Watermarking for tamper detection and recovery

11Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

The goal of this paper is to detect and recover the tampered regions of the digital image. To achieve this goal, the LSB and the second LSB of the spatial domain was selected to embed the watermark. In particular, the watermark consists of three parts: 1) recovery code made by the small sized image of the original, 2) verification code made by the variance value of a block (4 × 4) in the original image (only six MSBs, 1st∼ 6th MSB) and 3) owner code made by a binary logo image. By using this special watermark, we can detect and recover the tampered regions. © IEICE 2008.

Cite

CITATION STYLE

APA

Park, Y., Kang, H., Yamaguchi, K., & Kobayashi, K. (2008). Watermarking for tamper detection and recovery. IEICE Electronics Express, 5(17), 689–696. https://doi.org/10.1587/elex.5.689

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free