2012
DOI: 10.5121/ijma.2012.4202
|View full text |Cite
|
Sign up to set email alerts
|

An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection

Abstract: The Internet as a whole does not use secure links, thus information in transit may be vulnerable to interruption as well. The important of reducing a chance of the information being detected during

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(13 citation statements)
references
References 18 publications
(20 reference statements)
0
13
0
Order By: Relevance
“…The DWT splits the signal into high and low frequency components and the high frequency part contains information about the edge components, while the low frequency part is split again into high and low frequency parts. [19][20][21][22][23][24][25]. In two dimensional applications, for each level of decomposition, we first perform the DWT in the vertical direction, followed by the DWT in the horizontal direction.…”
Section: Discrete Wavelet Transform (Dwt)mentioning
confidence: 99%
“…The DWT splits the signal into high and low frequency components and the high frequency part contains information about the edge components, while the low frequency part is split again into high and low frequency parts. [19][20][21][22][23][24][25]. In two dimensional applications, for each level of decomposition, we first perform the DWT in the vertical direction, followed by the DWT in the horizontal direction.…”
Section: Discrete Wavelet Transform (Dwt)mentioning
confidence: 99%
“…While the data embeddings just impacts the LSB, a disentangling with the cryptographic key can realize a picture like the main shape. When utilizing both of the encryption and information covering up keys, the inserted extra information can be effectively removed [32,38] and the first image can be consummately back in original formed by abusing the spatial relationship in common image [21,25].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The primary target of research is along these lines to think about the utilization of reversible information embedding away since it keeps up the amazing possessions that the first original image can be lossless [23] recouped after entrenched information is removed while securing the image substance's privacy. Reversible information covering up encourages secure correspondence in self-correspondence, balanced correspondence and one-to-numerous correspondence [34,38]. …”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…It is not to keep others from knowing the hidden information, but it is also to keep others from thinking that the information even exists. If a steganography method causes someone to suspect the carrier medium, then the method has failed [2]. The main terminologies used in the Steganography systems are: the cover message, secret message, secret key and embedding algorithm.…”
Section: Introductionmentioning
confidence: 99%