2022
DOI: 10.1109/tip.2021.3134466
|View full text |Cite
|
Sign up to set email alerts
|

Generic Reversible Visible Watermarking via Regularized Graph Fourier Transform Coding

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(4 citation statements)
references
References 42 publications
0
1
0
Order By: Relevance
“…Several attacks and methodologies able to find out an embedded watermark, erase or change it were identified. Qi et al [6] proposed a generic reversible visible watermarking method using graph Fourier transform, which was visible and could resist several attacks. However, the proposed method is a blind watermarking approach, which is more difficult to apply than other methods, such as non-blind and semi-blind.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Several attacks and methodologies able to find out an embedded watermark, erase or change it were identified. Qi et al [6] proposed a generic reversible visible watermarking method using graph Fourier transform, which was visible and could resist several attacks. However, the proposed method is a blind watermarking approach, which is more difficult to apply than other methods, such as non-blind and semi-blind.…”
Section: Related Workmentioning
confidence: 99%
“…However, the proposed method is a blind watermarking approach, which is more difficult to apply than other methods, such as non-blind and semi-blind. Singh et al [6] proposed a hybrid watermarking algorithm for healthcare. Currently, several types of patient data are used in healthcare, with most being images and videos.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The evolution of watermarking strategies has witnessed a paradigm shift towards invisible watermarking solutions, wherein the emphasis lies not only on embedding ownership or authentication data covertly but also on preserving the inherent quality and visual fidelity of the images [13]. Concurrently, advancements in quality measurement metrics have emerged as pivotal determinants, facilitating rigorous evaluation, and validation of watermarking techniques [14].…”
Section: Introductionmentioning
confidence: 99%