2023
DOI: 10.1186/s13677-023-00468-w
|View full text |Cite
|
Sign up to set email alerts
|

Digital image watermarking using discrete cosine transformation based linear modulation

Abstract: The proportion of multimedia traffic in data networks has grown substantially as a result of advancements in IT. As a result, it's become necessary to address the following challenges in protecting multimedia data: prevention of unauthorized disclosure of sensitive data, in addition to tracking down the leak's origin, making sure no alterations may be made without permission, and safeguarding intellectual property for digital assets. watermarking is a technique developed to combat this issue, which transfer se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 33 publications
0
1
0
Order By: Relevance
“…In spatial domain watermarking, the process involves directly manipulating the pixel values of the host media, such as images or videos. Techniques within this domain focus on modifying the pixel values within the spatial domain of the media itself [8]. Various methods can be used, including altering the least significant bits (LSB) of pixel values, adjusting pixel intensities, or utilizing visual masking techniques to conceal the watermark within the image [9].…”
Section: Spatial Domain Techniquesmentioning
confidence: 99%
“…In spatial domain watermarking, the process involves directly manipulating the pixel values of the host media, such as images or videos. Techniques within this domain focus on modifying the pixel values within the spatial domain of the media itself [8]. Various methods can be used, including altering the least significant bits (LSB) of pixel values, adjusting pixel intensities, or utilizing visual masking techniques to conceal the watermark within the image [9].…”
Section: Spatial Domain Techniquesmentioning
confidence: 99%
“…Information that is securely and silently included into the host data as a digital watermark cannot be deleted. A watermark often includes information about the source, condition, or destination of the host data in the formation [3], [4]. Steganography and watermarking vary in that the former is a technique for covert communication while the latter is a way to include watermark data.…”
Section: Figure 1 Information Security Systemmentioning
confidence: 99%
“…In an era of advancing technology, the threat to image integrity has escalated due to the ease of manipulating images using sophisticated editing tools. Moreover, as images are increasingly susceptible to unauthorized alterations, ensuring their integrity, and authenticity becomes paramount [5]- [7]. Digital watermarking allows for the insertion of imperceptible watermarks into images as unique identifiers or authentication proofs, safeguarding images against unauthorized modifications, and ensuring their authenticity [8].…”
Section: Introductionmentioning
confidence: 99%