2016 International Symposium on Electronics and Smart Devices (ISESD) 2016
DOI: 10.1109/isesd.2016.7886708
|View full text |Cite
|
Sign up to set email alerts
|

False-positive-free GSVD-based image watermarking for copyright protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…watermarking [6]- [10], image steganography [11]- [13], secret sharing [3], [14], and MSS schemes [15]- [21]. In the reversible data hiding, secret information are embedded into image in a specific way such that the recovered image after extracting the secret information is maintained as similar as possible to the input image.…”
Section: Introductionmentioning
confidence: 99%
“…watermarking [6]- [10], image steganography [11]- [13], secret sharing [3], [14], and MSS schemes [15]- [21]. In the reversible data hiding, secret information are embedded into image in a specific way such that the recovered image after extracting the secret information is maintained as similar as possible to the input image.…”
Section: Introductionmentioning
confidence: 99%
“…At present, the research on the algorithm of adding a gray or color watermark to a color image is very rich. Moreover, B. Harjito et al proposed the method of adding two gray watermarks to a gray image [23]. However, to our knowledge, there has been little work on adding three color watermarks to one color image.…”
Section: An Application From Color Image Watermarking Processingmentioning
confidence: 99%
“…The formal procedures of the T-RSVD-based color watermark embedding are given as follows. T 12 ⇐ T 12 + αC w , where α is a scale factor used to control watermarking strength [23]. When the value of α is actually confirmed, the larger α is, the stronger the robustness of the watermark is, and the weaker the invisibility of the watermark is.…”
Section: An Application From Color Image Watermarking Processingmentioning
confidence: 99%
“…The total quantity of employed bees is corresponding to how many foodstuff options are there across the hive. Employed bee whose food resource got forgotten by the bees becomes scout [20]. ABC contains three necessary components.…”
Section: Artificial Bee Colonymentioning
confidence: 99%