2018
DOI: 10.1155/2018/1609378
|View full text |Cite
|
Sign up to set email alerts
|

Host Feasibility Investigation to Improve Robustness in Hybrid DWT+SVD Based Image Watermarking Schemes

Abstract: Today, we face different approaches to enhance the robustness of image watermarking schemes. Some of them can be implemented, but others in spite of spending money, energy, and time for programming purpose would fail because of not having a strong feasibility study plan before implementation. In this paper, we try to show a rational feasibility study before implementation of an image watermarking scheme. We develop our feasibility study by proposing three types of theoretical, mathematical, and experimental de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…We denote "SVD2" as the use of a second level of SVD, whereas "SVD1" refers to a single level of the SVD. The feasibility of implementing SVD2 is tested and verified in [29] , and the value of n for image blocking is selected as 16, whereas the reason of this selection is provided in [11]. Finally, a pre-processing step is performed on the watermark image in both schemes in order to repeat the watermark redundantly, so that the sizes of both watermark and host images become equal.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…We denote "SVD2" as the use of a second level of SVD, whereas "SVD1" refers to a single level of the SVD. The feasibility of implementing SVD2 is tested and verified in [29] , and the value of n for image blocking is selected as 16, whereas the reason of this selection is provided in [11]. Finally, a pre-processing step is performed on the watermark image in both schemes in order to repeat the watermark redundantly, so that the sizes of both watermark and host images become equal.…”
Section: Methodsmentioning
confidence: 99%
“…Amongst these techniques an optimum resistance against attacks has been achieved by hybrid DWT and SVD techniques [16,28,29,34,48]. Hence, we focus on the combination of these two techniques in the literature review.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In fact, the Hide-XOR scheme guaranteed privacy of hiding bits reliant on This Hide-XOR stimulated our work considering the size of CBSS shadow share TK combined to image size for providing unpredictable spreading (based on data) to increase watermarking ambiguity security. Similarly, Hide-Octagon is dividing the image, which encourages us to develop the watermarking bits spreading over the complete image, as found in principle comparable to watermarking work in [43].…”
Section: Robustness Comparisonsmentioning
confidence: 99%
“…In this work of fair spreading hiding process, the watermarking privacy is put in diverse LSB positions auto dependent on sizes of image and confidential CBSS TK. Accordingly, the watermarking spreading locations change smartly similar in principle to the matrices spreading of secrets within watermarking research [43]. Linking our work to CBSS, the secret shadow shares are based on secret data, which gives the required security [35].…”
Section: Proposed Fair Spreading Improvementmentioning
confidence: 99%
See 1 more Smart Citation