2021
DOI: 10.1049/cje.2021.05.016
|View full text |Cite
|
Sign up to set email alerts
|

A Reframed Watermark Extraction Approach Using the ABC Algorithm

Abstract: The fast development and the rapid spread of information technology have raised the issue of digitalimage copyright protection, which was mostly addressed through robust watermarking. To ensure the survival of the watermark after attacks, most works have been making use of an additional step at the embedding phase, and by so making the scheme unsuitable for real-time implementation. However, to be effective and secure, it is recommended to combine the watermarking algorithm and the capture sensor in one device… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…• Step 5: The last step consists on decrypting the watermark using the same encryption algorithm in Section 3.1 except the permutation Equation (3) in step 5, which is replaced by (14).…”
Section: Watermark Extractionmentioning
confidence: 99%
See 2 more Smart Citations
“…• Step 5: The last step consists on decrypting the watermark using the same encryption algorithm in Section 3.1 except the permutation Equation (3) in step 5, which is replaced by (14).…”
Section: Watermark Extractionmentioning
confidence: 99%
“…In the latter technique (QIM), a two sets of discrete quantizers, one for bit 1 and another for bit 0, are generated and each host coefficient is substituted by the closest quantizer according to the watermark bit to embed. The same principle is used to extract the watermark using minimum distance classifier 14 …”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation