2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI) 2017
DOI: 10.1109/eecsi.2017.8239117
|View full text |Cite
|
Sign up to set email alerts
|

Imperceptible image watermarking based on Chinese remainder theorem over the edges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…4. It is extremely serviceable for use in applications that compress video, such as JPEG and MPEG [15][16][17][18][19]. 5.…”
Section: Ycbcr Color Spacementioning
confidence: 99%
“…4. It is extremely serviceable for use in applications that compress video, such as JPEG and MPEG [15][16][17][18][19]. 5.…”
Section: Ycbcr Color Spacementioning
confidence: 99%
“…One of the most popular algorithms is singular value decomposition [3]- [6] which has good robustness against compression and filtering but requires a complex mathematical operation for the decomposition and reconstruction. On the other hand, the Chinese remainder theorem model [7], [8] has a good imperceptibility with less complexity but weak against most of the watermark attacks. Currently, the Chinese remainder is mostly developed in secret image sharing [9], [10] Some models are developed to improve the performance through transformation domain models such as cosine transform [11]- [13], wavelet transform [14]- [16], contourlet transform [17], [18] and even using an optimazion algorithm [19] with the consequences of an increase in processing time.…”
Section: Introductionmentioning
confidence: 99%
“…Transform domain methods are used to improve either the robustness or the imperceptibility by transmuting the raw pixel value into a certain coefficient, inserting the watermark, and then performing inverse transformation to get the embedded pixel value. They are combined with several spatial methods, such as the Chinese remainder theorem [8,9], histogram [10,11], and Singular Value Decomposition [12,13] to get good robustness or imperceptibility at the expense of computational time. Among them, Singular Value Decomposition (SVD) is one of the most popular methods due to its robustness against different types of attacks.…”
Section: Introductionmentioning
confidence: 99%