TCBR and TCBD: Evaluation metrics for tamper coincidence problem in fragile image watermarking
This paper proposed two evaluation metrics of the tamper coincidence in a block map design for image watermarking. These evaluation metrics are called Tamper Coincidence Block Ratio (TCBR) and Tamper Coincidence Block Density (TCBD). A tamper coincidence occurred in image authentication and self-rec...
| Main Authors: | Afrig, Aminuddin, Ferda, Ernawan, Eh Phon, Danakorn Nincarean, Agit, Amrullah, Dhani, Ariatmanto |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier Ltd
2024
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/42289/ http://umpir.ump.edu.my/id/eprint/42289/1/TCBR%20and%20TCBD_Evaluation%20metrics%20for%20tamper%20coincidence%20problem.pdf |
Similar Items
TDSF: Two-phase tamper detection in semi-fragile watermarking using two-level integer wavelet transform
by: Amrullah, Agit, et al.
Published: (2025)
by: Amrullah, Agit, et al.
Published: (2025)
Self-Recovery in Fragile Image Watermarking Using Integer Wavelet Transform
by: Ernawan, Ferda, et al.
Published: (2022)
by: Ernawan, Ferda, et al.
Published: (2022)
AuSR3: A new block mapping technique for image authentication and self-recovery to avoid the tamper coincidence problem
by: Afrig, Aminuddin, et al.
Published: (2023)
by: Afrig, Aminuddin, et al.
Published: (2023)
Fragile watermarking scheme based on SHA-256 hash function and mersenne twister for medical image authentication
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
An adaptive scaling factor for multiple watermarking scheme
by: Dhani, Ariatmanto, et al.
Published: (2019)
by: Dhani, Ariatmanto, et al.
Published: (2019)
An improved robust image watermarking by using different embedding strengths
by: Ernawan, Ferda, et al.
Published: (2020)
by: Ernawan, Ferda, et al.
Published: (2020)
Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking
by: Ariatmanto, Dhani, et al.
Published: (2020)
by: Ariatmanto, Dhani, et al.
Published: (2020)
AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
Image watermarking based on integer wavelet transform-singular value decomposition and variance pixels
by: Ferda, Ernawan, et al.
Published: (2018)
by: Ferda, Ernawan, et al.
Published: (2018)
An efficient adaptive scaling factor for 4×4 DCT image watermarking
by: Ernawan, Ferda, et al.
Published: (2023)
by: Ernawan, Ferda, et al.
Published: (2023)
A recent survey on image watermarking using scaling factor techniques for copyright protection
by: Ernawan, Ferda, et al.
Published: (2023)
by: Ernawan, Ferda, et al.
Published: (2023)
AuSR1 : Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
An Improved Image Watermarking by Modifying Selected DWT-DCT Coefficients
by: Ernawan, Ferda, et al.
Published: (2021)
by: Ernawan, Ferda, et al.
Published: (2021)
Image watermarking based on integer wavelet transform-singular value decomposition with variance pixels
by: Ernawan, F., et al.
Published: (2019)
by: Ernawan, F., et al.
Published: (2019)
Analysis of LTE performance of V2V communications on indonesia toll road
by: Amrullah, Agit, et al.
Published: (2023)
by: Amrullah, Agit, et al.
Published: (2023)
Three layer authentications with a spiral block mapping to prove authenticity in medical images
by: Ernawan, Ferda, et al.
Published: (2022)
by: Ernawan, Ferda, et al.
Published: (2022)
An improved robust watermarking scheme using flexible scaling factor
by: Ferda, Ernawan, et al.
Published: (2020)
by: Ferda, Ernawan, et al.
Published: (2020)
Fragile watermarking for image authentication using dyadic walsh ordering
by: Adi, Prajanto Wahyu, et al.
Published: (2023)
by: Adi, Prajanto Wahyu, et al.
Published: (2023)
Fingerprint Watermarking with Tamper Detection
by: Jasni, Mohamad Zain, et al.
Published: (2006)
by: Jasni, Mohamad Zain, et al.
Published: (2006)
Tamper detection in RFID tags, using, fragile watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
Fragile and robust dual image watermarking based on DWT-SVD
by: Ernawan, Ferda, et al.
Published: (2024)
by: Ernawan, Ferda, et al.
Published: (2024)
Teacher's ICT skills and readiness of integrating augmented reality in education
by: Azrie, Salleh, et al.
Published: (2021)
by: Azrie, Salleh, et al.
Published: (2021)
A blind recovery technique with integer wavelet transforms in image watermarking
by: Ernawan, Ferda, et al.
Published: (2023)
by: Ernawan, Ferda, et al.
Published: (2023)
Mobile learning application impact towards student performance in programming subject
by: Nurul Farahah, Abdul Halim, et al.
Published: (2020)
by: Nurul Farahah, Abdul Halim, et al.
Published: (2020)
Fragile Image Watermarking For Medical Images
by: Jasni, Mohamad Zain, et al.
Published: (2006)
by: Jasni, Mohamad Zain, et al.
Published: (2006)
A new multi-frames watermarking technique for tamper detection and recovery
by: Khor, Hui Liang
Published: (2017)
by: Khor, Hui Liang
Published: (2017)
Robust Image Watermarking based on Psychovisual Threshold
by: Ernawan, Ferda
Published: (2016)
by: Ernawan, Ferda
Published: (2016)
AuSR2: Image watermarking technique for authentication and self-recovery with image texture preservation
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
Tamper Localization and Lossless Recovery Watermarking Scheme with ROI Segmentation and Multilevel Authentication
by: Liew, Siau-Chuin, et al.
Published: (2013)
by: Liew, Siau-Chuin, et al.
Published: (2013)
Using Spiral Scan Technique for Medical Image Watermarking with Tamper Detection and Recovery
by: Afifah Nailah, Muhamad, et al.
Published: (2007)
by: Afifah Nailah, Muhamad, et al.
Published: (2007)
Physical distancing system using computer vision
by: Kartikawati, Lili, et al.
Published: (2021)
by: Kartikawati, Lili, et al.
Published: (2021)
Experiment of Tamper Detection and Recovery Watermarking in PACS
by: Siau-Chuin, Liew, et al.
Published: (2010)
by: Siau-Chuin, Liew, et al.
Published: (2010)
Tamper Localization and Recovery Medical Image Watermarking: A Review
by: Badshah, Gran, et al.
Published: (2012)
by: Badshah, Gran, et al.
Published: (2012)
Tchebichef image watermarking along the edge using YCoCg-R color space for copyright protection
by: Ernawan, Ferda
Published: (2019)
by: Ernawan, Ferda
Published: (2019)
Reversible Medical Image Watermarking for Tamper Detection and Recovery with Run Length Encoding Compression
by: Liew, Siau-Chuin, et al.
Published: (2010)
by: Liew, Siau-Chuin, et al.
Published: (2010)
Recovery And Tamper Localization For Reversible Iris Image Watermarking Scheme Using Hash Function
by: Muhammad Alif Aiman, Abd Samad
Published: (2023)
by: Muhammad Alif Aiman, Abd Samad
Published: (2023)
Tamper localization and recovery watermarking schemes for medical images in PACS
by: Liew, Siew Chuin
Published: (2011)
by: Liew, Siew Chuin
Published: (2011)
Coincidence detection using spiking neurons with application to face recognition
by: Kamaruzaman, Fadhlan, et al.
Published: (2015)
by: Kamaruzaman, Fadhlan, et al.
Published: (2015)
Foodie – Homemade food ordering application for food business
by: Wei Chuan, Cheah, et al.
Published: (2021)
by: Wei Chuan, Cheah, et al.
Published: (2021)
Fingerprint watermarking with tamper localization and exact recovery using multi-level authentication
by: Wei, Keat Lee, et al.
Published: (2018)
by: Wei, Keat Lee, et al.
Published: (2018)
Similar Items
-
TDSF: Two-phase tamper detection in semi-fragile watermarking using two-level integer wavelet transform
by: Amrullah, Agit, et al.
Published: (2025) -
Self-Recovery in Fragile Image Watermarking Using Integer Wavelet Transform
by: Ernawan, Ferda, et al.
Published: (2022) -
AuSR3: A new block mapping technique for image authentication and self-recovery to avoid the tamper coincidence problem
by: Afrig, Aminuddin, et al.
Published: (2023) -
Fragile watermarking scheme based on SHA-256 hash function and mersenne twister for medical image authentication
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020) -
An adaptive scaling factor for multiple watermarking scheme
by: Dhani, Ariatmanto, et al.
Published: (2019)