16
Views
18
CrossRef citations to date
0
Altmetric
Articles

Novel image authentication scheme based on quadtree segmentation

Pages 149-162 | Published online: 18 Jul 2013

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (2)

Y-S Tsai, P Tsai & Y-C Hu. (2013) Watermarking for multi-stage encoded image authentication. The Imaging Science Journal 61:2, pages 65-79.
Read now
G D Ye. (2011) Modelling of dynamical system and generalised circulant matrix in image encryption. The Imaging Science Journal 59:3, pages 183-190.
Read now

Articles from other publishers (16)

Chin-Feng Lee, Chin-Ting Yeh, Jau-Ji Shen & Taeshik Shon. (2023) Image Authentication and Restoration Using Block-Wise Variational Automatic Encoding and Generative Adversarial Networks. Electronics 12:16, pages 3402.
Crossref
Shivendra Shivani. (2022) Verifiable medical images for E-healthcare: A novel watermarking approach using robust bit-wise association of self-mutating offsprings of pixels. Microprocessors and Microsystems 90, pages 104483.
Crossref
Ertugrul Gul & Serkan Ozturk. (2021) A novel pixel-wise authentication-based self-embedding fragile watermarking method. Multimedia Systems 27:3, pages 531-545.
Crossref
Cheonshik Kim & Ching-Nung Yang. (2021) Self-Embedding Fragile Watermarking Scheme to Detect Image Tampering Using AMBTC and OPAP Approaches. Applied Sciences 11:3, pages 1146.
Crossref
Ertugrul Gul & Serkan Ozturk. (2020) A novel triple recovery information embedding approach for self-embedded digital image watermarking. Multimedia Tools and Applications 79:41-42, pages 31239-31264.
Crossref
Jau-Ji Shen, Chin-Feng Lee, Fang-Wei Hsu & Somya Agrawal. (2020) A self-embedding fragile image authentication based on singular value decomposition. Multimedia Tools and Applications 79:35-36, pages 25969-25988.
Crossref
Chin-Ling Chen, Chin-Feng Lee, Fang-Wei Hsu, Yong-Yuan Deng & Ching-Cheng Liu. 2020. Advances on Broad-Band Wireless Computing, Communication and Applications. Advances on Broad-Band Wireless Computing, Communication and Applications 670 677 .
Ertugrul Gul & Serkan Ozturk. (2019) A novel hash function based fragile watermarking method for image integrity. Multimedia Tools and Applications 78:13, pages 17701-17718.
Crossref
Chin-Feng Lee, Jau-Ji Shen, Zhao-Ru Chen & Somya Agrawal. (2019) Self-Embedding Authentication Watermarking with Effective Tampered Location Detection and High-Quality Image Recovery. Sensors 19:10, pages 2267.
Crossref
Wien Hong, Xiaoyu Zhou, Der-Chyuan Lou, Xiaoqin Huang & Cancan Peng. (2018) Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images. Symmetry 10:8, pages 318.
Crossref
Wien Hong, Meijin Chen, Tung Shou Chen & Chien-Che Huang. (2017) An efficient authentication method for AMBTC compressed images using adaptive pixel pair matching. Multimedia Tools and Applications 77:4, pages 4677-4695.
Crossref
Wien Hong, Meijin Chen & Tung Shou Chen. (2017) An efficient reversible image authentication method using improved PVO and LSB substitution techniques. Signal Processing: Image Communication 58, pages 111-122.
Crossref
Zhaoxia Yin, Xuejing Niu, Zhili Zhou, Jin Tang & Bin Luo. (2016) Improved Reversible Image Authentication Scheme. Cognitive Computation 8:5, pages 890-899.
Crossref
Yu-Chen Hu, Chun-Chi Lo & Wu-Lin Chen. (2016) Probability-based reversible image authentication scheme for image demosaicking. Future Generation Computer Systems 62, pages 92-103.
Crossref
Chun-Chi Lo & Yu-Chen Hu. (2014) A novel reversible image authentication scheme for digital images. Signal Processing 98, pages 174-185.
Crossref
Jun-Chou Chuang & Yu-Chen Hu. (2011) An adaptive image authentication scheme for vector quantization compressed image. Journal of Visual Communication and Image Representation 22:5, pages 440-449.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.