2021
DOI: 10.3390/math9192374
|View full text |Cite
|
Sign up to set email alerts
|

Imperceptible–Visible Watermarking to Information Security Tasks in Color Imaging

Abstract: Digital image watermarking algorithms have been designed for intellectual property, copyright protection, medical data management, and other related fields; furthermore, in real-world applications such as official documents, banknotes, etc., they are used to deliver additional information about the documents’ authenticity. In this context, the imperceptible–visible watermarking (IVW) algorithm has been designed as a digital reproduction of the real-world watermarks. This paper presents a new improved IVW algor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 33 publications
(118 reference statements)
0
8
0
Order By: Relevance
“…However, this algorithm was only applicable to a small sample size, which limited its usefulness. Oswaldo et al [37] proposed a copyright protection and information transmission algorithm. This algorithm utilized histogram distortion caused by embedding strategies and introduced a new histogram position function method to display any watermark of sufficient quality to be recognized or decoded by any application.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, this algorithm was only applicable to a small sample size, which limited its usefulness. Oswaldo et al [37] proposed a copyright protection and information transmission algorithm. This algorithm utilized histogram distortion caused by embedding strategies and introduced a new histogram position function method to display any watermark of sufficient quality to be recognized or decoded by any application.…”
Section: Related Workmentioning
confidence: 99%
“…ROC curves can be plotted with respect to P f a and P det according to Equation (37) and can be used to subjectively judge the performance of the watermark detector. In addition, an objective judgment of the detector's performance can be achieved by calculating the area under the receiver operating characteristic curve (AUROC), which takes values in the range [0, 1] [55].…”
Section: Performance Analysis Of Watermark Detectormentioning
confidence: 99%
“…Histograms, as a form of synopsis-based methods, have been extensively studied [6,8] and are widely adopted in common database systems [14] for the purpose of selectivity estimation, including MySQL, PostgreSQL, Oracle, and SQL-Server [15][16][17][18]. Histograms are commonly used in databases for other tasks, including, for instance, data security and watermarking [19,20].…”
Section: Review Of Related Workmentioning
confidence: 99%
“…For both histograms, there are three bins, meaning that the fraction accounted for by each bin is 1 3 . For attribute R1.X, hist X = [10,20,25,45], which means that B X 0 = [10,20] Using histograms as a statistical representation of attributes involves the following implicit assumptions:…”
mentioning
confidence: 99%
“…In the medical field, digital watermarking algorithms were applied to protect patients’ privacy, prevent tampering with medical data, and ensure the copyright of medical images [ 4 , 5 , 6 , 7 ]. Traditional embedding watermarking algorithms [ 8 , 9 , 10 , 11 ] embed digital information that identifies the ownership into the host image/carrier and then ensures the copyright or protects the copyright through extracting the embedded information. Extraction of the embedded information could destroy the information integrity of the host image, especially the fine data, which can lead to an inaccurate diagnosis.…”
Section: Introductionmentioning
confidence: 99%