2019
DOI: 10.1117/1.oe.58.3.035102
|View full text |Cite
|
Sign up to set email alerts
|

Digital hologram watermarking by embedding Fresnel-diffracted watermark data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…At present, many scholars have proposed many solutions for information security technologies, such as digital watermarking technology, authentication technology, and access control technology [22][23][24][25][26][27][28][29][30]. However, these technologies all have one thing in common, which is that they need to modify the whole system or redevelop a new system to realize its functions; this, in turn, leads to problems such as high costs or long cycle times.…”
Section: Related Workmentioning
confidence: 99%
“…At present, many scholars have proposed many solutions for information security technologies, such as digital watermarking technology, authentication technology, and access control technology [22][23][24][25][26][27][28][29][30]. However, these technologies all have one thing in common, which is that they need to modify the whole system or redevelop a new system to realize its functions; this, in turn, leads to problems such as high costs or long cycle times.…”
Section: Related Workmentioning
confidence: 99%
“…As the experiments, we considered various attacks for both pixel-value changing attacks and geometric attacks. For all the considered attacks which do not ruin the host data too much to be useful, the extracted watermarks were apparently recognizable even though the PSNR values to the original watermark data seemed quite bad [ 11 ].…”
Section: Previos Workmentioning
confidence: 99%
“…In the second method, a block-based discrete cosine transform was applied to the hologram, and the edge map was extracted to find the position to embed the watermark [ 10 ]. Recently, we presented a method of making a hologram into a 2D diffraction pattern using the characteristic of Fresnel transform and embedding a watermark using Fresnel transform and convergence of traveling waves [ 11 ]. In another recent study, Zhou et al proposed a method to embed a watermark by finding a spatiotemporal edge by using both spatial and temporal continuity as a target for holographic video [ 12 ].…”
Section: Introductionmentioning
confidence: 99%
“…Encrypted images, digital holograms, and full phase images have been used in the watermarking scheme to enhance the security of contents [4,[38][39][40][41][42][43]. Various watermarking schemes with different architectures have been reported in the literature, such as digital watermarking using GT, FRT, computational ghost imaging, joint FrT correlator, DCT, among others [44][45][46][47][48][49][50].…”
Section: Introductionmentioning
confidence: 99%