2015
DOI: 10.1002/sec.1371
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid digital image watermarking algorithm based on DCT‐DWT and auto‐thresholding

Abstract: Multimedia evolution in the current era has given digital images security and privacy a great concern. Digital image watermarking is used to produce highly protected images in order to promote secure and protected exchange over the network and between individuals. In this paper, a robust algorithm for digital image watermarking is proposed based on a hybrid watermarking and auto‐thresholding. This algorithm is designed to embed the watermarks in the transform domain using both discrete cosine transform and dis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…e DCT is applied to the host image prior to DWT. e algorithm uses the best threshold value for choosing the best embedding region and ensures better imperceptibility and high robustness against scaling, cropping, rotation, noising, and compression attacks [9]. Another hybrid method is presented [10] that combines the DWT and DCT domains by maintaining robustness and imperceptibility.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…e DCT is applied to the host image prior to DWT. e algorithm uses the best threshold value for choosing the best embedding region and ensures better imperceptibility and high robustness against scaling, cropping, rotation, noising, and compression attacks [9]. Another hybrid method is presented [10] that combines the DWT and DCT domains by maintaining robustness and imperceptibility.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Test image Imperceptibility measured in PSNR (dB) (without any deformation of watermarked image) DWT-DCT [3] Lena 37.7160 DWT-SVD [4] Lena 109.84 DWT-SVD [5] Cameraman 64.3155 LWT-DCT [6] Lena 46.7629 DWT-DCT [8] MRI-brain 52.743550 (for gain factor, k � 0.02) DCT-DWT [9] Peppers 42.74 DWT-DCT-SVD [12] Abdominal 57.80 ((for gain factor, k � 0.1) LWT-DCT-SVD [13] Lena 46.5085 DCT-SVD [14] Barbara 62.74 DFT-DCT [15] Mandrill and D9 61.28 (for Mandrill), 58.97 (for D9 image) DCT-DWT [17] Baboon >35…”
Section: Schemesmentioning
confidence: 99%
“…During the sharing and distribution of multimedia data, digital images can be easily reproduced and manipulated. This situation causes the copyright violations of users and the violations of privacy of personal data [1,2,3]. Many methods are used to protect digital images, one of them is the watermarking technique [1,2,4,5].…”
Section: Introductionmentioning
confidence: 99%
“…This situation causes the copyright violations of users and the violations of privacy of personal data [1,2,3]. Many methods are used to protect digital images, one of them is the watermarking technique [1,2,4,5]. The digital watermarking is used for data protection in multimedia types of audio, video, image and text [1,4,6,7].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation