2015
DOI: 10.1016/j.image.2015.03.010
|View full text |Cite
|
Sign up to set email alerts
|

Difference angle quantization index modulation scheme for image watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…x k + 1 ML = x n ML 1 − x n H1 2 (15) x k M = x n ML + x n H 2 (16) x k M = x n ML − x n H 2 (17) International Journal of Students' Research in Technology & Management eISSN: 2321-2543, Vol 6, No 2, 2018, pp 41-52 https://doi.org/10.18510/ijsrtm.2018.627 Figure 2 shown below is proposed block diagram for audio watermark hiding inside the cover audio file, steps are as follow:-Step 1: input Cipher audio file and generate its samples into MATLAB environment.…”
Section: Idwtmentioning
confidence: 99%
“…x k + 1 ML = x n ML 1 − x n H1 2 (15) x k M = x n ML + x n H 2 (16) x k M = x n ML − x n H 2 (17) International Journal of Students' Research in Technology & Management eISSN: 2321-2543, Vol 6, No 2, 2018, pp 41-52 https://doi.org/10.18510/ijsrtm.2018.627 Figure 2 shown below is proposed block diagram for audio watermark hiding inside the cover audio file, steps are as follow:-Step 1: input Cipher audio file and generate its samples into MATLAB environment.…”
Section: Idwtmentioning
confidence: 99%
“…Preda and Vizireanu (2015) devised an image authentication scheme which works in DCT domain. Currently, most of the existing digital watermarking algorithms still use gray images (Cai et al, 2015) as the host images, but colour images have been applied in many occasions, so digital watermarking technology based on colour image (Roldan et al, 2016;Sadreazami et al, 2015) has more research significance. Su et al (2013) proposed a blind colour image watermarking method based on DC component.…”
Section: Related Workmentioning
confidence: 99%
“…To solve the inconsistency of quantization step between the embedded end and the receiver end, as well as the adaptability problem of quantization step, several watermarking methods have been proposed, such as rational dither modulation [14] and adaptive QIM [15]. Furthermore, to enhance the robustness of the QIM watermarking against gain attack, the quantization watermarking [16], sample projection-based quantization [17], P-norm ratio-based quantization [18], angle quantization [19], complex wavelet domain l 1 norm quantization [20], and random projectionbased quantization methods [21] have been proposed one after another.…”
Section: Introductionmentioning
confidence: 99%