The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2014
DOI: 10.1016/j.jss.2014.04.038
|View full text |Cite
|
Sign up to set email alerts
|

Imperceptible visible watermarking based on postcamera histogram operation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
63
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(64 citation statements)
references
References 16 publications
1
63
0
Order By: Relevance
“…Such methods have only been proposed for SDR images. For example, [17] and [18] propose to exploit the cover media's color histogram to embed the watermark in the spatial domain with HVSimperceptibility. The method in [19], on the other hand, uses a JND criterion for embedding in the spatial domain, the DCT to share extraction parameters, and a binarization function for extraction.…”
Section: Related Workmentioning
confidence: 99%
“…Such methods have only been proposed for SDR images. For example, [17] and [18] propose to exploit the cover media's color histogram to embed the watermark in the spatial domain with HVSimperceptibility. The method in [19], on the other hand, uses a JND criterion for embedding in the spatial domain, the DCT to share extraction parameters, and a binarization function for extraction.…”
Section: Related Workmentioning
confidence: 99%
“…Human visual system in watermarking technique helps to control the opacity of watermark depending on sensitivity of the watermarking positions. Lin et al [13] proposed the imperceptible visible watermarking (IVW) mechanism. Variance of the images was used to define suitable watermarking positions.…”
Section: Related Workmentioning
confidence: 99%
“…In all these visible watermarking techniques (except [13,15]), watermark is embedded at predefined portions in images/video-frames. Many times, visible watermark occludes the significant portions in images/video-frames (for example, television broadcasting).…”
Section: The Problemmentioning
confidence: 99%
“…Transform domain methods are used to improve either the robustness or the imperceptibility by transmuting the raw pixel value into a certain coefficient, inserting the watermark, and then performing inverse transformation to get the embedded pixel value. They are combined with several spatial methods, such as the Chinese remainder theorem [8,9], histogram [10,11], and Singular Value Decomposition [12,13] to get good robustness or imperceptibility at the expense of computational time. Among them, Singular Value Decomposition (SVD) is one of the most popular methods due to its robustness against different types of attacks.…”
Section: Introductionmentioning
confidence: 99%