2009 International Conference on Computer Engineering &Amp; Systems 2009
DOI: 10.1109/icces.2009.5383216
|View full text |Cite
|
Sign up to set email alerts
|

A novel robust watermarking scheme for copyright-proving

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…In this paper we used the same original image and binary logo as [4] and [5] for better comparison. Fig.…”
Section: Applying Attacks To the Original Imagementioning
confidence: 99%
See 4 more Smart Citations
“…In this paper we used the same original image and binary logo as [4] and [5] for better comparison. Fig.…”
Section: Applying Attacks To the Original Imagementioning
confidence: 99%
“…Different signal processing and geometric attacks were applied on the test image and the Normalized cross correlation between the retrieved logo and the original logo is computed. In addition the related methods [4], [5] and [9] have been implemented and the results of our proposed method are compared with them. Following is the list of attacks that were applied to the test image.…”
Section: Applying Attacks To the Original Imagementioning
confidence: 99%
See 3 more Smart Citations