2017
DOI: 10.1587/transinf.2016mui0001
|View full text |Cite
|
Sign up to set email alerts
|

Information Hiding and Its Criteria for Evaluation

Abstract: SUMMARYWithin information hiding technology, digital watermarking is one of the most important technologies for copyright protection of digital content. Many digital watermarking schemes have been proposed in academia. However, these schemes are not used, because they are not practical; one reason for this is that the evaluation criteria are loosely defined. To make the evaluation more concrete and improve the practicality of digital watermarking, watermarking schemes must use common evaluation criteria. To re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…Assessment of data hiding depends on the features of the algorithms themselves and the other factors such as the aim, implementation, and hiding environment [1,[9][10][11][12][13][14][15][16][17]. In [1,9,14], nearly a dozen of attributes are considered for characterizing data hiding techniques.…”
Section: Attributes Of Data Hiding Techniquesmentioning
confidence: 99%
See 2 more Smart Citations
“…Assessment of data hiding depends on the features of the algorithms themselves and the other factors such as the aim, implementation, and hiding environment [1,[9][10][11][12][13][14][15][16][17]. In [1,9,14], nearly a dozen of attributes are considered for characterizing data hiding techniques.…”
Section: Attributes Of Data Hiding Techniquesmentioning
confidence: 99%
“…In this approach, quantum circuits are used to calculate the PVDs of three pairs of pixels in each of the 2 × 2 blocks of the quantum cover image. The respective blocks are classified into lower level (or smooth) and higher level (or edge) blocks depending in which of six ranges the obtained PVD falls, i.e., R1=[0, 7], R2= [8,15], R3= [16,31], R4= [32,63], R5= [64,127], and R6= [128,255]. The lower level consists of R1 and R2, the higher level includes the remaining four ranges.…”
Section: Quantum Domainmentioning
confidence: 99%
See 1 more Smart Citation
“…Digital watermarking is used to prevent individuals from illegally using digital content, e.g., images, movies, and audio data, and also to identify unauthorized users [1]. Watermarking works by embedding secret information into contents imperceptibly [2]. In the case of image watermarking, the host image is called an original image and the marked image is called a stego-image.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, the robustness criteria systems and platforms, which defined a variety of sample data, attacking types (including image cropping attack), attacking strength and other parameters, have been studied and published. These criteria systems, including “Stirmark” [ 25 , 26 ], Watermark Evaluation Testbed (WET) [ 27 ] and Information Hiding and its Criteria for Evaluation (IHC) [ 28 ], strive to extend the range of experimental parameters and conditions to more accurately estimate the robustness of the watermarking algorithms. For example, resistance to image cropping attack is considered as the most basic and low-level type of robustness in the Stirmark Benchmark evaluation system [ 26 ], and image databases with strategies of repeated tests have been adopted [ 29 ].…”
Section: Introductionmentioning
confidence: 99%