2016
DOI: 10.1007/s00500-016-2320-x
|View full text |Cite
|
Sign up to set email alerts
|

A QDCT- and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 39 publications
(14 citation statements)
references
References 29 publications
0
14
0
Order By: Relevance
“…The main drawback of this method is to encrypting image by locating the candidates to develop a secure and efficient. Utilizing an optimized encrypted binary CGH (Computer Generated Hologram) a novel color image watermarking plan was exhibited by Jianzhong Li et al [18]. The main drawback of this method is quality of reconstructed image is medium.…”
Section: Related Work: a Brief Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The main drawback of this method is to encrypting image by locating the candidates to develop a secure and efficient. Utilizing an optimized encrypted binary CGH (Computer Generated Hologram) a novel color image watermarking plan was exhibited by Jianzhong Li et al [18]. The main drawback of this method is quality of reconstructed image is medium.…”
Section: Related Work: a Brief Reviewmentioning
confidence: 99%
“…Cipher text-only attack: This attack, in which an invader tries to presume the security keys by only studying the cipher text [18]. This attack can be used to recover the original image by reviewing the encrypted images.…”
Section: Security Analysismentioning
confidence: 99%
“…Security protection of digital image includes mainly data encryption and information hiding. Image scrambling is a technique of image encryption or auxiliary encryption [1][2][3][4][5][6][7][8][9], and also an important method of preprocessing and postprocessing in image hiding, sharing, and digital watermarking [7,[10][11][12][13][14][15][16][17]. Particularly in the application of robust digital watermark, scrambling technique is a very effective method against cropping attack by shuffling watermark image so that the pixels are dispersed in the position space of carrier image.…”
Section: Introductionmentioning
confidence: 99%
“…Particularly in the application of robust digital watermark, scrambling technique is a very effective method against cropping attack by shuffling watermark image so that the pixels are dispersed in the position space of carrier image. The popular image scrambling methods include Arnold transform [1-3, 10-12, 18], Fibonacci transform [7,10,13,14], Peano-Hilbert space filling curve [19], knight's tour [8,20], Lucas transform [16], magic square transform [9,17], Gray code [21,22], cellular automata [15,[23][24][25], Baker map [4][5][6]26], subaffine transform [27], and sampling technology [28].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation