메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색

논문 기본 정보

자료유형
학술저널
저자정보
저널정보
한국정보처리학회 JIPS(Journal of Information Processing Systems) JIPS(Journal of Information Processing Systems) 제14권 제2호
발행연도
2018.1
수록면
510 - 522 (13page)

이용수

표지
📌
연구주제
📖
연구배경
🔬
연구방법
🏆
연구결과
AI에게 요청하기
추천
검색

초록· 키워드

오류제보하기
As the major source of information, digital images play an indispensable role in our lives. However, with thedevelopment of image processing techniques, people can optionally retouch or even forge an image by usingimage processing software. Therefore, the authenticity and integrity of digital images are facing severechallenge. To resolve this issue, the fragile watermarking schemes for image authentication have beenproposed. According to different purposes, the fragile watermarking can be divided into two categories:fragile watermarking for tamper localization and fragile watermarking with recovery ability. The fragilewatermarking for image tamper localization can only identify and locate the tampered regions, but it cannotfurther restore the modified regions. In some cases, image recovery for tampered regions is very essential. Generally, the fragile watermarking for image authentication and recovery includes three procedures:watermark generation and embedding, tamper localization, and image self-recovery. In this article, we make areview on self-embedding fragile watermarking methods. The basic model and the evaluation indexes of thiswatermarking scheme are presented in this paper. Some related works proposed in recent years and theiradvantages and disadvantages are described in detail to help the future research in this field. Based on theanalysis, we give the future research prospects and suggestions in the end.

목차

등록된 정보가 없습니다.

참고문헌 (30)

참고문헌 신청

함께 읽어보면 좋을 논문

논문 유사도에 따라 DBpia 가 추천하는 논문입니다. 함께 보면 좋을 연관 논문을 확인해보세요!

이 논문의 저자 정보

최근 본 자료

전체보기

댓글(0)

0