2023
DOI: 10.1007/s11042-023-16109-y
|View full text |Cite
|
Sign up to set email alerts
|

Image watermarking techniques based on Schur decomposition and various image invariant moments: a review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 96 publications
0
1
0
Order By: Relevance
“…The system is also sensitive to initial parameters, which indicates that slight modifications in these parameters can cause massive and unpredictable changes in the system's long-term behavior. Here is a system parameters and values used in our system as shown in equations (10,11,12,13,14,15,16,17,18) where A = 10, B = 28, C = 8/3, D = 25, E = 8, F = 8, G= 6.7, H = 0.01, and I = 1.5 respectively.…”
Section: System Parametersmentioning
confidence: 99%
See 1 more Smart Citation
“…The system is also sensitive to initial parameters, which indicates that slight modifications in these parameters can cause massive and unpredictable changes in the system's long-term behavior. Here is a system parameters and values used in our system as shown in equations (10,11,12,13,14,15,16,17,18) where A = 10, B = 28, C = 8/3, D = 25, E = 8, F = 8, G= 6.7, H = 0.01, and I = 1.5 respectively.…”
Section: System Parametersmentioning
confidence: 99%
“…To meet the rising computational power of cryptanalysis, encryption methods have been considerably improved to increase their complexity, preventing attackers from quickly compromising encrypted data [3,4]. As a result, digital picture scramblers are meant to convert clear images into unintelligible ones as an integral part of modern data protection measures such as image encryption [5,6], steganography [7][8][9][10][11], and watermarking [12][13][14]. Encryption and cryptography stand at the forefront of efforts to protect sensitive information from unauthorized access, ensuring that data remains confidential and unaltered after transmission over networks.…”
Section: Introductionmentioning
confidence: 99%
“…Digital watermarking technology has emerged as an effective tool for safeguarding copyrights, making it a significant topic in the realm of digital multimedia research [1,2]. Currently, the majority of watermarking research is centered around images, audio, and videos [3][4][5][6], with relatively fewer studies addressing watermarking in the context of 3D digital models. It is widely recognized that in recent years, 3D models have found extensive applications in diverse fields such as industrial manufacturing, urban planning, architectural design, healthcare, cultural heritage preservation, film, gaming, and virtual reality.…”
Section: Introductionmentioning
confidence: 99%