SCIRP Mobile Website
Paper Submission

Why Us? >>

  • - Open Access
  • - Peer-reviewed
  • - Rapid publication
  • - Lifetime hosting
  • - Free indexing service
  • - Free promotion service
  • - More citations
  • - Search engine friendly

Free SCIRP Newsletters>>

Add your e-mail address to receive free newsletters from SCIRP.


Contact Us >>

WhatsApp  +86 18163351462(WhatsApp)
Paper Publishing WeChat
Book Publishing WeChat

Article citations


H. W. Lin and S. Q. Yang, “Watermark Algorithm for Color Image Authentication and Restoration,” Proceedings of IEEE International Conference on Electronic and Mechanical Engineering and Information Technology, 2011, pp. 2773-2776.

has been cited by the following article:

  • TITLE: Comparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication

    AUTHORS: Archana Tiwari, Manisha Sharma

    KEYWORDS: Image Authentication; Selective Authentication; Content Recovery; Robustness; Semifragile Watermarking; Tamper Detection; PSNR

    JOURNAL NAME: Journal of Information Security, Vol.3 No.3, July 25, 2012

    ABSTRACT: Technology has no limits today; we have lots of software available in the market by which we can alter any image. People usually copies image from the internet and after some changes they claim that these are their own properties. Insuring digital image integrity has therefore become a major issue. Over the past few years, watermarking has emerged as the leading candidate to solve problems of ownership and content authentications for digital multimedia documents. To protect authenticity of images semi fragile watermarking is very concerned by researchers because of its important function in multimedia content authentication. The aim of this paper is to present a survey and a comparison of emerging techniques for image authentication using semifragile watermarking. In present paper comprehensive overview of insertion and extraction methods used in different semi fragile water marking algorithm are studied using image parameters, potential application, different algorithms are described and focus is on their comparison according to the properties cited above and future directions for developing a better image authentication algorithm are suggested.