2017
DOI: 10.1186/s13634-017-0450-7
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive reversible image watermarking algorithm based on IWT and level set

Abstract: In order to improve the robustness, imperceptibility, and anti-malicious extraction capability of reversible image watermarking, an adaptive reversible image watermarking algorithm based on IWT and level set is proposed in this paper. Firstly, the stable edge profile is extracted by using the Laplace operator and the level set methods. Secondly, the unit circle in the stable edge profile is determined. Finally, the inscribed square area of the determinate unit circle is divided into non-overlapping blocks. Eac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(13 citation statements)
references
References 29 publications
0
13
0
Order By: Relevance
“…In order to test the imperceptibility and capacity of the devised lossless watermarking technology, based on MB software, the watermark performance test was carried out, and the literature [5] and the literature [7] were used as the control group to reflect the superiority of the watermarking technique. The experimental conditions are: DELL, 3.5GHZ, dual-core CPU, 500GB hard drive and 8G memory.…”
Section: ⅵ Simulation Results and Analysismentioning
confidence: 99%
See 3 more Smart Citations
“…In order to test the imperceptibility and capacity of the devised lossless watermarking technology, based on MB software, the watermark performance test was carried out, and the literature [5] and the literature [7] were used as the control group to reflect the superiority of the watermarking technique. The experimental conditions are: DELL, 3.5GHZ, dual-core CPU, 500GB hard drive and 8G memory.…”
Section: ⅵ Simulation Results and Analysismentioning
confidence: 99%
“…However, this technology only allows the watermarking data to be embedded in a single matrix, and is not suitable for multi-matrix, ignoring the human visual characteristics. Furthermore, according to formula (5), in order to prevent the gray value of the pixel from exceeding the boundaries of [0,255], the matrix B is simply added or subtracted. When the embedding parameter k is large, it is easy to cause greater distortion.…”
Section: 19  and Its Corresponding Eigenvalues Dmentioning
confidence: 99%
See 2 more Smart Citations
“…A watermarking scheme is said to be robust when the embedded watermark is capable to survive against both accidental and intentional attacks. Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT), Discrete Wavelet Transform (DWT), Singular Value Decomposition (SVD) and Lifting Wavelet Transform (LWT) are the most popular transforming techniques which are often used in transform domain watermarking techniques [8][9][10][11]. Designing a robust and imperceptible image watermarking scheme for copyright protection applications that can insert a watermark without significantly affecting the visual quality of the host image has become the major challenge in the field of digital watermarking due to the existence of two inversely related watermarking properties namely robustness and imperceptibility.…”
Section: Fig 1 a Block Diagram Of Generic Watermarking Systemmentioning
confidence: 99%