2022
DOI: 10.32604/cmc.2022.020338
|View full text |Cite
|
Sign up to set email alerts
|

Analytic Beta-Wavelet Transform-Based Digital Image Watermarking for Secure Transmission

Abstract: The rapid development in the information technology field has introduced digital watermark technologies as a solution to prevent unauthorized copying and redistribution of data. This article introduces a self-embedded image verification and integrity scheme. The images are firstly split into dedicated segments of the same block sizes. Then, different Analytic Beta-Wavelet (ABW) orthogonal filters are utilized for embedding a self-segment watermark for image segment using a predefined method. ABW orthogonal fil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…With the watermark securely embedded and fortified through encryption, the digitally watermarked content commences its journey through various digital channels. This transmission can transpire through myriad conduits, including email, cloud storage platforms, or various file transfer protocols [8]. Each phase of the transmission process is meticulously designed to preserve the watermark's integrity.…”
Section: Transmission: Safeguarding the Journeymentioning
confidence: 99%
“…With the watermark securely embedded and fortified through encryption, the digitally watermarked content commences its journey through various digital channels. This transmission can transpire through myriad conduits, including email, cloud storage platforms, or various file transfer protocols [8]. Each phase of the transmission process is meticulously designed to preserve the watermark's integrity.…”
Section: Transmission: Safeguarding the Journeymentioning
confidence: 99%
“…Moreover, chaotic-based algorithms can be utilized either in time or frequency domains. In the time domain (spatial domain), the values of image pixels are used, while in the frequency domain; the values of image pixels are firstly transformed with the appropriate frequency transform domain and then, the encryption is applied to the transformed coefficients of the image pixels [22].…”
Section: Introductionmentioning
confidence: 99%