2014
DOI: 10.1016/j.ijleo.2013.06.082
|View full text |Cite
|
Sign up to set email alerts
|

A robust image watermarking technique using SVD and differential evolution in DCT domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
82
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 165 publications
(83 citation statements)
references
References 34 publications
0
82
0
Order By: Relevance
“…In this study, DWT is applied as the technique is widely used in digital signal processing, image compression, watermarking and etc. This technique uses wavelet filters to transform the image and the transforms are based on small waves which called wavelet that varies frequency and limited duration [8].…”
Section: Watermarking Techniquesmentioning
confidence: 99%
“…In this study, DWT is applied as the technique is widely used in digital signal processing, image compression, watermarking and etc. This technique uses wavelet filters to transform the image and the transforms are based on small waves which called wavelet that varies frequency and limited duration [8].…”
Section: Watermarking Techniquesmentioning
confidence: 99%
“…While frequency domain schemes transform the representation of spatial domain into the frequency domain and then modify its frequency coefficients to embed the watermark. There are many transform domain watermarking schemes such as discrete cosine transforms (DCT) [4,9,57,39,37,38,113], singular value decomposition (SVD) [8,14,22,27,28,34,48,52,63,74,77,84,85,90,91,113], discrete Fourier transforms (DFT) [18,64,67,70,94], and discrete wavelet transforms (DWT) [7,28,51,83,90,102,117]. These methods typically provide higher imperceptibility and are much more robust to distortion attacks, but the computational cost is higher than spatial-domain watermarking methods.…”
Section: Digital Watermarkingmentioning
confidence: 99%
“…These features are conflicting with each other, so it is a very difficult task to satisfy all the requirements at the same time. Some of the researchers tried to find out the solution of this problem utilizing the artificial intelligence approaches [2,4,5,6,7,8,47,52,71,72,76,81,85,94,95,108,121]. There are different versions of data hiding based on different approaches.…”
Section: Introductionmentioning
confidence: 99%
“…The advantage of DE over other evolutionary algorithms is that it is simple, easy to use, speedy and greater probability of finding the global optima for function optimization [2] [3]. DE has been successfully used in various real life fields like Electrical power systems [4], electromagnetism [5], control systems [6], Bioinformatics [7], chemical engineering [8], image processing [9], artificial neural networks [10], signal processing [11] etc.…”
Section: Introductionmentioning
confidence: 99%