2020
DOI: 10.1155/2020/8840779
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Comprehensive Watermarking Scheme for Color Images

Abstract: Watermarking technology is commonly used to solve various problems in digital rights management and multimedia security. If a watermarking scheme with multiple purposes applies single method, it will easily cause the destruction of the hidden messages in particular attacks. For the copyright protection and tamper detection of color images, this research proposed a robust-fragile watermarking scheme. The two different embedding schemes embed the watermark into the R layer and G layer after NSST (nonsubsampled s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…To mitigate the, we have inserted the watermark directly into the singular value of the host image. Adding the watermark image precisely can solve the false positive issue in the SVD‐based watermarking method 37 …”
Section: Results and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…To mitigate the, we have inserted the watermark directly into the singular value of the host image. Adding the watermark image precisely can solve the false positive issue in the SVD‐based watermarking method 37 …”
Section: Results and Analysismentioning
confidence: 99%
“…Adding the watermark image precisely can solve the false positive issue in the SVD-based watermarking method. 37 Figure 5 presents the watermarked and the extracted watermark images using different host images with the same watermark image. Table 1 shows the values of PSNR, SSIM, and NC of the watermarked and extracted watermark images for varying scaling factors.…”
Section: Results and Analysismentioning
confidence: 99%
“…e classification of forensics is shown in Figure 5. e active forensic method is to actively add a digital watermark [70,71] or digital signature [72] to the original image. When copyright and authentication problems occur, the extraction algorithm is used to extract this information to provide copyright proof or content authenticity and integrity authentication.…”
Section: Digital Image Forensicsmentioning
confidence: 99%
“…Step 2: Perform SIFT transformation [22] on the original image E(i,j) to obtain the key point description.…”
Section: Zero-watermark Algorithm Designmentioning
confidence: 99%