2020
DOI: 10.1109/access.2020.2978186
|View full text |Cite
|
Sign up to set email alerts
|

A New Chaotic Image Watermarking Scheme Based on SVD and IWT

Abstract: Image watermarking schemes based on singular value decomposition (SVD) have become popular due to a good trade-off between robustness and imperceptibility. However, the false positive problem (FPP) is the main drawback of SVD-based watermarking schemes. The singular value is the main cause of FPP issues because it a fixed value that does not hold structural information of an image. In this paper, a new SVD-based image watermarking scheme that uses a chaotic map is proposed to overcome this issue. The secret ke… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0
3

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 67 publications
(22 citation statements)
references
References 51 publications
0
14
0
3
Order By: Relevance
“…SVD decomposes the hyperspectral matrix to obtain the singular value matrix and the vector matrix, arranges them according to the importance of the singularity. Selecting a part of the best values and vectors to reconstruct the image, which are reduced to the feature subsets of smaller and more relevant [8]. SVD of hyperspectral matrix…”
Section: Svd Algorithmmentioning
confidence: 99%
“…SVD decomposes the hyperspectral matrix to obtain the singular value matrix and the vector matrix, arranges them according to the importance of the singularity. Selecting a part of the best values and vectors to reconstruct the image, which are reduced to the feature subsets of smaller and more relevant [8]. SVD of hyperspectral matrix…”
Section: Svd Algorithmmentioning
confidence: 99%
“…Future work will focus on removing these drawbacks. 2018 [35] 2019 [36] 2020 [37] 2020 [38] 2020 [39] Proposed method…”
Section: Discussionmentioning
confidence: 99%
“…There are some other methods where DFT is used [30][31][32][33]. Besides, there exist other transform domain methods using decomposition or optimization algorithms [34][35][36][37][38][39].…”
Section: Related Workmentioning
confidence: 99%
“…Due to these features, there has been a rise in research attempting to embed digital chaos into cryptography. Various cryptographic applications have adopted digital chaos in their designs such as image encryption [1]- [6], S-box [7], [8], image watermarking [9], [10], pseudo-random number generators [11], [12], security protocols [13], [14], and hash function [15]- [17]. There are also other chaos-based applications that have been proposed such as secure speech encryption based on chaotic map [18], image encryption [19], and chaos-based compressive sensing encryption [20].…”
Section: Introductionmentioning
confidence: 99%