2008 Congress on Image and Signal Processing 2008
DOI: 10.1109/cisp.2008.713
|View full text |Cite
|
Sign up to set email alerts
|

Fusion of LSB and DWT Biometric Watermarking for Offline Handwritten Signature

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
11
0

Year Published

2010
2010
2014
2014

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 7 publications
0
11
0
Order By: Relevance
“…Spatial domain schemes are less complex but are not robust against attacks and low-bit capacity, the simplest example is to embed the watermark in the least significant bits (LSB) of image pixels [1] [2]. On the other hand, transform domain schemes can embed more bits of watermark, more robust and popular in comparison to spatial domain schemes [1]- [6]. The examples of transform domain watermarking are Discrete Fourier Transform (DFT), Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Fractional Fourier Transform (FRFT) watermarking.…”
Section: Introductionmentioning
confidence: 99%
“…Spatial domain schemes are less complex but are not robust against attacks and low-bit capacity, the simplest example is to embed the watermark in the least significant bits (LSB) of image pixels [1] [2]. On the other hand, transform domain schemes can embed more bits of watermark, more robust and popular in comparison to spatial domain schemes [1]- [6]. The examples of transform domain watermarking are Discrete Fourier Transform (DFT), Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Fractional Fourier Transform (FRFT) watermarking.…”
Section: Introductionmentioning
confidence: 99%
“…V-Support Vector Machine is exploited to enhance the quality of the extracted face image. Low et al [7] proposed to adaptively fuse Least Significant Bit (LSB) and Discrete Wavelet Transform (DWT)-based approaches into a unison framework, which to be known as LSBDWT scheme. The performance of LSB-DWT scheme is validated against simulated frequency and geometric attacks.…”
Section: Related Work 21 Literature Reviewmentioning
confidence: 99%
“…Low etc al. [4] proposed to adaptively fuse Least Significant Bit (LSB) and Discrete Wavelet Transform (DWT)-based approaches into a unison framework, which to be known as LSBDWT scheme. The performance of LSB-DWT scheme is validated against simulated frequency and geometric attacks.…”
Section: Representative Workmentioning
confidence: 99%
“…By embedding biometrics in the host, it formulates a reliable individual identification as biometrics possesses exclusive characteristics that can be hardly counterfeited. Hence, the conflicts related to the intellectual property rights protection can be potentially discouraged [4]. Wavelet based transform gained popularity recently because of its multi resolution property.…”
mentioning
confidence: 99%
See 1 more Smart Citation