2014
DOI: 10.1049/iet-ipr.2013.0386
|View full text |Cite
|
Sign up to set email alerts
|

Geometric modelling of the wavelet coefficients for image watermarking using optimum detector

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(10 citation statements)
references
References 34 publications
(60 reference statements)
0
10
0
Order By: Relevance
“…If the value of (2) is greater than a pre-determined threshold, then the watermark is said to be present. The threshold depends on the chosen false positive probability [15]. SS watermarking was shown to be efficient, robust, and cryptographically secured.…”
Section: Models Of Quantization and Ss Watermarkingmentioning
confidence: 99%
See 2 more Smart Citations
“…If the value of (2) is greater than a pre-determined threshold, then the watermark is said to be present. The threshold depends on the chosen false positive probability [15]. SS watermarking was shown to be efficient, robust, and cryptographically secured.…”
Section: Models Of Quantization and Ss Watermarkingmentioning
confidence: 99%
“…According to the previous works [13,15], a few observations are in order about the given method. The embedding capacity is closely related to the quantization step , the signal size L , and the utilized coding technique.…”
Section: Dual Watermarking Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Spatial domain methods are usually less susceptible to conventional image processing attacks because the information is directly embedded in image pixels and easily manipulated. There are various techniques in the transform domain such as Discrete Cosine Transform (DCT) [3]- [5], Fourier Discrete Transform (DFT), Discrete Wavelet Transform (DWT) [6]- [8], Contourlet Transform (CT) and Hadamard Conversion [2]. In [3], authors introduce an adaptive blind watermarking in which the watermark is embedded in DCT coefficients of CT. Two-level CT is applied to the host image.…”
Section: Introductionmentioning
confidence: 99%
“…RELATED WORKS The ISC technology using steganography process conducts itself with hidden data or image. Several authors has proposed steganography or digital watermarking techniques to solve the problems associated by geometric transformation [6], [7].…”
Section: Introductionmentioning
confidence: 99%