SCIRP Mobile Website
Paper Submission

Why Us? >>

  • - Open Access
  • - Peer-reviewed
  • - Rapid publication
  • - Lifetime hosting
  • - Free indexing service
  • - Free promotion service
  • - More citations
  • - Search engine friendly

Free SCIRP Newsletters>>

Add your e-mail address to receive free newsletters from SCIRP.

 

Contact Us >>

WhatsApp  +86 18163351462(WhatsApp)
   
Paper Publishing WeChat
Book Publishing WeChat
(or Email:book@scirp.org)

Article citations

More>>

Z. Ni, Y. Q. Shi, N. Ansari and W. Su, “Reversible Data Hiding,” IEEE Transaction of Circuits and Systems for Video Technology, Vol. 16, 2006, pp. 354-361. doi:10.1109/TCSVT.2006.869964

has been cited by the following article:

  • TITLE: Comparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication

    AUTHORS: Archana Tiwari, Manisha Sharma

    KEYWORDS: Image Authentication; Selective Authentication; Content Recovery; Robustness; Semifragile Watermarking; Tamper Detection; PSNR

    JOURNAL NAME: Journal of Information Security, Vol.3 No.3, July 25, 2012

    ABSTRACT: Technology has no limits today; we have lots of software available in the market by which we can alter any image. People usually copies image from the internet and after some changes they claim that these are their own properties. Insuring digital image integrity has therefore become a major issue. Over the past few years, watermarking has emerged as the leading candidate to solve problems of ownership and content authentications for digital multimedia documents. To protect authenticity of images semi fragile watermarking is very concerned by researchers because of its important function in multimedia content authentication. The aim of this paper is to present a survey and a comparison of emerging techniques for image authentication using semifragile watermarking. In present paper comprehensive overview of insertion and extraction methods used in different semi fragile water marking algorithm are studied using image parameters, potential application, different algorithms are described and focus is on their comparison according to the properties cited above and future directions for developing a better image authentication algorithm are suggested.