2012
DOI: 10.1007/s11760-012-0307-3
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid watermarking based on chaos and histogram modification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
32
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 30 publications
(33 citation statements)
references
References 18 publications
1
32
0
Order By: Relevance
“…The scheme proposed by Chrysochos et al [12] is based on the idea of (selectively) swapping two selected neighboring histogram bins a and b so that a message bit is encoded by the heights of the two bins (denoted by hist(a) and hist(b)): a 1-bit is encoded by hist(a) > hist(b) and a 0-bit by hist(a) < hist(b). Here, swapping two histogram bins a and b means changing all pixel values a to b and vice versa.…”
Section: Histogram Based Watermarking Schemesmentioning
confidence: 99%
See 3 more Smart Citations
“…The scheme proposed by Chrysochos et al [12] is based on the idea of (selectively) swapping two selected neighboring histogram bins a and b so that a message bit is encoded by the heights of the two bins (denoted by hist(a) and hist(b)): a 1-bit is encoded by hist(a) > hist(b) and a 0-bit by hist(a) < hist(b). Here, swapping two histogram bins a and b means changing all pixel values a to b and vice versa.…”
Section: Histogram Based Watermarking Schemesmentioning
confidence: 99%
“…1. Examples include the image watermarking schemes proposed in [10,12] and the video watermarking scheme proposed in [13]. The last scheme makes use of both the spatial histograms of single frames and the temporal histogram for a given video sequence.…”
Section: The Proposed Cwe Frameworkmentioning
confidence: 99%
See 2 more Smart Citations
“…Recently, this fact has been utilized to devise a commutative watermarking-encryption (CWE) scheme by choosing a permutation cipher for encryption and a histogram-based scheme for watermarking [1]. However, typical histogram-based watermarking schemes like [1], [2] work by comparing selected histogram bins, where the selection process is controlled by a watermarking key. If the whole histogram is shifted by a small amount, i.e.…”
Section: Introductionmentioning
confidence: 99%