2022
DOI: 10.1016/j.neucom.2022.02.083
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive survey on robust image watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 128 publications
(55 citation statements)
references
References 164 publications
0
19
0
Order By: Relevance
“…To make a more objective comparison with other schemes, we use the widely recognized evaluation metrics, among which invisibility is evaluated with peak signal-to-noise ratio (PSNR) 31 and structural similarity index metric (SSIM) 32 and robustness is evaluated with normalized cross-correlation (NC), 37 and bit error rate (BER). 35,54 The definitions of these evaluation metrics are shown in Equations ( 7)-( 10):…”
Section: Data Set and Metricsmentioning
confidence: 99%
See 1 more Smart Citation
“…To make a more objective comparison with other schemes, we use the widely recognized evaluation metrics, among which invisibility is evaluated with peak signal-to-noise ratio (PSNR) 31 and structural similarity index metric (SSIM) 32 and robustness is evaluated with normalized cross-correlation (NC), 37 and bit error rate (BER). 35,54 The definitions of these evaluation metrics are shown in Equations ( 7)-( 10):…”
Section: Data Set and Metricsmentioning
confidence: 99%
“…To make a more objective comparison with other schemes, we use the widely recognized evaluation metrics, among which invisibility is evaluated with peak signal‐to‐noise ratio ( PSNR ) 31 and structural similarity index metric ( SSIM ) 32 and robustness is evaluated with normalized cross‐correlation ( NC ), 37 and bit error rate ( BER ) 35,54 . The definitions of these evaluation metrics are shown in Equations (7)–(10): PSNR=10log102552×3×M×Nlev=13i=1Mj=1N[HI(i,j,lev)WHI(i,j,lev)]2, $PSNR=10{\mathrm{log}}_{10}\left(\frac{{255}^{2}\times 3\times M\times N}{\sum _{lev=1}^{3}\sum _{i=1}^{M}\sum _{j=1}^{N}{[HI(i,j,lev)-WHI(i,j,lev)]}^{2}}\right),$ SSIM(HI,WHI)=l(HI,WHI)c(HI,WHI)s(HI,WHI), $SSIM(HI,WHI)=l(HI,WHI)c(HI,WHI)s(HI,WHI),$ NC=lev=13i=1Mj=1N[HI(i,j,lev)×WHI(i,j,lev)]lev=13i=1Mj=1N[HI(i,j,lev)]2…”
Section: Performance Analysismentioning
confidence: 99%
“…Watermarking is a popular solution to handling the security issue of any encryption scheme [ 7 ]. It involves embedding a secret mark in the host media as a form of identification [ 8 , 9 ]. The primary aim of watermarking is to enhance three features—invisibility, capacity, and robustness—that should be maintained to ensure a secure system [ 8 ].…”
Section: Introductionmentioning
confidence: 99%
“…The embedding of information, known as the watermark, is one approach to protect digital multimedia against illicit recording and distribution [2]. Watermarking has been used to secure digital multimedia data; therefore, digital watermarking could be an appealing option [3].…”
Section: Introductionmentioning
confidence: 99%