2014
DOI: 10.1117/12.2067254
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid DWT-DCT-Hash function based digital image watermarking for copyright protection and content authentication of DubaiSat-2 images

Abstract: This paper presents a new technique for copyright protection and content authentication of satellite images. The novelty in the presented approach consists in designing a hybrid Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT) and hash function based digital image watermarking. In this study, two watermarks are embedded in the cover image called robust copyright watermark and fragile authentication watermark. The robust watermark is embedded in hybrid frequency and wavelet domain by applying D… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Evaluating a watermarking algorithm is commonly performed from several perspectives, e.g., peak signal-to-noise ratio ( PSNR ) is used to measure the degradation of image fidelity [ 13 , 36 ], false negative probability (missed detection) or false positive probability (false alarms) are used to evaluate the authority and authentication of watermarking algorithms [ 15 , 37 ]. Regarding robustness, it is common to use NC [ 10 , 17 , 23 ] or BER [ 17 , 24 ] to compare the similarity between the extracted watermark sequence with the embedded one in a quantitative method. For further evaluation, taking BER as an example, assume wm is the original watermark sequence and is the extracted, BER is calculated as: where NOR is the operation of exclusive OR .…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Evaluating a watermarking algorithm is commonly performed from several perspectives, e.g., peak signal-to-noise ratio ( PSNR ) is used to measure the degradation of image fidelity [ 13 , 36 ], false negative probability (missed detection) or false positive probability (false alarms) are used to evaluate the authority and authentication of watermarking algorithms [ 15 , 37 ]. Regarding robustness, it is common to use NC [ 10 , 17 , 23 ] or BER [ 17 , 24 ] to compare the similarity between the extracted watermark sequence with the embedded one in a quantitative method. For further evaluation, taking BER as an example, assume wm is the original watermark sequence and is the extracted, BER is calculated as: where NOR is the operation of exclusive OR .…”
Section: Methodsmentioning
confidence: 99%
“…From the perspective of computational complexity, the experimental methods can be divided into three types: robustness verification, algorithm comparisons, and criteria systems. The robustness verification experiments are mainly conducted after the watermarking algorithms have been proposed by performing some attacks [ 8 , 10 , 11 , 17 , 18 , 19 , 20 , 21 , 22 , 23 ]. Normalized correlation ( NC ) [ 10 , 17 , 23 ] and bit error rate ( BER ) [ 17 , 24 ] have been used as the evaluation indexes, which are calculated by comparing the extracted copyright information with the original.…”
Section: Introductionmentioning
confidence: 99%