Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy
Citations
126 citations
Cites methods from "Fragile image watermarking with pix..."
...Data hiding methods mainly include steganography [2–5], digital watermarking [6–9], construction based data hiding [10–12] and so on....
[...]
117 citations
98 citations
80 citations
Cites background from "Fragile image watermarking with pix..."
...Probability for this scenario is 1 P((2))....
[...]
...Probability for this scenario is P((1)) P((2))....
[...]
...If a is not too large, P((1)) and P((2)) must both approximate 1....
[...]
...Therefore, the two probabilities P((1)) and P((2)) of successful restoration for erroneous bits of binary patterns in f1 subsets and reconstruction levels in f2 subsets are P ð1Þ 1⁄4 ðP ð1Þ s Þ1 1⁄4 ðP ð1Þ s Þ1 : (22) P ð2Þ 1⁄4 ðP ð2Þ s Þ2 1⁄4 ðP ð2Þ s Þ(12) N=ðm 2 K2Þ: (23)...
[...]
...Probability for this scenario is (1 P((1))) P((2))....
[...]
76 citations
References
40,609 citations
1,117 citations
780 citations
278 citations
274 citations