2016
DOI: 10.1007/978-981-10-0767-5_13
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Analysis of Digital Watermarking Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
7
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…Imperceptibility, robustness, and security are the key features of the watermarking method. Imperceptibility is computed by the visual affinity of the host image in comparison to the watermarked image [18]. The watermarking framework ought to be robust against any deliberate or accidental assault of the watermarked substance that can be a picture, sound, video, or text [13].…”
Section: Digital Watermarking Conceptmentioning
confidence: 99%
“…Imperceptibility, robustness, and security are the key features of the watermarking method. Imperceptibility is computed by the visual affinity of the host image in comparison to the watermarked image [18]. The watermarking framework ought to be robust against any deliberate or accidental assault of the watermarked substance that can be a picture, sound, video, or text [13].…”
Section: Digital Watermarking Conceptmentioning
confidence: 99%
“…In spatial domain watermarking, directing changes in the pixel values of the original image. Which robustness is very low compared with a DFT watermarking algorithm [7] [8]. Frequency domain [9] watermarking is modifies the pixel values using, such as the Discrete Cosine Transform (DCT), the Discrete Fourier Transform (DFT), and Discrete Wavelet Transform (DWT).…”
Section: Fig 1 Image Watermarkingmentioning
confidence: 99%
“…The DCT coefficient are modified depends on the DC coefficient and median of the AC coefficients ordered by a zig-zag sequence [5] [6]. In [7], presented that digital image watermarking algorithm based on one level DWT and embeds an invisible watermark into the original image by using alpha blending process. In [8], proposed method an efficient watermarking with the use of rough entropy as embedding strength and rough set based classification for reduction of statistical redundancies between wavelet sub band such as LL, LH, HL and HH.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Data hiding (Bansal et al 2016) is referred as embedding additional data in a cover medium such as image, video, audio, and file. Data hiding technology is widely used in secret information transmission (Shi et al 2017), watermarking (Yu 2016), copyright certification (Mun et al 2017), forgery detection (Wolfgang and Delp 1996) applications.…”
Section: Related Work Data Hidingmentioning
confidence: 99%