2013 1st International Conference on Communications, Signal Processing, and Their Applications (ICCSPA) 2013
DOI: 10.1109/iccspa.2013.6487230
|View full text |Cite
|
Sign up to set email alerts
|

A new robust and fragile watermarking scheme for images captured by mobile phone cameras

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…Similar cross-media signal transmission includes the print-scan process and print-cam process. Existing research on print-scan or print-cam robust image watermarking can be divided into three categories: watermark pattern-based methods [29][30][31][32][33][34][35], Fourier domain-based methods [36][37][38][39] and multidomain-based methods [40][41][42]. Although the ideas of these methods are valuable for studying screen-cam robust watermarking algorithms, these methods are not applicable for the screen-cam process [43].…”
Section: Introductionmentioning
confidence: 99%
“…Similar cross-media signal transmission includes the print-scan process and print-cam process. Existing research on print-scan or print-cam robust image watermarking can be divided into three categories: watermark pattern-based methods [29][30][31][32][33][34][35], Fourier domain-based methods [36][37][38][39] and multidomain-based methods [40][41][42]. Although the ideas of these methods are valuable for studying screen-cam robust watermarking algorithms, these methods are not applicable for the screen-cam process [43].…”
Section: Introductionmentioning
confidence: 99%
“…Fourier-domain based methods embed watermark messages in the magnitude spectrum of discrete Fourier transform (DFT) [15]- [18] or Fourier-Mellin transform domain [19], [20], which is the log-polar mapping (LPM) of the DFT magnitude spectrum. Multi-domain-based methods modulate the coefficients of the wavelet domain to embed watermark message combined with another domain-based method to achieve synchronization [21]- [23]. However, global watermarks are restricted to the desynchronization caused by stitching and cropping attack [8], [24].…”
Section: Introductionmentioning
confidence: 99%
“…Robust watermarking is used to measure the ability of the watermark to resist common image processing operations like cropping, scaling, filtering, additive noise and JPEG compression too provides ownership claims. Whereas fragile watermarking is used to authenticate multimedia content which is to identify and report all feasible tampering in the watermarked digital media [6]. Many research works show that combining two are more transformation techniques to improve the quality of the watermark.…”
Section: Introductionmentioning
confidence: 99%