2017
DOI: 10.3390/jimaging3040046
|View full text |Cite
|
Sign up to set email alerts
|

Computationally Efficient Robust Color Image Watermarking Using Fast Walsh Hadamard Transform

Abstract: Watermark is the copy deterrence mechanism used in the multimedia signal that is to be protected from hacking and piracy such a way that it can later be extracted from the watermarked signal by the decoder. Watermarking can be used in various applications such as authentication, video indexing, copyright protection and access control. In this paper a new CDMA (Code Division Multiple Access) based robust watermarking algorithm using customized 8 × 8 Walsh Hadamard Transform, is proposed for the color images and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 8 publications
(8 reference statements)
0
4
0
Order By: Relevance
“…In such methods, the amplitude of certain transform coefficients is modulated according to the pseudorandomly generated watermark. Often, this is done in the discrete cosine transform (DCT) domain [5][6][7], although other transformations are commonly used as well [8,9]. For example, the dual-tree complex wavelet transform (DTCWT) method can be used to provide more robustness against geometric attacks [10][11][12].…”
Section: Forensic Watermarkingmentioning
confidence: 99%
See 1 more Smart Citation
“…In such methods, the amplitude of certain transform coefficients is modulated according to the pseudorandomly generated watermark. Often, this is done in the discrete cosine transform (DCT) domain [5][6][7], although other transformations are commonly used as well [8,9]. For example, the dual-tree complex wavelet transform (DTCWT) method can be used to provide more robustness against geometric attacks [10][11][12].…”
Section: Forensic Watermarkingmentioning
confidence: 99%
“…To measure the robustness, the false-negative rate (FNR) is calculated. The FNR is defined in (8), and represents the fraction of false-negative (FN) detections, i.e., the fraction of watermarks that were not detected yet were present in the video under investigation. Additionally, the FNR is related to the true-positive rate (TPR) as defined in (9).…”
Section: Robustnessmentioning
confidence: 99%
“…The most common transforms used for watermark insertion are discrete cosine transform (DCT) [ 4 , 5 , 6 , 7 ], discrete Fourier transform (DFT) [ 8 , 9 ], discrete wavelet transforms (DWT) [ 10 , 11 ], and Walsh–Hadamard transform [ 12 ]. In addition, transform-based methods can be used jointly with other techniques, such as, e.g., discrete fractional random transform (DFRNT) [ 3 ] or singular value decomposition (SVD) [ 13 ].…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, the forward and inverse transforms have the same structure, only differing in the constant coefficient. The proposed transforms could be effectively applied in such areas of signal and image processing as watermarking technology [10][11][12], steganography, intelligent monitoring and others [13][14][15][16]. The general form of this transform enables the possibility of selecting optimal parameters for specific tasks, implying there are potentially other applications.…”
Section: Introductionmentioning
confidence: 99%