2019
DOI: 10.1007/s11042-019-08367-6
|View full text |Cite|
|
Sign up to set email alerts
|

Enhancing the robustness of image watermarking against cropping attacks with dual watermarks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 20 publications
0
10
0
Order By: Relevance
“…Su Q. et al (Su et al, 2019) introduced spatial domain watermarking procedure by embedding watermark contents in all pixels of the carrier image by quantization; but the watermarked results reflect weak robustness to potential attacks. Hsu, C. S. et al (Hsu et al, 2019) proposed a watermarking scheme specifically for resisting cropping attacks. Wang, C. et al (Wang, C. et al, 2019) used Ternary radial harmonic Fourier moments to hide watermark contents.…”
Section: Related Work and Reviewmentioning
confidence: 99%
“…Su Q. et al (Su et al, 2019) introduced spatial domain watermarking procedure by embedding watermark contents in all pixels of the carrier image by quantization; but the watermarked results reflect weak robustness to potential attacks. Hsu, C. S. et al (Hsu et al, 2019) proposed a watermarking scheme specifically for resisting cropping attacks. Wang, C. et al (Wang, C. et al, 2019) used Ternary radial harmonic Fourier moments to hide watermark contents.…”
Section: Related Work and Reviewmentioning
confidence: 99%
“…Some other steganography techniques are based on matrix factorization by using methods such as singular value decomposition (SVD) [14], QR decomposition, and lower-upper (LU) decomposition. A matrix factorization method is used to decompose the cover image into matrices, and the secret image is concealed into one of these matrices [15]. This is an overview of existing work in the video steganography field using transform domain techniques.…”
Section: Introductionmentioning
confidence: 99%
“…In [35], a new image watermarking scheme based on singular value decomposition (SVD) and chaotic mapping was proposed to enable the algorithm to achieve a good balance between robustness and imperceptibility. In [36], Xu et al. proposed a QR‐based digital watermarking scheme to enhance robustness to the shear attack.…”
Section: Introductionmentioning
confidence: 99%
“…In [35], a new image watermarking scheme based on singular value decomposition (SVD) and chaotic mapping was proposed to enable the algorithm to achieve a good balance between robustness and imperceptibility. In [36], Xu et al proposed a QR-based digital watermarking scheme to enhance robustness to the shear attack. In addition, that method was found to yield superior performance compared to other methods in terms of invisibility, robustness, and embedding payload.…”
Section: Introductionmentioning
confidence: 99%