2021
DOI: 10.1016/j.eswa.2020.114540
|View full text |Cite
|
Sign up to set email alerts
|

A fusion-domain color image watermarking based on Haar transform and image correction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
59
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6

Relationship

3
3

Authors

Journals

citations
Cited by 52 publications
(59 citation statements)
references
References 35 publications
0
59
0
Order By: Relevance
“…Step 5: Taking advantage of pseudo-random sequence generated by MATLAB built-in function randperm(.) based on private keys KB i and KC i to randomly locate the matrix block Hcblock from the coefficient matrix E-map i , and then its maximum energy coefficient E′ max of DHT is also acquired fast in the spatial domain using Equation (12).…”
Section: The Procedures Of Watermark Embeddingmentioning
confidence: 99%
See 3 more Smart Citations
“…Step 5: Taking advantage of pseudo-random sequence generated by MATLAB built-in function randperm(.) based on private keys KB i and KC i to randomly locate the matrix block Hcblock from the coefficient matrix E-map i , and then its maximum energy coefficient E′ max of DHT is also acquired fast in the spatial domain using Equation (12).…”
Section: The Procedures Of Watermark Embeddingmentioning
confidence: 99%
“…The reason for the above situation is that considering large‐information color images as watermarks will add the embedding difficulty, and also affect some performances of watermarking to varying degrees. However, because color images exist the irreplaceable advantages of binary and greyscale images as well as the feature of wide coverage, the dual‐color image watermarking has attracted many scholars' attention and recognition 12–14 . For example, Liu et al 12 designed a fusion‐domain watermarking strategy of color image by exploiting the properties of Haar transform and image correction.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…e transform domain scheme used a series of transforms to convert image into transform coefficients and then used the correlation between the coefficients for information hiding. More researched schemes included discrete cosine transform, wavelet transform [5,6], and so on. In addition, in order to improve the secrecy and robustness of hidden information, information hiding schemes based on image compression [7] and encryption [8] have also been proposed.…”
Section: Introductionmentioning
confidence: 99%