A self-recovery watermarking scheme based on block truncation coding and quantum chaos map
To take into account the invisibility, recovery quality, detection ability, and security, a new digital image fragile watermarking method based on block truncation coding (BTC) and quantum chaos map is proposed. In this method generates the authentication watermark for each 4 × 4 block and generates...
        Saved in:
      
    
          | Published in | Multimedia tools and applications Vol. 79; no. 25-26; pp. 18695 - 18725 | 
|---|---|
| Main Authors | , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
        New York
          Springer US
    
        01.07.2020
     Springer Nature B.V  | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 1380-7501 1573-7721  | 
| DOI | 10.1007/s11042-020-08727-7 | 
Cover
| Abstract | To take into account the invisibility, recovery quality, detection ability, and security, a new digital image fragile watermarking method based on block truncation coding (BTC) and quantum chaos map is proposed. In this method generates the authentication watermark for each 4 × 4 block and generates the recovery watermark for each 2 × 2 block by block truncation coding. For each block, the block truncation coding is used to classify the image blocks into smooth blocks and rough blocks. For different blocks, recovery data can be generated by allocating fewer bits to the smooth blocks and more bits to the rough blocks to encoding the block content. Quantum chaos map is used to generate the block mapping sequence for embedding recovery watermark to improve the shortcoming of watermarking such as small keyspace and low security. The experimental results show that the proposed scheme improves the quality of watermarked and recovered images. Additionally, this approach achieves higher security than the existing methods, under different attacks, such as general tampering, collage attack, content-only, and a hybrid attack. | 
    
|---|---|
| AbstractList | To take into account the invisibility, recovery quality, detection ability, and security, a new digital image fragile watermarking method based on block truncation coding (BTC) and quantum chaos map is proposed. In this method generates the authentication watermark for each 4 × 4 block and generates the recovery watermark for each 2 × 2 block by block truncation coding. For each block, the block truncation coding is used to classify the image blocks into smooth blocks and rough blocks. For different blocks, recovery data can be generated by allocating fewer bits to the smooth blocks and more bits to the rough blocks to encoding the block content. Quantum chaos map is used to generate the block mapping sequence for embedding recovery watermark to improve the shortcoming of watermarking such as small keyspace and low security. The experimental results show that the proposed scheme improves the quality of watermarked and recovered images. Additionally, this approach achieves higher security than the existing methods, under different attacks, such as general tampering, collage attack, content-only, and a hybrid attack. | 
    
| Author | He, Hongjie Hemida, Omer  | 
    
| Author_xml | – sequence: 1 givenname: Omer orcidid: 0000-0002-1669-7696 surname: Hemida fullname: Hemida, Omer email: omerharoun1@yahoo.com organization: Sichuan Key Lab of Signal and Information Processing, Southwest Jiaotong University – sequence: 2 givenname: Hongjie surname: He fullname: He, Hongjie organization: Sichuan Key Lab of Signal and Information Processing, Southwest Jiaotong University  | 
    
| BookMark | eNp9kE1PwyAYx4mZidv0C3gi8YwChdIel8W3ZIkXvXghQOnWrYMNWs2-vWw1MfGwE0_I__e8_CZg5LyzANwSfE8wFg-REMwowhQjXAgqkLgAY8JFhoSgZJTqrMBIcEyuwCTGNcYk55SNwecMRtvWKFjjv2w4wG_V2bBVYdO4JYxmZbcWahVtBb2DuvVmA7vQO6O6Jn0YXx1zylVw3yvX9VtoVspHuFW7a3BZqzbam993Cj6eHt_nL2jx9vw6ny2QyUjZIWNFQTjjWJA8s6qoaG14zjgtalZqoXItdE41y5kuS0O05jmv8ppmrBIlFTybgruh7y74fW9jJ9e-Dy6NlJRRXCYpFKdUMaRM8DEGW0vTdKcjuqCaVhIsjyblYFImRJ5MSpFQ-g_dhSYpOpyHsgGKKeyWNvxtdYb6AU1Hh4c | 
    
| CitedBy_id | crossref_primary_10_1016_j_jksuci_2022_05_013 crossref_primary_10_1007_s00034_021_01927_y crossref_primary_10_1007_s11042_020_10368_9 crossref_primary_10_3390_electronics13101884 crossref_primary_10_1007_s11042_022_13475_x crossref_primary_10_1109_ACCESS_2024_3466611 crossref_primary_10_3389_fphy_2023_1315765 crossref_primary_10_1007_s11042_022_12680_y crossref_primary_10_1016_j_jksuci_2021_12_011 crossref_primary_10_1016_j_jvcir_2022_103437 crossref_primary_10_3390_app11031146 crossref_primary_10_3390_electronics12194117 crossref_primary_10_1049_ipr2_12515 crossref_primary_10_3390_app11020619 crossref_primary_10_1007_s11042_022_13630_4 crossref_primary_10_1109_ACCESS_2020_3019832 crossref_primary_10_1016_j_vlsi_2021_11_004 crossref_primary_10_1007_s11042_020_09132_w crossref_primary_10_1007_s11042_023_15999_2  | 
    
| Cites_doi | 10.1016/j.jvcir.2016.04.023 10.1109/TIP.2003.819861 10.1016/j.patrec.2005.09.006 10.1007/s13042-017-0641-4 10.1016/j.sigpro.2009.02.009 10.1016/j.sigpro.2009.07.007 10.1016/j.patcog.2008.05.003 10.1007/s11042-015-2893-x 10.1007/s11042-007-0154-3 10.1049/iet-ifs.2010.0059 10.1109/TCOM.1979.1094560 10.1016/j.sigpro.2015.10.023 10.1007/s11042-015-2736-9 10.1201/9781420057133 10.1016/j.dsp.2010.04.006 10.1007/s11071-014-1777-3 10.1016/j.image.2014.09.001 10.1016/j.ins.2016.09.001 10.1117/1.1459449 10.1007/978-3-642-04431-1_10 10.1109/APSIPA.2017.8282151 10.1080/10798587.2011.10643147 10.1007/s11042-015-3010-x 10.1049/ip-vis:20040812 10.1016/j.sigpro.2011.11.013 10.1007/s11042-016-3328-z  | 
    
| ContentType | Journal Article | 
    
| Copyright | Springer Science+Business Media, LLC, part of Springer Nature 2020 Springer Science+Business Media, LLC, part of Springer Nature 2020.  | 
    
| Copyright_xml | – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020 – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020.  | 
    
| DBID | AAYXX CITATION 3V. 7SC 7WY 7WZ 7XB 87Z 8AL 8AO 8FD 8FE 8FG 8FK 8FL 8G5 ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ GUQSH HCIFZ JQ2 K60 K6~ K7- L.- L7M L~C L~D M0C M0N M2O MBDVC P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI Q9U  | 
    
| DOI | 10.1007/s11042-020-08727-7 | 
    
| DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Computing Database (Alumni Edition) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni Edition) Research Library ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Business Premium Collection Technology Collection ProQuest One Community College ProQuest Central Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student Research Library Prep SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database (Proquest) ABI/INFORM Professional Advanced Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts  Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Computing Database Research Library Research Library (Corporate) Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central Basic  | 
    
| DatabaseTitle | CrossRef ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business Research Library Prep Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College Research Library (Alumni Edition) ProQuest Pharma Collection ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Research Library ProQuest Central (New) Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Computing ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Business (Alumni) ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) Business Premium Collection (Alumni)  | 
    
| DatabaseTitleList | ABI/INFORM Global (Corporate)  | 
    
| Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Engineering Computer Science  | 
    
| EISSN | 1573-7721 | 
    
| EndPage | 18725 | 
    
| ExternalDocumentID | 10_1007_s11042_020_08727_7 | 
    
| GrantInformation_xml | – fundername: National Natural Science Foundation of China (NSFC) Under grants (61872303) and Technology Innovation Talent Program of Science & Technology Department of Sichuan Province(2018RZ0143). grantid: (61872303) and (2018RZ0143).  | 
    
| GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29M 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 3EH 3V. 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 7WY 8AO 8FE 8FG 8FL 8G5 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFO ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACREN ACSNA ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFKRA AFLOW AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARAPS ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN AZQEC B-. BA0 BBWZM BDATZ BENPR BEZIV BGLVJ BGNMA BPHCQ BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 DWQXO EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GUQSH GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K60 K6V K6~ K7- KDC KOV KOW LAK LLZTM M0C M0N M2O M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P62 P9O PF0 PQBIZ PQBZA PQQKQ PROAC PT4 PT5 Q2X QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TH9 TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7S Z7W Z7X Z7Y Z7Z Z81 Z83 Z86 Z88 Z8M Z8N Z8Q Z8R Z8S Z8T Z8U Z8W Z92 ZMTXR ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG ADKFA AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB PUEGO 7SC 7XB 8AL 8FD 8FK JQ2 L.- L7M L~C L~D MBDVC PKEHL PQEST PQUKI Q9U  | 
    
| ID | FETCH-LOGICAL-c319t-ce78154507163ea8d2fc564528f49b7a6b7b62b464b99c1bb565d6f234d792753 | 
    
| IEDL.DBID | BENPR | 
    
| ISSN | 1380-7501 | 
    
| IngestDate | Fri Jul 25 23:55:47 EDT 2025 Wed Oct 01 02:50:42 EDT 2025 Thu Apr 24 23:09:30 EDT 2025 Fri Feb 21 02:37:33 EST 2025  | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Issue | 25-26 | 
    
| Keywords | Block truncation coding Recovery performance Fragile watermarking Quantum chaos  | 
    
| Language | English | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-c319t-ce78154507163ea8d2fc564528f49b7a6b7b62b464b99c1bb565d6f234d792753 | 
    
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14  | 
    
| ORCID | 0000-0002-1669-7696 | 
    
| PQID | 2420902020 | 
    
| PQPubID | 54626 | 
    
| PageCount | 31 | 
    
| ParticipantIDs | proquest_journals_2420902020 crossref_citationtrail_10_1007_s11042_020_08727_7 crossref_primary_10_1007_s11042_020_08727_7 springer_journals_10_1007_s11042_020_08727_7  | 
    
| ProviderPackageCode | CITATION AAYXX  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 20200700 2020-07-00 20200701  | 
    
| PublicationDateYYYYMMDD | 2020-07-01 | 
    
| PublicationDate_xml | – month: 7 year: 2020 text: 20200700  | 
    
| PublicationDecade | 2020 | 
    
| PublicationPlace | New York | 
    
| PublicationPlace_xml | – name: New York – name: Dordrecht  | 
    
| PublicationSubtitle | An International Journal | 
    
| PublicationTitle | Multimedia tools and applications | 
    
| PublicationTitleAbbrev | Multimed Tools Appl | 
    
| PublicationYear | 2020 | 
    
| Publisher | Springer US Springer Nature B.V  | 
    
| Publisher_xml | – name: Springer US – name: Springer Nature B.V  | 
    
| References | HeHZhangJTaiHSelf-recovery fragile watermarking using block-neighborhood tampering characterizationProc information hiding2009200913214510.1007/978-3-642-04431-1_10 QinCChangC-CChenP-YSelf-embedding fragile watermarking with restoration capability based on an adaptive bit allocation mechanismSignal Process2012921137115010.1016/j.sigpro.2011.11.013 SinghDSinghSKEffective self-embedding watermarking scheme for image tampered detection and localization with recovery capabilityJ Vis Commun Image Represent20163877578910.1016/j.jvcir.2016.04.023 Wei L, Chia-Chen L, Jeng-Shyang P. (2016). Novel image authentication scheme with fine image quality for BTC-based compressed images. Multimedia Tools and Applications75:4771–4793. YangC-WShenJ-JRecover the tampered image based on VQ indexingSignal Process20109033134310.1016/j.sigpro.2009.07.007 Betancourth GP. (2012). Fragile watermarking scheme for image authentication. Proc. Human System Interactions (HSI), 2012 5th International Conference, 2012:168-74. Fridrich, J. (1999). Protection of digital images using self-embedding. Proc. Symposium on Content Security and Data Hiding in Digital Media, Institute of Technology, New Jersey, USA. HaouziaANoumeirRMethods for image authentication: a surveyMultimed Tools Appl20083914610.1007/s11042-007-0154-3 HeH-JZhangJ-SChenFAdjacent-block based statistical detection method for self-embedding watermarking techniquesSignal Process2009891557156610.1016/j.sigpro.2009.02.009 FridrichJGoljanMImages with self-correcting capabilitiesProc international conference on image processing199919993792796 ChangC-CHuY-SLuT-CWatermarking-based image ownership and tampering authentication schemePattern Recogn Lett20062743944610.1016/j.patrec.2005.09.006 Hemida O, Huo Y, Chen F, He H. (2017). Block-DCT based alterable-coding restorable fragile watermarking scheme with superior localization. Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), IEEE,2017, 2017:846-51. LiuZZhangFWangJWangHHuangJAuthentication and recovery algorithm for speech signal based on digital watermarkingSignal Process201612315716610.1016/j.sigpro.2015.10.023 SinghDSinghSKDCT based efficient fragile watermarking scheme for image authentication and restorationMultimed Tools Appl20177695397710.1007/s11042-015-3010-x Stinson DR (2005) Cryptography: theory and practice. CRC press NyeemHBolesWBoydCModeling attacks on self-authentication watermarkingMultimed Tools Appl201675158491588010.1007/s11042-015-2893-x FridrichJJGoljanMMemonNDCryptanalysis of the Yeung-Mintzer fragile watermarking techniqueJournal of Electronic Imaging20021126227410.1117/1.1459449 Hemida O, Huo Y, He H, Chen F (2018) A restorable fragile watermarking scheme with superior localization for both natural and text images. Multimed Tools Appl Lin P-L, Huang P-W, Peng A-W. (2004) A fragile watermarking scheme for image authentication with localization and recovery. Proc. Multimedia Software Engineering, 2004. Proceedings. IEEE Sixth International Symposium on, 146-53. DadkhahSManafAAHoriYHassanienAESadeghiSAn effective SVD-based image tampering detection and self-recovery using active watermarkingSignal Process Image Commun2014291197121010.1016/j.image.2014.09.001 BenrhoumaOHermassiHBelghithSTamper detection and self-recovery scheme by DWT watermarkingNonlinear Dynamics2015791817183310.1007/s11071-014-1777-3 LiC-TDigital fragile watermarking scheme for authentication of JPEG imagesIEE proceedings-vision, image and signal processing200415146046610.1049/ip-vis:20040812 SreenivasKPrasadVKFragile watermarking schemes for image authentication: a surveyInt J Mach Learn Cybern201891193121810.1007/s13042-017-0641-4 Zain JM, Fauzi AR. (2006). Medical image watermarking with tamper detection and recovery. Proc. Engineering in Medicine and Biology Society, 2006. EMBS'06. 28th Annual International Conference of the IEEE, 2006:3270-3. Behnia S, Ayubi P, Soltanpoor W. (2012). Image encryption based on quantum chaotic map and FSM transforms. Proc. Telecommunications Network Strategy and Planning Symposium (NETWORKS), 2012 XVth International, 2012:1-6. DelpEJMitchellORImage compression using block truncation codingIEEE Trans Commun1979271335134210.1109/TCOM.1979.1094560 WangZBovikACSheikhHRSimoncelliEPImage quality assessment: from error visibility to structural similarityIEEE Trans Image Process20041360061210.1109/TIP.2003.819861 Huo Y, Chen F, He H, Yin Z. (2010). An alterable-capacity authentication watermarking algorithm with superior localization. Proc. Information Theory and Information Security (ICITIS), 2010 IEEE International Conference, 2010:608-11. QianZFengGZhangXWangSImage self-embedding with high-quality restoration capabilityDigital Signal Processing20112127828610.1016/j.dsp.2010.04.006 ShiHWangXHLiMCBaiJFengBSecure variable-capacity self-recovery watermarking schemeMultimed Tools Appl2017766941697210.1007/s11042-016-3328-z Singh D, Singh SK. (2017). Block Truncation Coding based effective watermarking scheme for image authentication with recovery capability. Multimedia Tools and Applications:1–19. PiperASafavi-NainiRScalable fragile watermarking for image authenticationIET Inf Secur2013730031110.1049/iet-ifs.2010.0059 QinCWangHZhangXSunXSelf-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding modeInf Sci201637323325010.1016/j.ins.2016.09.001 LeeT-YLinSDDual watermark for image tamper detection and recoveryPattern Recogn2008413497350610.1016/j.patcog.2008.05.003 H-bZYangCTamper detection and self-recovery of images using self-embeddingActa Electron Sin200432196199 SinghPAgarwalSAn efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selectionMultimed Tools Appl2016758165819410.1007/s11042-015-2736-9 EdupugantiVGShihFYChangI-CAn efficient block-based fragile watermarking system for tamper localization and recoveryIntelligent Automation & Soft Computing20111725726710.1080/10798587.2011.10643147 C-C Chang (8727_CR4) 2006; 27 H Shi (8727_CR27) 2017; 76 O Benrhouma (8727_CR2) 2015; 79 C Qin (8727_CR25) 2012; 92 8727_CR20 C Qin (8727_CR26) 2016; 373 8727_CR8 T-Y Lee (8727_CR18) 2008; 41 8727_CR3 JJ Fridrich (8727_CR10) 2002; 11 8727_CR1 D Singh (8727_CR31) 2017; 76 A Piper (8727_CR23) 2013; 7 H He (8727_CR14) 2009; 2009 8727_CR30 A Haouzia (8727_CR11) 2008; 39 Z Liu (8727_CR21) 2016; 123 H Nyeem (8727_CR22) 2016; 75 J Fridrich (8727_CR9) 1999; 1999 K Sreenivas (8727_CR32) 2018; 9 Z Wang (8727_CR34) 2004; 13 8727_CR35 VG Edupuganti (8727_CR7) 2011; 17 8727_CR16 8727_CR15 Z Qian (8727_CR24) 2011; 21 8727_CR37 C-W Yang (8727_CR36) 2010; 90 Z H-b (8727_CR12) 2004; 32 8727_CR33 EJ Delp (8727_CR6) 1979; 27 D Singh (8727_CR29) 2016; 38 H-J He (8727_CR13) 2009; 89 8727_CR17 C-T Li (8727_CR19) 2004; 151 P Singh (8727_CR28) 2016; 75 S Dadkhah (8727_CR5) 2014; 29  | 
    
| References_xml | – reference: FridrichJJGoljanMMemonNDCryptanalysis of the Yeung-Mintzer fragile watermarking techniqueJournal of Electronic Imaging20021126227410.1117/1.1459449 – reference: Lin P-L, Huang P-W, Peng A-W. (2004) A fragile watermarking scheme for image authentication with localization and recovery. Proc. Multimedia Software Engineering, 2004. Proceedings. IEEE Sixth International Symposium on, 146-53. – reference: NyeemHBolesWBoydCModeling attacks on self-authentication watermarkingMultimed Tools Appl201675158491588010.1007/s11042-015-2893-x – reference: HaouziaANoumeirRMethods for image authentication: a surveyMultimed Tools Appl20083914610.1007/s11042-007-0154-3 – reference: QinCChangC-CChenP-YSelf-embedding fragile watermarking with restoration capability based on an adaptive bit allocation mechanismSignal Process2012921137115010.1016/j.sigpro.2011.11.013 – reference: Hemida O, Huo Y, He H, Chen F (2018) A restorable fragile watermarking scheme with superior localization for both natural and text images. Multimed Tools Appl – reference: ShiHWangXHLiMCBaiJFengBSecure variable-capacity self-recovery watermarking schemeMultimed Tools Appl2017766941697210.1007/s11042-016-3328-z – reference: LiC-TDigital fragile watermarking scheme for authentication of JPEG imagesIEE proceedings-vision, image and signal processing200415146046610.1049/ip-vis:20040812 – reference: ChangC-CHuY-SLuT-CWatermarking-based image ownership and tampering authentication schemePattern Recogn Lett20062743944610.1016/j.patrec.2005.09.006 – reference: QinCWangHZhangXSunXSelf-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding modeInf Sci201637323325010.1016/j.ins.2016.09.001 – reference: QianZFengGZhangXWangSImage self-embedding with high-quality restoration capabilityDigital Signal Processing20112127828610.1016/j.dsp.2010.04.006 – reference: DelpEJMitchellORImage compression using block truncation codingIEEE Trans Commun1979271335134210.1109/TCOM.1979.1094560 – reference: BenrhoumaOHermassiHBelghithSTamper detection and self-recovery scheme by DWT watermarkingNonlinear Dynamics2015791817183310.1007/s11071-014-1777-3 – reference: SinghDSinghSKEffective self-embedding watermarking scheme for image tampered detection and localization with recovery capabilityJ Vis Commun Image Represent20163877578910.1016/j.jvcir.2016.04.023 – reference: HeH-JZhangJ-SChenFAdjacent-block based statistical detection method for self-embedding watermarking techniquesSignal Process2009891557156610.1016/j.sigpro.2009.02.009 – reference: PiperASafavi-NainiRScalable fragile watermarking for image authenticationIET Inf Secur2013730031110.1049/iet-ifs.2010.0059 – reference: SreenivasKPrasadVKFragile watermarking schemes for image authentication: a surveyInt J Mach Learn Cybern201891193121810.1007/s13042-017-0641-4 – reference: EdupugantiVGShihFYChangI-CAn efficient block-based fragile watermarking system for tamper localization and recoveryIntelligent Automation & Soft Computing20111725726710.1080/10798587.2011.10643147 – reference: Hemida O, Huo Y, Chen F, He H. (2017). Block-DCT based alterable-coding restorable fragile watermarking scheme with superior localization. Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), IEEE,2017, 2017:846-51. – reference: Singh D, Singh SK. (2017). Block Truncation Coding based effective watermarking scheme for image authentication with recovery capability. Multimedia Tools and Applications:1–19. – reference: HeHZhangJTaiHSelf-recovery fragile watermarking using block-neighborhood tampering characterizationProc information hiding2009200913214510.1007/978-3-642-04431-1_10 – reference: LeeT-YLinSDDual watermark for image tamper detection and recoveryPattern Recogn2008413497350610.1016/j.patcog.2008.05.003 – reference: SinghPAgarwalSAn efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selectionMultimed Tools Appl2016758165819410.1007/s11042-015-2736-9 – reference: H-bZYangCTamper detection and self-recovery of images using self-embeddingActa Electron Sin200432196199 – reference: Fridrich, J. (1999). Protection of digital images using self-embedding. Proc. Symposium on Content Security and Data Hiding in Digital Media, Institute of Technology, New Jersey, USA. – reference: YangC-WShenJ-JRecover the tampered image based on VQ indexingSignal Process20109033134310.1016/j.sigpro.2009.07.007 – reference: Betancourth GP. (2012). Fragile watermarking scheme for image authentication. Proc. Human System Interactions (HSI), 2012 5th International Conference, 2012:168-74. – reference: DadkhahSManafAAHoriYHassanienAESadeghiSAn effective SVD-based image tampering detection and self-recovery using active watermarkingSignal Process Image Commun2014291197121010.1016/j.image.2014.09.001 – reference: SinghDSinghSKDCT based efficient fragile watermarking scheme for image authentication and restorationMultimed Tools Appl20177695397710.1007/s11042-015-3010-x – reference: Zain JM, Fauzi AR. (2006). Medical image watermarking with tamper detection and recovery. Proc. Engineering in Medicine and Biology Society, 2006. EMBS'06. 28th Annual International Conference of the IEEE, 2006:3270-3. – reference: FridrichJGoljanMImages with self-correcting capabilitiesProc international conference on image processing199919993792796 – reference: LiuZZhangFWangJWangHHuangJAuthentication and recovery algorithm for speech signal based on digital watermarkingSignal Process201612315716610.1016/j.sigpro.2015.10.023 – reference: Stinson DR (2005) Cryptography: theory and practice. CRC press – reference: Huo Y, Chen F, He H, Yin Z. (2010). An alterable-capacity authentication watermarking algorithm with superior localization. Proc. Information Theory and Information Security (ICITIS), 2010 IEEE International Conference, 2010:608-11. – reference: WangZBovikACSheikhHRSimoncelliEPImage quality assessment: from error visibility to structural similarityIEEE Trans Image Process20041360061210.1109/TIP.2003.819861 – reference: Behnia S, Ayubi P, Soltanpoor W. (2012). Image encryption based on quantum chaotic map and FSM transforms. Proc. Telecommunications Network Strategy and Planning Symposium (NETWORKS), 2012 XVth International, 2012:1-6. – reference: Wei L, Chia-Chen L, Jeng-Shyang P. (2016). Novel image authentication scheme with fine image quality for BTC-based compressed images. Multimedia Tools and Applications75:4771–4793. – volume: 38 start-page: 775 year: 2016 ident: 8727_CR29 publication-title: J Vis Commun Image Represent doi: 10.1016/j.jvcir.2016.04.023 – volume: 13 start-page: 600 year: 2004 ident: 8727_CR34 publication-title: IEEE Trans Image Process doi: 10.1109/TIP.2003.819861 – volume: 27 start-page: 439 year: 2006 ident: 8727_CR4 publication-title: Pattern Recogn Lett doi: 10.1016/j.patrec.2005.09.006 – volume: 9 start-page: 1193 year: 2018 ident: 8727_CR32 publication-title: Int J Mach Learn Cybern doi: 10.1007/s13042-017-0641-4 – ident: 8727_CR8 – volume: 89 start-page: 1557 year: 2009 ident: 8727_CR13 publication-title: Signal Process doi: 10.1016/j.sigpro.2009.02.009 – ident: 8727_CR20 – volume: 90 start-page: 331 year: 2010 ident: 8727_CR36 publication-title: Signal Process doi: 10.1016/j.sigpro.2009.07.007 – ident: 8727_CR1 – ident: 8727_CR3 – volume: 32 start-page: 196 year: 2004 ident: 8727_CR12 publication-title: Acta Electron Sin – volume: 41 start-page: 3497 year: 2008 ident: 8727_CR18 publication-title: Pattern Recogn doi: 10.1016/j.patcog.2008.05.003 – volume: 1999 start-page: 792 issue: 3 year: 1999 ident: 8727_CR9 publication-title: Proc international conference on image processing – volume: 75 start-page: 15849 year: 2016 ident: 8727_CR22 publication-title: Multimed Tools Appl doi: 10.1007/s11042-015-2893-x – ident: 8727_CR30 – volume: 39 start-page: 1 year: 2008 ident: 8727_CR11 publication-title: Multimed Tools Appl doi: 10.1007/s11042-007-0154-3 – ident: 8727_CR15 – volume: 7 start-page: 300 year: 2013 ident: 8727_CR23 publication-title: IET Inf Secur doi: 10.1049/iet-ifs.2010.0059 – ident: 8727_CR17 – volume: 27 start-page: 1335 year: 1979 ident: 8727_CR6 publication-title: IEEE Trans Commun doi: 10.1109/TCOM.1979.1094560 – volume: 123 start-page: 157 year: 2016 ident: 8727_CR21 publication-title: Signal Process doi: 10.1016/j.sigpro.2015.10.023 – volume: 75 start-page: 8165 year: 2016 ident: 8727_CR28 publication-title: Multimed Tools Appl doi: 10.1007/s11042-015-2736-9 – ident: 8727_CR33 doi: 10.1201/9781420057133 – volume: 21 start-page: 278 year: 2011 ident: 8727_CR24 publication-title: Digital Signal Processing doi: 10.1016/j.dsp.2010.04.006 – volume: 79 start-page: 1817 year: 2015 ident: 8727_CR2 publication-title: Nonlinear Dynamics doi: 10.1007/s11071-014-1777-3 – volume: 29 start-page: 1197 year: 2014 ident: 8727_CR5 publication-title: Signal Process Image Commun doi: 10.1016/j.image.2014.09.001 – volume: 373 start-page: 233 year: 2016 ident: 8727_CR26 publication-title: Inf Sci doi: 10.1016/j.ins.2016.09.001 – volume: 11 start-page: 262 year: 2002 ident: 8727_CR10 publication-title: Journal of Electronic Imaging doi: 10.1117/1.1459449 – ident: 8727_CR37 – volume: 2009 start-page: 132 year: 2009 ident: 8727_CR14 publication-title: Proc information hiding doi: 10.1007/978-3-642-04431-1_10 – ident: 8727_CR16 doi: 10.1109/APSIPA.2017.8282151 – volume: 17 start-page: 257 year: 2011 ident: 8727_CR7 publication-title: Intelligent Automation & Soft Computing doi: 10.1080/10798587.2011.10643147 – volume: 76 start-page: 953 year: 2017 ident: 8727_CR31 publication-title: Multimed Tools Appl doi: 10.1007/s11042-015-3010-x – ident: 8727_CR35 – volume: 151 start-page: 460 year: 2004 ident: 8727_CR19 publication-title: IEE proceedings-vision, image and signal processing doi: 10.1049/ip-vis:20040812 – volume: 92 start-page: 1137 year: 2012 ident: 8727_CR25 publication-title: Signal Process doi: 10.1016/j.sigpro.2011.11.013 – volume: 76 start-page: 6941 year: 2017 ident: 8727_CR27 publication-title: Multimed Tools Appl doi: 10.1007/s11042-016-3328-z  | 
    
| SSID | ssj0016524 | 
    
| Score | 2.3383913 | 
    
| Snippet | To take into account the invisibility, recovery quality, detection ability, and security, a new digital image fragile watermarking method based on block... | 
    
| SourceID | proquest crossref springer  | 
    
| SourceType | Aggregation Database Enrichment Source Index Database Publisher  | 
    
| StartPage | 18695 | 
    
| SubjectTerms | Algorithms Coding Computer Communication Networks Computer Science Data recovery Data Structures and Information Theory Digital imaging Image classification Image detection Image quality Localization Mapping Multimedia Multimedia Information Systems Security Special Purpose and Application-Based Systems Visibility Watermarking  | 
    
| SummonAdditionalLinks | – databaseName: SpringerLink Journals (ICM) dbid: U2A link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFA86L3rwYypOp-TgTQNL2ibtcYhjCHpyMLyUfCK4dWo3xP_ely5dVVSQHtvm8D7y-728vPcQOk-k9NOiIyJ4xgnw_4TIKHGE-hydNlo45wuFb-_4cBTfjJNxKAor69vudUqy2qmbYjfqS0l8uNNLAXWJWEcbiW_nBVY8Yv1V7oAnYZRt2iOAhzSUyvy8xlc4ajjmt7RohTaDXbQdaCLuL_W6h9Zs0UY79QgGHDyyjbY-9RPcRw99XNqJIz7KBRN9x2-y2nmr83AMcaydWuxxy-BZgRXg2BOevy6K5bEd1jMPZFgWBr8sQOKLKdaPclbiqXw-QKPB9f3VkIThCUSDV82JtiL19AgoBI-sTA1z2neOYamLMyUkV0JxpmIeqyzTVClgdoY7FsVGZAyCmEPUKmaFPUI4SoBmOKZ7WuqYCap4ZLihKjPgvSqjHURrGeY6dBb3Ay4medMT2cs9B7nnldxz0UEXq3-el301_vy6W6smDz5W5kAu_KVSeDroslZX8_r31Y7_9_kJ2mSVxfg7ul3UAr3YU2Aic3VWGd4HECrR0g priority: 102 providerName: Springer Nature  | 
    
| Title | A self-recovery watermarking scheme based on block truncation coding and quantum chaos map | 
    
| URI | https://link.springer.com/article/10.1007/s11042-020-08727-7 https://www.proquest.com/docview/2420902020  | 
    
| Volume | 79 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1573-7721 dateEnd: 20241102 omitProxy: false ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: ADMLS dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVLSH databaseName: SpringerLink Journals customDbUrl: mediaType: online eissn: 1573-7721 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: AFBBN dateStart: 19970101 isFulltext: true providerName: Library Specific Holdings – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1573-7721 dateEnd: 20241102 omitProxy: true ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: BENPR dateStart: 19970101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 1573-7721 dateEnd: 20241102 omitProxy: true ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: 8FG dateStart: 19970101 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLINK - Czech Republic Consortium customDbUrl: eissn: 1573-7721 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: AGYKE dateStart: 19970101 isFulltext: true titleUrlDefault: http://link.springer.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 1573-7721 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: U2A dateStart: 19970101 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT9tAEB5BcoEDFChqgEZ76I2uiNf2rn1AKK0SEBVRVTUS9GLtwxZSiR1IIsS_Z8ZZE6hU5Jtfh3nsfLOzMx_Al1hrYosOuZKp5Ij_Y67DuOAB1eiss6ooqFH4aiQvxtHldXy9BqOmF4aOVTZrYr1Qu8rSHvkJhhI6QojX2fSeE2sUVVcbCg3tqRXcaT1ibB3agiZjtaD9bTD6-eulriBjT3Ob9DjGysC30Syb6QJqVaF0qpdgVOfqbaha4c9_SqZ1JBp-gC0PIVl_qfMdWMvLXdhu6BmY99Zd2Hw1a3AP_vTZLL8rOGXAaL5P7FHXq3K9V84wx80nOaOY5lhVMoMx7i-bPyzK5ZYesxUFOaZLx-4XqI3FhNlbXc3YRE8_wng4-P39gntiBW7R4-bc5ioh6ITwQoa5TpwoLE2VEUkRpUZpaZSRwkQyMmlqA2MQ9TlZiDByKhWY4OxDq6zK_BOwMEYIUgjbs9pGQgVGhk66wKQOPdukQQeCRoaZ9VPHifziLlvNSya5Zyj3rJZ7pjpw_PLNdDlz4923jxrVZN7_ZtnKWjrwtVHX6vH__3bw_t8OYUPUFkLndY-ghXrIPyMqmZsurCfD8y60--c3PwZdb3h4dyz6zyPU3q8 | 
    
| linkProvider | ProQuest | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9xADLYQHNoeKI9WLIUyBzjRUTeTZCY5oAooaCmwqiqQUC_pvCIk2GTp7grx5_rbamcnbFup3FCOSeZge_zZ47E_gO1Ua2KLjrmSueQY_6dcx2nJI6rRWWdVWVKj8Hlf9i6TL1fp1Rz8anth6Fpl6xMbR-1qS2fkHxFK6AohPp-Gd5xYo6i62lJo6ECt4PaaEWOhsePUP9xjCjfaO_mM-t4R4vjo4rDHA8sAt2h-Y269yiiOQKyVsdeZE6WlESsiK5PcKC2NMlKYRCYmz21kDIZATpYiTpzKhSLWCISAhSROckz-Fg6O-l-_PdYxZBpodbMuR2yOQtvOtHkvotYYSt-6GUYRXP0NjbN4958SbYN8x0uwGEJWtj-1sWWY89UKvG7pIFjwDivw6o_ZhqvwfZ-N_G3JKePG7fLA7nWDAs3ZPMOc2g88Iwx1rK6YQUy9YeOfk2p6hMhsTaDKdOXY3QS1Pxkwe63rERvo4Ru4fBYRv4X5qq78GrA4xZCnFLZrtU2EioyMnXSRyR16EpNHHYhaGRY2TDknso3bYjafmeReoNyLRu6F6sDu4z_D6YyPJ7_eaFVThP0-KmbW2YEPrbpmr_-_2vrTq23Bi97F-VlxdtI_fQcvRWMtdFd4A-ZRJ34TI6KxeR_MjsGP57b033fQFs8 | 
    
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JTtxAEC0hIkVwyMIihpCkD8kJWozbdrd9iCIUMmwJ4gAS4mJ6FVIYe2BmhPi1fF2qvDAkUrghH233oep1varuWgA-pVrTtOiYK5lLjv5_ynWcBh7RHZ11VoVAhcI_j-X-WXJ4np7Pwe-uFobSKjubWBtqV1k6I99GKqEUQny2Q5sWcbI7-Dq64TRBim5au3EaDUSO_P0dhm_jLwe7qOvPQgy-n37b5-2EAW4RehNuvcrIh0CelbHXmRPBUnsVkYUkN0pLo4wUJpGJyXMbGYPuj5NBxIlTuVA0MQLN_wtFXdypSn2w93CDIdN2oG7W58jKUVuw05TtRVQUQ4FbP0P_gau_SXHm6f5zOVtz3uANvGqdVbbToOstzPlyCV53gyBYaxeWYPFRV8NluNhhY38dOMXauFHu2Z2u7X99Ks8wmvZDz4g9HatKZpBNf7HJ7bRsDg-ZrYhOmS4du5mi3qdDZq90NWZDPVqBs2cR8CrMl1Xp14DFKTo7Qdi-1TYRKjIydtJFJndoQ0we9SDqZFjYtr85jdm4LmadmUnuBcq9qOVeqB5sPvwzarp7PPn1Rqeaot3p42KGyx5sdeqavf7_autPr_YRXiK-ix8Hx0fvYEHUYKEk4Q2YR5X49-gKTcyHGnMMLp8b5H8AvaYUaQ | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+self-recovery+watermarking+scheme+based+on+block+truncation+coding+and+quantum+chaos+map&rft.jtitle=Multimedia+tools+and+applications&rft.au=Hemida+Omer&rft.au=He%2C+Hongjie&rft.date=2020-07-01&rft.pub=Springer+Nature+B.V&rft.issn=1380-7501&rft.eissn=1573-7721&rft.volume=79&rft.issue=25-26&rft.spage=18695&rft.epage=18725&rft_id=info:doi/10.1007%2Fs11042-020-08727-7&rft.externalDBID=HAS_PDF_LINK | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1380-7501&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1380-7501&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1380-7501&client=summon |