A self-recovery watermarking scheme based on block truncation coding and quantum chaos map

To take into account the invisibility, recovery quality, detection ability, and security, a new digital image fragile watermarking method based on block truncation coding (BTC) and quantum chaos map is proposed. In this method generates the authentication watermark for each 4 × 4 block and generates...

Full description

Saved in:
Bibliographic Details
Published inMultimedia tools and applications Vol. 79; no. 25-26; pp. 18695 - 18725
Main Authors Hemida, Omer, He, Hongjie
Format Journal Article
LanguageEnglish
Published New York Springer US 01.07.2020
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN1380-7501
1573-7721
DOI10.1007/s11042-020-08727-7

Cover

Abstract To take into account the invisibility, recovery quality, detection ability, and security, a new digital image fragile watermarking method based on block truncation coding (BTC) and quantum chaos map is proposed. In this method generates the authentication watermark for each 4 × 4 block and generates the recovery watermark for each 2 × 2 block by block truncation coding. For each block, the block truncation coding is used to classify the image blocks into smooth blocks and rough blocks. For different blocks, recovery data can be generated by allocating fewer bits to the smooth blocks and more bits to the rough blocks to encoding the block content. Quantum chaos map is used to generate the block mapping sequence for embedding recovery watermark to improve the shortcoming of watermarking such as small keyspace and low security. The experimental results show that the proposed scheme improves the quality of watermarked and recovered images. Additionally, this approach achieves higher security than the existing methods, under different attacks, such as general tampering, collage attack, content-only, and a hybrid attack.
AbstractList To take into account the invisibility, recovery quality, detection ability, and security, a new digital image fragile watermarking method based on block truncation coding (BTC) and quantum chaos map is proposed. In this method generates the authentication watermark for each 4 × 4 block and generates the recovery watermark for each 2 × 2 block by block truncation coding. For each block, the block truncation coding is used to classify the image blocks into smooth blocks and rough blocks. For different blocks, recovery data can be generated by allocating fewer bits to the smooth blocks and more bits to the rough blocks to encoding the block content. Quantum chaos map is used to generate the block mapping sequence for embedding recovery watermark to improve the shortcoming of watermarking such as small keyspace and low security. The experimental results show that the proposed scheme improves the quality of watermarked and recovered images. Additionally, this approach achieves higher security than the existing methods, under different attacks, such as general tampering, collage attack, content-only, and a hybrid attack.
Author He, Hongjie
Hemida, Omer
Author_xml – sequence: 1
  givenname: Omer
  orcidid: 0000-0002-1669-7696
  surname: Hemida
  fullname: Hemida, Omer
  email: omerharoun1@yahoo.com
  organization: Sichuan Key Lab of Signal and Information Processing, Southwest Jiaotong University
– sequence: 2
  givenname: Hongjie
  surname: He
  fullname: He, Hongjie
  organization: Sichuan Key Lab of Signal and Information Processing, Southwest Jiaotong University
BookMark eNp9kE1PwyAYx4mZidv0C3gi8YwChdIel8W3ZIkXvXghQOnWrYMNWs2-vWw1MfGwE0_I__e8_CZg5LyzANwSfE8wFg-REMwowhQjXAgqkLgAY8JFhoSgZJTqrMBIcEyuwCTGNcYk55SNwecMRtvWKFjjv2w4wG_V2bBVYdO4JYxmZbcWahVtBb2DuvVmA7vQO6O6Jn0YXx1zylVw3yvX9VtoVspHuFW7a3BZqzbam993Cj6eHt_nL2jx9vw6ny2QyUjZIWNFQTjjWJA8s6qoaG14zjgtalZqoXItdE41y5kuS0O05jmv8ppmrBIlFTybgruh7y74fW9jJ9e-Dy6NlJRRXCYpFKdUMaRM8DEGW0vTdKcjuqCaVhIsjyblYFImRJ5MSpFQ-g_dhSYpOpyHsgGKKeyWNvxtdYb6AU1Hh4c
CitedBy_id crossref_primary_10_1016_j_jksuci_2022_05_013
crossref_primary_10_1007_s00034_021_01927_y
crossref_primary_10_1007_s11042_020_10368_9
crossref_primary_10_3390_electronics13101884
crossref_primary_10_1007_s11042_022_13475_x
crossref_primary_10_1109_ACCESS_2024_3466611
crossref_primary_10_3389_fphy_2023_1315765
crossref_primary_10_1007_s11042_022_12680_y
crossref_primary_10_1016_j_jksuci_2021_12_011
crossref_primary_10_1016_j_jvcir_2022_103437
crossref_primary_10_3390_app11031146
crossref_primary_10_3390_electronics12194117
crossref_primary_10_1049_ipr2_12515
crossref_primary_10_3390_app11020619
crossref_primary_10_1007_s11042_022_13630_4
crossref_primary_10_1109_ACCESS_2020_3019832
crossref_primary_10_1016_j_vlsi_2021_11_004
crossref_primary_10_1007_s11042_020_09132_w
crossref_primary_10_1007_s11042_023_15999_2
Cites_doi 10.1016/j.jvcir.2016.04.023
10.1109/TIP.2003.819861
10.1016/j.patrec.2005.09.006
10.1007/s13042-017-0641-4
10.1016/j.sigpro.2009.02.009
10.1016/j.sigpro.2009.07.007
10.1016/j.patcog.2008.05.003
10.1007/s11042-015-2893-x
10.1007/s11042-007-0154-3
10.1049/iet-ifs.2010.0059
10.1109/TCOM.1979.1094560
10.1016/j.sigpro.2015.10.023
10.1007/s11042-015-2736-9
10.1201/9781420057133
10.1016/j.dsp.2010.04.006
10.1007/s11071-014-1777-3
10.1016/j.image.2014.09.001
10.1016/j.ins.2016.09.001
10.1117/1.1459449
10.1007/978-3-642-04431-1_10
10.1109/APSIPA.2017.8282151
10.1080/10798587.2011.10643147
10.1007/s11042-015-3010-x
10.1049/ip-vis:20040812
10.1016/j.sigpro.2011.11.013
10.1007/s11042-016-3328-z
ContentType Journal Article
Copyright Springer Science+Business Media, LLC, part of Springer Nature 2020
Springer Science+Business Media, LLC, part of Springer Nature 2020.
Copyright_xml – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020
– notice: Springer Science+Business Media, LLC, part of Springer Nature 2020.
DBID AAYXX
CITATION
3V.
7SC
7WY
7WZ
7XB
87Z
8AL
8AO
8FD
8FE
8FG
8FK
8FL
8G5
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
DWQXO
FRNLG
F~G
GNUQQ
GUQSH
HCIFZ
JQ2
K60
K6~
K7-
L.-
L7M
L~C
L~D
M0C
M0N
M2O
MBDVC
P5Z
P62
PHGZM
PHGZT
PKEHL
PQBIZ
PQBZA
PQEST
PQGLB
PQQKQ
PQUKI
Q9U
DOI 10.1007/s11042-020-08727-7
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Collection
Computing Database (Alumni Edition)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni Edition)
Research Library
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Business Premium Collection
Technology Collection
ProQuest One Community College
ProQuest Central
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
Research Library Prep
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database (Proquest)
ABI/INFORM Professional Advanced
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global
Computing Database
Research Library
Research Library (Corporate)
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central Basic
DatabaseTitle CrossRef
ABI/INFORM Global (Corporate)
ProQuest Business Collection (Alumni Edition)
ProQuest One Business
Research Library Prep
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
Research Library (Alumni Edition)
ProQuest Pharma Collection
ABI/INFORM Complete
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Research Library
ProQuest Central (New)
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
Advanced Technologies & Aerospace Collection
Business Premium Collection
ABI/INFORM Global
ProQuest Computing
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Business Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Business (Alumni)
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
Business Premium Collection (Alumni)
DatabaseTitleList
ABI/INFORM Global (Corporate)
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1573-7721
EndPage 18725
ExternalDocumentID 10_1007_s11042_020_08727_7
GrantInformation_xml – fundername: National Natural Science Foundation of China (NSFC) Under grants (61872303) and Technology Innovation Talent Program of Science & Technology Department of Sichuan Province(2018RZ0143).
  grantid: (61872303) and (2018RZ0143).
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29M
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
3EH
3V.
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
7WY
8AO
8FE
8FG
8FL
8G5
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFO
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACREN
ACSNA
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
AZQEC
B-.
BA0
BBWZM
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BPHCQ
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
DWQXO
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GROUPED_ABI_INFORM_COMPLETE
GUQSH
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IHE
IJ-
IKXTQ
ITG
ITH
ITM
IWAJR
IXC
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K60
K6V
K6~
K7-
KDC
KOV
KOW
LAK
LLZTM
M0C
M0N
M2O
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P62
P9O
PF0
PQBIZ
PQBZA
PQQKQ
PROAC
PT4
PT5
Q2X
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TH9
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7S
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z86
Z88
Z8M
Z8N
Z8Q
Z8R
Z8S
Z8T
Z8U
Z8W
Z92
ZMTXR
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
ADKFA
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
PUEGO
7SC
7XB
8AL
8FD
8FK
JQ2
L.-
L7M
L~C
L~D
MBDVC
PKEHL
PQEST
PQUKI
Q9U
ID FETCH-LOGICAL-c319t-ce78154507163ea8d2fc564528f49b7a6b7b62b464b99c1bb565d6f234d792753
IEDL.DBID BENPR
ISSN 1380-7501
IngestDate Fri Jul 25 23:55:47 EDT 2025
Wed Oct 01 02:50:42 EDT 2025
Thu Apr 24 23:09:30 EDT 2025
Fri Feb 21 02:37:33 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 25-26
Keywords Block truncation coding
Recovery performance
Fragile watermarking
Quantum chaos
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-ce78154507163ea8d2fc564528f49b7a6b7b62b464b99c1bb565d6f234d792753
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-1669-7696
PQID 2420902020
PQPubID 54626
PageCount 31
ParticipantIDs proquest_journals_2420902020
crossref_citationtrail_10_1007_s11042_020_08727_7
crossref_primary_10_1007_s11042_020_08727_7
springer_journals_10_1007_s11042_020_08727_7
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20200700
2020-07-00
20200701
PublicationDateYYYYMMDD 2020-07-01
PublicationDate_xml – month: 7
  year: 2020
  text: 20200700
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: Dordrecht
PublicationSubtitle An International Journal
PublicationTitle Multimedia tools and applications
PublicationTitleAbbrev Multimed Tools Appl
PublicationYear 2020
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References HeHZhangJTaiHSelf-recovery fragile watermarking using block-neighborhood tampering characterizationProc information hiding2009200913214510.1007/978-3-642-04431-1_10
QinCChangC-CChenP-YSelf-embedding fragile watermarking with restoration capability based on an adaptive bit allocation mechanismSignal Process2012921137115010.1016/j.sigpro.2011.11.013
SinghDSinghSKEffective self-embedding watermarking scheme for image tampered detection and localization with recovery capabilityJ Vis Commun Image Represent20163877578910.1016/j.jvcir.2016.04.023
Wei L, Chia-Chen L, Jeng-Shyang P. (2016). Novel image authentication scheme with fine image quality for BTC-based compressed images. Multimedia Tools and Applications75:4771–4793.
YangC-WShenJ-JRecover the tampered image based on VQ indexingSignal Process20109033134310.1016/j.sigpro.2009.07.007
Betancourth GP. (2012). Fragile watermarking scheme for image authentication. Proc. Human System Interactions (HSI), 2012 5th International Conference, 2012:168-74.
Fridrich, J. (1999). Protection of digital images using self-embedding. Proc. Symposium on Content Security and Data Hiding in Digital Media, Institute of Technology, New Jersey, USA.
HaouziaANoumeirRMethods for image authentication: a surveyMultimed Tools Appl20083914610.1007/s11042-007-0154-3
HeH-JZhangJ-SChenFAdjacent-block based statistical detection method for self-embedding watermarking techniquesSignal Process2009891557156610.1016/j.sigpro.2009.02.009
FridrichJGoljanMImages with self-correcting capabilitiesProc international conference on image processing199919993792796
ChangC-CHuY-SLuT-CWatermarking-based image ownership and tampering authentication schemePattern Recogn Lett20062743944610.1016/j.patrec.2005.09.006
Hemida O, Huo Y, Chen F, He H. (2017). Block-DCT based alterable-coding restorable fragile watermarking scheme with superior localization. Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), IEEE,2017, 2017:846-51.
LiuZZhangFWangJWangHHuangJAuthentication and recovery algorithm for speech signal based on digital watermarkingSignal Process201612315716610.1016/j.sigpro.2015.10.023
SinghDSinghSKDCT based efficient fragile watermarking scheme for image authentication and restorationMultimed Tools Appl20177695397710.1007/s11042-015-3010-x
Stinson DR (2005) Cryptography: theory and practice. CRC press
NyeemHBolesWBoydCModeling attacks on self-authentication watermarkingMultimed Tools Appl201675158491588010.1007/s11042-015-2893-x
FridrichJJGoljanMMemonNDCryptanalysis of the Yeung-Mintzer fragile watermarking techniqueJournal of Electronic Imaging20021126227410.1117/1.1459449
Hemida O, Huo Y, He H, Chen F (2018) A restorable fragile watermarking scheme with superior localization for both natural and text images. Multimed Tools Appl
Lin P-L, Huang P-W, Peng A-W. (2004) A fragile watermarking scheme for image authentication with localization and recovery. Proc. Multimedia Software Engineering, 2004. Proceedings. IEEE Sixth International Symposium on, 146-53.
DadkhahSManafAAHoriYHassanienAESadeghiSAn effective SVD-based image tampering detection and self-recovery using active watermarkingSignal Process Image Commun2014291197121010.1016/j.image.2014.09.001
BenrhoumaOHermassiHBelghithSTamper detection and self-recovery scheme by DWT watermarkingNonlinear Dynamics2015791817183310.1007/s11071-014-1777-3
LiC-TDigital fragile watermarking scheme for authentication of JPEG imagesIEE proceedings-vision, image and signal processing200415146046610.1049/ip-vis:20040812
SreenivasKPrasadVKFragile watermarking schemes for image authentication: a surveyInt J Mach Learn Cybern201891193121810.1007/s13042-017-0641-4
Zain JM, Fauzi AR. (2006). Medical image watermarking with tamper detection and recovery. Proc. Engineering in Medicine and Biology Society, 2006. EMBS'06. 28th Annual International Conference of the IEEE, 2006:3270-3.
Behnia S, Ayubi P, Soltanpoor W. (2012). Image encryption based on quantum chaotic map and FSM transforms. Proc. Telecommunications Network Strategy and Planning Symposium (NETWORKS), 2012 XVth International, 2012:1-6.
DelpEJMitchellORImage compression using block truncation codingIEEE Trans Commun1979271335134210.1109/TCOM.1979.1094560
WangZBovikACSheikhHRSimoncelliEPImage quality assessment: from error visibility to structural similarityIEEE Trans Image Process20041360061210.1109/TIP.2003.819861
Huo Y, Chen F, He H, Yin Z. (2010). An alterable-capacity authentication watermarking algorithm with superior localization. Proc. Information Theory and Information Security (ICITIS), 2010 IEEE International Conference, 2010:608-11.
QianZFengGZhangXWangSImage self-embedding with high-quality restoration capabilityDigital Signal Processing20112127828610.1016/j.dsp.2010.04.006
ShiHWangXHLiMCBaiJFengBSecure variable-capacity self-recovery watermarking schemeMultimed Tools Appl2017766941697210.1007/s11042-016-3328-z
Singh D, Singh SK. (2017). Block Truncation Coding based effective watermarking scheme for image authentication with recovery capability. Multimedia Tools and Applications:1–19.
PiperASafavi-NainiRScalable fragile watermarking for image authenticationIET Inf Secur2013730031110.1049/iet-ifs.2010.0059
QinCWangHZhangXSunXSelf-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding modeInf Sci201637323325010.1016/j.ins.2016.09.001
LeeT-YLinSDDual watermark for image tamper detection and recoveryPattern Recogn2008413497350610.1016/j.patcog.2008.05.003
H-bZYangCTamper detection and self-recovery of images using self-embeddingActa Electron Sin200432196199
SinghPAgarwalSAn efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selectionMultimed Tools Appl2016758165819410.1007/s11042-015-2736-9
EdupugantiVGShihFYChangI-CAn efficient block-based fragile watermarking system for tamper localization and recoveryIntelligent Automation & Soft Computing20111725726710.1080/10798587.2011.10643147
C-C Chang (8727_CR4) 2006; 27
H Shi (8727_CR27) 2017; 76
O Benrhouma (8727_CR2) 2015; 79
C Qin (8727_CR25) 2012; 92
8727_CR20
C Qin (8727_CR26) 2016; 373
8727_CR8
T-Y Lee (8727_CR18) 2008; 41
8727_CR3
JJ Fridrich (8727_CR10) 2002; 11
8727_CR1
D Singh (8727_CR31) 2017; 76
A Piper (8727_CR23) 2013; 7
H He (8727_CR14) 2009; 2009
8727_CR30
A Haouzia (8727_CR11) 2008; 39
Z Liu (8727_CR21) 2016; 123
H Nyeem (8727_CR22) 2016; 75
J Fridrich (8727_CR9) 1999; 1999
K Sreenivas (8727_CR32) 2018; 9
Z Wang (8727_CR34) 2004; 13
8727_CR35
VG Edupuganti (8727_CR7) 2011; 17
8727_CR16
8727_CR15
Z Qian (8727_CR24) 2011; 21
8727_CR37
C-W Yang (8727_CR36) 2010; 90
Z H-b (8727_CR12) 2004; 32
8727_CR33
EJ Delp (8727_CR6) 1979; 27
D Singh (8727_CR29) 2016; 38
H-J He (8727_CR13) 2009; 89
8727_CR17
C-T Li (8727_CR19) 2004; 151
P Singh (8727_CR28) 2016; 75
S Dadkhah (8727_CR5) 2014; 29
References_xml – reference: FridrichJJGoljanMMemonNDCryptanalysis of the Yeung-Mintzer fragile watermarking techniqueJournal of Electronic Imaging20021126227410.1117/1.1459449
– reference: Lin P-L, Huang P-W, Peng A-W. (2004) A fragile watermarking scheme for image authentication with localization and recovery. Proc. Multimedia Software Engineering, 2004. Proceedings. IEEE Sixth International Symposium on, 146-53.
– reference: NyeemHBolesWBoydCModeling attacks on self-authentication watermarkingMultimed Tools Appl201675158491588010.1007/s11042-015-2893-x
– reference: HaouziaANoumeirRMethods for image authentication: a surveyMultimed Tools Appl20083914610.1007/s11042-007-0154-3
– reference: QinCChangC-CChenP-YSelf-embedding fragile watermarking with restoration capability based on an adaptive bit allocation mechanismSignal Process2012921137115010.1016/j.sigpro.2011.11.013
– reference: Hemida O, Huo Y, He H, Chen F (2018) A restorable fragile watermarking scheme with superior localization for both natural and text images. Multimed Tools Appl
– reference: ShiHWangXHLiMCBaiJFengBSecure variable-capacity self-recovery watermarking schemeMultimed Tools Appl2017766941697210.1007/s11042-016-3328-z
– reference: LiC-TDigital fragile watermarking scheme for authentication of JPEG imagesIEE proceedings-vision, image and signal processing200415146046610.1049/ip-vis:20040812
– reference: ChangC-CHuY-SLuT-CWatermarking-based image ownership and tampering authentication schemePattern Recogn Lett20062743944610.1016/j.patrec.2005.09.006
– reference: QinCWangHZhangXSunXSelf-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding modeInf Sci201637323325010.1016/j.ins.2016.09.001
– reference: QianZFengGZhangXWangSImage self-embedding with high-quality restoration capabilityDigital Signal Processing20112127828610.1016/j.dsp.2010.04.006
– reference: DelpEJMitchellORImage compression using block truncation codingIEEE Trans Commun1979271335134210.1109/TCOM.1979.1094560
– reference: BenrhoumaOHermassiHBelghithSTamper detection and self-recovery scheme by DWT watermarkingNonlinear Dynamics2015791817183310.1007/s11071-014-1777-3
– reference: SinghDSinghSKEffective self-embedding watermarking scheme for image tampered detection and localization with recovery capabilityJ Vis Commun Image Represent20163877578910.1016/j.jvcir.2016.04.023
– reference: HeH-JZhangJ-SChenFAdjacent-block based statistical detection method for self-embedding watermarking techniquesSignal Process2009891557156610.1016/j.sigpro.2009.02.009
– reference: PiperASafavi-NainiRScalable fragile watermarking for image authenticationIET Inf Secur2013730031110.1049/iet-ifs.2010.0059
– reference: SreenivasKPrasadVKFragile watermarking schemes for image authentication: a surveyInt J Mach Learn Cybern201891193121810.1007/s13042-017-0641-4
– reference: EdupugantiVGShihFYChangI-CAn efficient block-based fragile watermarking system for tamper localization and recoveryIntelligent Automation & Soft Computing20111725726710.1080/10798587.2011.10643147
– reference: Hemida O, Huo Y, Chen F, He H. (2017). Block-DCT based alterable-coding restorable fragile watermarking scheme with superior localization. Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), IEEE,2017, 2017:846-51.
– reference: Singh D, Singh SK. (2017). Block Truncation Coding based effective watermarking scheme for image authentication with recovery capability. Multimedia Tools and Applications:1–19.
– reference: HeHZhangJTaiHSelf-recovery fragile watermarking using block-neighborhood tampering characterizationProc information hiding2009200913214510.1007/978-3-642-04431-1_10
– reference: LeeT-YLinSDDual watermark for image tamper detection and recoveryPattern Recogn2008413497350610.1016/j.patcog.2008.05.003
– reference: SinghPAgarwalSAn efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selectionMultimed Tools Appl2016758165819410.1007/s11042-015-2736-9
– reference: H-bZYangCTamper detection and self-recovery of images using self-embeddingActa Electron Sin200432196199
– reference: Fridrich, J. (1999). Protection of digital images using self-embedding. Proc. Symposium on Content Security and Data Hiding in Digital Media, Institute of Technology, New Jersey, USA.
– reference: YangC-WShenJ-JRecover the tampered image based on VQ indexingSignal Process20109033134310.1016/j.sigpro.2009.07.007
– reference: Betancourth GP. (2012). Fragile watermarking scheme for image authentication. Proc. Human System Interactions (HSI), 2012 5th International Conference, 2012:168-74.
– reference: DadkhahSManafAAHoriYHassanienAESadeghiSAn effective SVD-based image tampering detection and self-recovery using active watermarkingSignal Process Image Commun2014291197121010.1016/j.image.2014.09.001
– reference: SinghDSinghSKDCT based efficient fragile watermarking scheme for image authentication and restorationMultimed Tools Appl20177695397710.1007/s11042-015-3010-x
– reference: Zain JM, Fauzi AR. (2006). Medical image watermarking with tamper detection and recovery. Proc. Engineering in Medicine and Biology Society, 2006. EMBS'06. 28th Annual International Conference of the IEEE, 2006:3270-3.
– reference: FridrichJGoljanMImages with self-correcting capabilitiesProc international conference on image processing199919993792796
– reference: LiuZZhangFWangJWangHHuangJAuthentication and recovery algorithm for speech signal based on digital watermarkingSignal Process201612315716610.1016/j.sigpro.2015.10.023
– reference: Stinson DR (2005) Cryptography: theory and practice. CRC press
– reference: Huo Y, Chen F, He H, Yin Z. (2010). An alterable-capacity authentication watermarking algorithm with superior localization. Proc. Information Theory and Information Security (ICITIS), 2010 IEEE International Conference, 2010:608-11.
– reference: WangZBovikACSheikhHRSimoncelliEPImage quality assessment: from error visibility to structural similarityIEEE Trans Image Process20041360061210.1109/TIP.2003.819861
– reference: Behnia S, Ayubi P, Soltanpoor W. (2012). Image encryption based on quantum chaotic map and FSM transforms. Proc. Telecommunications Network Strategy and Planning Symposium (NETWORKS), 2012 XVth International, 2012:1-6.
– reference: Wei L, Chia-Chen L, Jeng-Shyang P. (2016). Novel image authentication scheme with fine image quality for BTC-based compressed images. Multimedia Tools and Applications75:4771–4793.
– volume: 38
  start-page: 775
  year: 2016
  ident: 8727_CR29
  publication-title: J Vis Commun Image Represent
  doi: 10.1016/j.jvcir.2016.04.023
– volume: 13
  start-page: 600
  year: 2004
  ident: 8727_CR34
  publication-title: IEEE Trans Image Process
  doi: 10.1109/TIP.2003.819861
– volume: 27
  start-page: 439
  year: 2006
  ident: 8727_CR4
  publication-title: Pattern Recogn Lett
  doi: 10.1016/j.patrec.2005.09.006
– volume: 9
  start-page: 1193
  year: 2018
  ident: 8727_CR32
  publication-title: Int J Mach Learn Cybern
  doi: 10.1007/s13042-017-0641-4
– ident: 8727_CR8
– volume: 89
  start-page: 1557
  year: 2009
  ident: 8727_CR13
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2009.02.009
– ident: 8727_CR20
– volume: 90
  start-page: 331
  year: 2010
  ident: 8727_CR36
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2009.07.007
– ident: 8727_CR1
– ident: 8727_CR3
– volume: 32
  start-page: 196
  year: 2004
  ident: 8727_CR12
  publication-title: Acta Electron Sin
– volume: 41
  start-page: 3497
  year: 2008
  ident: 8727_CR18
  publication-title: Pattern Recogn
  doi: 10.1016/j.patcog.2008.05.003
– volume: 1999
  start-page: 792
  issue: 3
  year: 1999
  ident: 8727_CR9
  publication-title: Proc international conference on image processing
– volume: 75
  start-page: 15849
  year: 2016
  ident: 8727_CR22
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-015-2893-x
– ident: 8727_CR30
– volume: 39
  start-page: 1
  year: 2008
  ident: 8727_CR11
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-007-0154-3
– ident: 8727_CR15
– volume: 7
  start-page: 300
  year: 2013
  ident: 8727_CR23
  publication-title: IET Inf Secur
  doi: 10.1049/iet-ifs.2010.0059
– ident: 8727_CR17
– volume: 27
  start-page: 1335
  year: 1979
  ident: 8727_CR6
  publication-title: IEEE Trans Commun
  doi: 10.1109/TCOM.1979.1094560
– volume: 123
  start-page: 157
  year: 2016
  ident: 8727_CR21
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2015.10.023
– volume: 75
  start-page: 8165
  year: 2016
  ident: 8727_CR28
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-015-2736-9
– ident: 8727_CR33
  doi: 10.1201/9781420057133
– volume: 21
  start-page: 278
  year: 2011
  ident: 8727_CR24
  publication-title: Digital Signal Processing
  doi: 10.1016/j.dsp.2010.04.006
– volume: 79
  start-page: 1817
  year: 2015
  ident: 8727_CR2
  publication-title: Nonlinear Dynamics
  doi: 10.1007/s11071-014-1777-3
– volume: 29
  start-page: 1197
  year: 2014
  ident: 8727_CR5
  publication-title: Signal Process Image Commun
  doi: 10.1016/j.image.2014.09.001
– volume: 373
  start-page: 233
  year: 2016
  ident: 8727_CR26
  publication-title: Inf Sci
  doi: 10.1016/j.ins.2016.09.001
– volume: 11
  start-page: 262
  year: 2002
  ident: 8727_CR10
  publication-title: Journal of Electronic Imaging
  doi: 10.1117/1.1459449
– ident: 8727_CR37
– volume: 2009
  start-page: 132
  year: 2009
  ident: 8727_CR14
  publication-title: Proc information hiding
  doi: 10.1007/978-3-642-04431-1_10
– ident: 8727_CR16
  doi: 10.1109/APSIPA.2017.8282151
– volume: 17
  start-page: 257
  year: 2011
  ident: 8727_CR7
  publication-title: Intelligent Automation & Soft Computing
  doi: 10.1080/10798587.2011.10643147
– volume: 76
  start-page: 953
  year: 2017
  ident: 8727_CR31
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-015-3010-x
– ident: 8727_CR35
– volume: 151
  start-page: 460
  year: 2004
  ident: 8727_CR19
  publication-title: IEE proceedings-vision, image and signal processing
  doi: 10.1049/ip-vis:20040812
– volume: 92
  start-page: 1137
  year: 2012
  ident: 8727_CR25
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2011.11.013
– volume: 76
  start-page: 6941
  year: 2017
  ident: 8727_CR27
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-016-3328-z
SSID ssj0016524
Score 2.3383913
Snippet To take into account the invisibility, recovery quality, detection ability, and security, a new digital image fragile watermarking method based on block...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 18695
SubjectTerms Algorithms
Coding
Computer Communication Networks
Computer Science
Data recovery
Data Structures and Information Theory
Digital imaging
Image classification
Image detection
Image quality
Localization
Mapping
Multimedia
Multimedia Information Systems
Security
Special Purpose and Application-Based Systems
Visibility
Watermarking
SummonAdditionalLinks – databaseName: SpringerLink Journals (ICM)
  dbid: U2A
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFA86L3rwYypOp-TgTQNL2ibtcYhjCHpyMLyUfCK4dWo3xP_ely5dVVSQHtvm8D7y-728vPcQOk-k9NOiIyJ4xgnw_4TIKHGE-hydNlo45wuFb-_4cBTfjJNxKAor69vudUqy2qmbYjfqS0l8uNNLAXWJWEcbiW_nBVY8Yv1V7oAnYZRt2iOAhzSUyvy8xlc4ajjmt7RohTaDXbQdaCLuL_W6h9Zs0UY79QgGHDyyjbY-9RPcRw99XNqJIz7KBRN9x2-y2nmr83AMcaydWuxxy-BZgRXg2BOevy6K5bEd1jMPZFgWBr8sQOKLKdaPclbiqXw-QKPB9f3VkIThCUSDV82JtiL19AgoBI-sTA1z2neOYamLMyUkV0JxpmIeqyzTVClgdoY7FsVGZAyCmEPUKmaFPUI4SoBmOKZ7WuqYCap4ZLihKjPgvSqjHURrGeY6dBb3Ay4medMT2cs9B7nnldxz0UEXq3-el301_vy6W6smDz5W5kAu_KVSeDroslZX8_r31Y7_9_kJ2mSVxfg7ul3UAr3YU2Aic3VWGd4HECrR0g
  priority: 102
  providerName: Springer Nature
Title A self-recovery watermarking scheme based on block truncation coding and quantum chaos map
URI https://link.springer.com/article/10.1007/s11042-020-08727-7
https://www.proquest.com/docview/2420902020
Volume 79
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1573-7721
  dateEnd: 20241102
  omitProxy: false
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: ADMLS
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVLSH
  databaseName: SpringerLink Journals
  customDbUrl:
  mediaType: online
  eissn: 1573-7721
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: AFBBN
  dateStart: 19970101
  isFulltext: true
  providerName: Library Specific Holdings
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1573-7721
  dateEnd: 20241102
  omitProxy: true
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: BENPR
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 1573-7721
  dateEnd: 20241102
  omitProxy: true
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: 8FG
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: SpringerLINK - Czech Republic Consortium
  customDbUrl:
  eissn: 1573-7721
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: AGYKE
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://link.springer.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink Journals (ICM)
  customDbUrl:
  eissn: 1573-7721
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: U2A
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://www.springerlink.com/journals/
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT9tAEB5BcoEDFChqgEZ76I2uiNf2rn1AKK0SEBVRVTUS9GLtwxZSiR1IIsS_Z8ZZE6hU5Jtfh3nsfLOzMx_Al1hrYosOuZKp5Ij_Y67DuOAB1eiss6ooqFH4aiQvxtHldXy9BqOmF4aOVTZrYr1Qu8rSHvkJhhI6QojX2fSeE2sUVVcbCg3tqRXcaT1ibB3agiZjtaD9bTD6-eulriBjT3Ob9DjGysC30Syb6QJqVaF0qpdgVOfqbaha4c9_SqZ1JBp-gC0PIVl_qfMdWMvLXdhu6BmY99Zd2Hw1a3AP_vTZLL8rOGXAaL5P7FHXq3K9V84wx80nOaOY5lhVMoMx7i-bPyzK5ZYesxUFOaZLx-4XqI3FhNlbXc3YRE8_wng4-P39gntiBW7R4-bc5ioh6ITwQoa5TpwoLE2VEUkRpUZpaZSRwkQyMmlqA2MQ9TlZiDByKhWY4OxDq6zK_BOwMEYIUgjbs9pGQgVGhk66wKQOPdukQQeCRoaZ9VPHifziLlvNSya5Zyj3rJZ7pjpw_PLNdDlz4923jxrVZN7_ZtnKWjrwtVHX6vH__3bw_t8OYUPUFkLndY-ghXrIPyMqmZsurCfD8y60--c3PwZdb3h4dyz6zyPU3q8
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9xADLYQHNoeKI9WLIUyBzjRUTeTZCY5oAooaCmwqiqQUC_pvCIk2GTp7grx5_rbamcnbFup3FCOSeZge_zZ47E_gO1Ua2KLjrmSueQY_6dcx2nJI6rRWWdVWVKj8Hlf9i6TL1fp1Rz8anth6Fpl6xMbR-1qS2fkHxFK6AohPp-Gd5xYo6i62lJo6ECt4PaaEWOhsePUP9xjCjfaO_mM-t4R4vjo4rDHA8sAt2h-Y269yiiOQKyVsdeZE6WlESsiK5PcKC2NMlKYRCYmz21kDIZATpYiTpzKhSLWCISAhSROckz-Fg6O-l-_PdYxZBpodbMuR2yOQtvOtHkvotYYSt-6GUYRXP0NjbN4958SbYN8x0uwGEJWtj-1sWWY89UKvG7pIFjwDivw6o_ZhqvwfZ-N_G3JKePG7fLA7nWDAs3ZPMOc2g88Iwx1rK6YQUy9YeOfk2p6hMhsTaDKdOXY3QS1Pxkwe63rERvo4Ru4fBYRv4X5qq78GrA4xZCnFLZrtU2EioyMnXSRyR16EpNHHYhaGRY2TDknso3bYjafmeReoNyLRu6F6sDu4z_D6YyPJ7_eaFVThP0-KmbW2YEPrbpmr_-_2vrTq23Bi97F-VlxdtI_fQcvRWMtdFd4A-ZRJ34TI6KxeR_MjsGP57b033fQFs8
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JTtxAEC0hIkVwyMIihpCkD8kJWozbdrd9iCIUMmwJ4gAS4mJ6FVIYe2BmhPi1fF2qvDAkUrghH233oep1varuWgA-pVrTtOiYK5lLjv5_ynWcBh7RHZ11VoVAhcI_j-X-WXJ4np7Pwe-uFobSKjubWBtqV1k6I99GKqEUQny2Q5sWcbI7-Dq64TRBim5au3EaDUSO_P0dhm_jLwe7qOvPQgy-n37b5-2EAW4RehNuvcrIh0CelbHXmRPBUnsVkYUkN0pLo4wUJpGJyXMbGYPuj5NBxIlTuVA0MQLN_wtFXdypSn2w93CDIdN2oG7W58jKUVuw05TtRVQUQ4FbP0P_gau_SXHm6f5zOVtz3uANvGqdVbbToOstzPlyCV53gyBYaxeWYPFRV8NluNhhY38dOMXauFHu2Z2u7X99Ks8wmvZDz4g9HatKZpBNf7HJ7bRsDg-ZrYhOmS4du5mi3qdDZq90NWZDPVqBs2cR8CrMl1Xp14DFKTo7Qdi-1TYRKjIydtJFJndoQ0we9SDqZFjYtr85jdm4LmadmUnuBcq9qOVeqB5sPvwzarp7PPn1Rqeaot3p42KGyx5sdeqavf7_autPr_YRXiK-ix8Hx0fvYEHUYKEk4Q2YR5X49-gKTcyHGnMMLp8b5H8AvaYUaQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+self-recovery+watermarking+scheme+based+on+block+truncation+coding+and+quantum+chaos+map&rft.jtitle=Multimedia+tools+and+applications&rft.au=Hemida+Omer&rft.au=He%2C+Hongjie&rft.date=2020-07-01&rft.pub=Springer+Nature+B.V&rft.issn=1380-7501&rft.eissn=1573-7721&rft.volume=79&rft.issue=25-26&rft.spage=18695&rft.epage=18725&rft_id=info:doi/10.1007%2Fs11042-020-08727-7&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1380-7501&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1380-7501&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1380-7501&client=summon