artificial Intelligence,Applied Mathematics,Computer Vision and Pattern Recognition,Statistics, Probability and Uncertainty,Computational Theory and Mathematics
Reference30 articles.
1. Security of fragile authentication watermarks with localization;Fridrich,2002
2. Hierarchical watermarking for secure image authentication with localization;Celik;IEEE Trans. Image Process.,2002
3. Wavelet-based fragile watermarking scheme for image authentication;Li;J. Electron. Imaging,2007
4. Two-layer fragilewatermarking method for enhanced tampering localisation;Bravo-Solorio,2012
5. Fragile image watermarking scheme based on VQ index sharing and self-embedding;Qin;Multimed. Tools Appl.,2017
Cited by
39 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. C3MW: A novel comprehensive-monitoring-motivated multi-model watermarking scheme for tamper detection and self-recovery;Journal of King Saud University - Computer and Information Sciences;2023-10
2. Tampering localization and self-recovery using block labeling and adaptive significance;Expert Systems with Applications;2023-09
3. BHI: Embedded invisible watermark as adversarial example based on Basin-Hopping improvement;Information Sciences;2023-09
4. Hadamard based watermarking using structural correlation average;THE 6TH INTERNATIONAL CONFERENCE ON ENERGY, ENVIRONMENT, EPIDEMIOLOGY AND INFORMATION SYSTEM (ICENIS) 2021: Topic of Energy, Environment, Epidemiology, and Information System;2023
5. Watermarking Scheme With Bounded-Exhaustive Self-Recovery Approach;2022 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC);2022-11-09