Abstract
Digital image watermarking .
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Walton, S. (1995). Information authentication for a slippery new age. Dr. Dobbs Journal, 20(4), 18–26.
Chang, C. C., Hu, Y. S., & Lu, T. C. (2006). A watermarking-based image ownership and tampering authentication scheme. Pattern Recognition Letters, 27(5), 439–446.
Chen, W. C., & Wang, M. S. (2009). A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Systems with Applications, 36, 1300–1307.
El Bakrawy, L.M., Ghali, N.I., Kim, T.-H., Hassanien, A.E. (2011), A block-wise-based fragile watermarking hybrid approach using rough sets and exponential particle swarm optimization. International Journal of Future Generation Communication and Networking, 4(4), 77–88.
Fridrich, J. (1999). A hybrid watermark for tamper detection in digital images. Fifth International Symposium on Signal Processing and its Applications (ISSPA). https://doi.org/10.1109/ISSPA.1999.818172.
Deguillaume, F., Voloshynovskiy, S., & Pun, T. (2003). Secure hybrid robust watermarking resistant against tampering and copy attack. Signal Processing, Elsevier, 83(2003), 2133–2170.
Phen, L. L., Hsiehb, C.-K., & Huangb, P.-W. (2005). A hierarchical digital watermarking method for image tampers detection and recovery. Pattern Recognition, 38(12), 2519–2528.
Azeroual, A., & Afdel, K. (2017). Real-time image tamper localization based on fragile watermarking and Faber-Schauder wavelet. AEU—International Journal of Electronics and Communications, 79, 207–218.
Manikandan, V.M., & Masilamani, V. (2016). A context dependent fragile watermarking scheme for tamper detection from demosaicked color images. In ICVGIP ‘16 Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing. Article No. 61. https://doi.org/10.1145/3009977.3009987.
Wolfgang, R.B., & Delp, E.J. (1996). A watermark for digital images. In Proceedings of IEEE International Conferences on Image Processing (Vol. III, pp. 219–222). IEEE Press.
Wong, P. W., & Memon, N. (2001). Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing, 10(10), 1593–1601.
Di Martino, F., & Sessa, S. (2012). Fragile watermarking tamper detection with images compressed by fuzzy transform. Information Sciences, 195, 62–90.
Di Martino, F., & Sessa, S. (2019). Fragile watermarking tamper detection via bilinear fuzzy relation equations. Journal of Ambient Intelligence and Humanized Computing, 10(5), 2041–2061.
Li, J. X. (1992). A new algorithm for the greatest solution of fuzzy bilinear equations. Fuzzy Sets and Systems, 46, 193–210.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Di Martino, F., Sessa, S. (2020). Fuzzy Transforms for Image Watermarking and Image Autofocus. In: Fuzzy Transforms for Image Processing and Data Analysis. Springer, Cham. https://doi.org/10.1007/978-3-030-44613-0_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-44613-0_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-44612-3
Online ISBN: 978-3-030-44613-0
eBook Packages: Computer ScienceComputer Science (R0)