2019
DOI: 10.1016/j.asoc.2018.10.043
|View full text |Cite
|
Sign up to set email alerts
|

A Novel fuzzy frame selection based watermarking scheme for MPEG-4 videos using Bi-directional extreme learning machine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(13 citation statements)
references
References 29 publications
0
11
0
Order By: Relevance
“…Sharma [28] enhanced the work by adding transpositional cipher in the combined transform of DWT-SVD to enhance security. Transpositional cipher used in [29] had issues in security. e cipher used in research [30] enhances security of any watermarking technique.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Sharma [28] enhanced the work by adding transpositional cipher in the combined transform of DWT-SVD to enhance security. Transpositional cipher used in [29] had issues in security. e cipher used in research [30] enhances security of any watermarking technique.…”
Section: Related Workmentioning
confidence: 99%
“…Rajpal [29] In this research, fuzzy frame selection scheme with bidirectional extreme learning machine is done. Fuzzy rules are based on luminance, edge, and texture sensitivity.…”
Section: Referencementioning
confidence: 99%
“…e research frequency domain achieves more level of robustness compared to spatial domain but is not efficient to handle various attack scenarios. e combination of DWT and SVD was also applied by various researchers [16].…”
Section: Related Workmentioning
confidence: 99%
“…However, the performance was not effective. In [3], Biorthogonal Wavelet Transform was introduced to enhance the efficiency and security in the surveillance system, but this system was not robust. Zero-watermarking scheme was developed in [4] to exhibits strong robustness against various video attacks.…”
Section: Related Workmentioning
confidence: 99%
“…However, this leads to an increase in illegal operations such as duplication, modification, forgery, and copyright infringement. Therefore, the copyright protection, content authentication, and ownership identification have become critical requirements of the multimedia content security [3]. Watermarking is the process of embedding data into a multimedia element such as image, audio or video.…”
Section: Introductionmentioning
confidence: 99%