RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      KCI등재 SCIE SCOPUS

      Fragile Watermarking Scheme Based on Wavelet Edge Features

      한글로보기

      https://www.riss.kr/link?id=A101086407

      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      다국어 초록 (Multilingual Abstract)

      This paper proposes a novel watermarking method to discover the tampers and localize it in digital image. The image which is to be used to generate a watermark is first wavelet decomposed and the edge feature from the sub bands of high frequency coeff...

      This paper proposes a novel watermarking method to discover the tampers and localize it in digital image. The image which is to be used to generate a watermark is first wavelet decomposed and the edge feature from the sub bands of high frequency coefficients are retrieved to generate a watermark (Edge Feature Image) and which is to be embed on the cover image. Before embedding the watermark, the pixels of cover image are disordered through the Arnold Transform and this helps to upgrade the security of the watermark. The embedding of generated edge feature image is done only on the Least Significant Bit (LSB) of the cover image. The invisibleness and robustness of the proposed method is computed using Peak-Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) and it proves that the proposed method delivers good results and the proposed method also detects and localizes the tampers efficiently. The invisibleness of proposed method is compared with the existing method and it proves that the proposed method is better.

      더보기

      목차 (Table of Contents)

      • Abstract
      • 1. Introduction
      • 2. Algorithms
      • 3. Proposed Method
      • 4. Results and Discussion
      • Abstract
      • 1. Introduction
      • 2. Algorithms
      • 3. Proposed Method
      • 4. Results and Discussion
      • 5. Conclusion
      • References
      더보기

      참고문헌 (Reference)

      1 M. Sui, "The medical volume data watermarking using arnold scrambling and 3D-DWT" 1120-1124, 2013

      2 R. C. -W. Phan, "Tampering with a watermarkingbased image authentication scheme" 41 : 3493-3496, 2008

      3 S. S. Bedi, "Robust watermarking of image in the transform domain using edge detection" 233-238, 2009

      4 D. Vaishnavi, "Robust and Invisible Image Watermarking in RGB Color Space Using SVD" 46 : 1770-1777, 2015

      5 S. Shivani, "Pattern Recognition and Image Analysis" Springer 640-647, 2013

      6 S. Shan, "Logistic map-based fragile watermarking" 2010 : 2010

      7 D. Vaishnavi, "Image Tamper Detection based on Edge Image and Chaotic Arnold Map" 8 : 548-555, 2015

      8 L. Sumalatha, "Image Content Authentication based on Wavelet Edge Features" 50 : 2012

      9 F. Di Martino, "Fragile Watermarking Tamper Detection with Images Compressed by Fuzzy Transform" 195 : 62-90, 2012

      10 D. Xiao, "An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and subblock post-processing" 285 : 2596-2606, 2012

      1 M. Sui, "The medical volume data watermarking using arnold scrambling and 3D-DWT" 1120-1124, 2013

      2 R. C. -W. Phan, "Tampering with a watermarkingbased image authentication scheme" 41 : 3493-3496, 2008

      3 S. S. Bedi, "Robust watermarking of image in the transform domain using edge detection" 233-238, 2009

      4 D. Vaishnavi, "Robust and Invisible Image Watermarking in RGB Color Space Using SVD" 46 : 1770-1777, 2015

      5 S. Shivani, "Pattern Recognition and Image Analysis" Springer 640-647, 2013

      6 S. Shan, "Logistic map-based fragile watermarking" 2010 : 2010

      7 D. Vaishnavi, "Image Tamper Detection based on Edge Image and Chaotic Arnold Map" 8 : 548-555, 2015

      8 L. Sumalatha, "Image Content Authentication based on Wavelet Edge Features" 50 : 2012

      9 F. Di Martino, "Fragile Watermarking Tamper Detection with Images Compressed by Fuzzy Transform" 195 : 62-90, 2012

      10 D. Xiao, "An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and subblock post-processing" 285 : 2596-2606, 2012

      11 C. -C. Chang, "A secure fragile watermarking scheme based on chaos-and-hamming code" 84 : 1462-1470, 2011

      12 W. -C. Chen, "A fuzzy c-means clustering-based fragile watermarking scheme for image authentication" 36 : 1300-1307, 2009

      13 D. Zhang, "A contour-based semifragile image watermarking algorithm in DWT domain" 3 : 228-231, 2010

      14 S. Rawat, "A chaotic system based fragile watermarking scheme for image tamper detection" 65 : 840-847, 2011

      15 D. M. N. G. P, "A Novel Fragile Watermarking Scheme For Image Tamper Detection Using K Mean Clustering" 4 : 3380-3385, 2013

      더보기

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      주제

      연도별 연구동향

      연도별 활용동향

      연관논문

      연구자 네트워크맵

      공동연구자 (7)

      유사연구자 (20) 활용도상위20명

      인용정보 인용지수 설명보기

      학술지 이력

      학술지 이력
      연월일 이력구분 이력상세 등재구분
      학술지등록 한글명 : Journal of Electrical Engineering & Technology(JEET)
      외국어명 : Journal of Electrical Engineering & Technology
      2023 평가예정 해외DB학술지평가 신청대상 (해외등재 학술지 평가)
      2020-01-01 평가 등재학술지 유지 (해외등재 학술지 평가) KCI등재
      2011-01-01 평가 등재학술지 유지 (등재유지) KCI등재
      2009-01-01 평가 등재학술지 유지 (등재유지) KCI등재
      2006-01-01 평가 학술지 통합 (기타) KCI등재
      2006-01-01 평가 등재학술지 선정 (등재후보2차) KCI등재
      더보기

      학술지 인용정보

      학술지 인용정보
      기준연도 WOS-KCI 통합IF(2년) KCIF(2년) KCIF(3년)
      2016 0.45 0.21 0.39
      KCIF(4년) KCIF(5년) 중심성지수(3년) 즉시성지수
      0.37 0.34 0.372 0.04
      더보기

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼