2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing 2008
DOI: 10.1109/iih-msp.2008.131
|View full text |Cite
|
Sign up to set email alerts
|

IWT-Based Watermarking By Adaptive Bit-Labeling Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2010
2010
2013
2013

Publication Types

Select...
4
1

Relationship

3
2

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Further, joint compression-watermarking algorithms are also considered as biorthogonal wavelet domain watermarking. With the introduction of lifting-based wavelet design, lifting-based integer-to-integer Haar transform [8,21] and lifting-based non-linear wavelets [22] have been used in watermarking algorithms. A more comprehensive study on the use of various wavelet kernels in watermarking algorithms can be found at [33,36,37].…”
Section: Wavelet Kernelmentioning
confidence: 99%
“…Further, joint compression-watermarking algorithms are also considered as biorthogonal wavelet domain watermarking. With the introduction of lifting-based wavelet design, lifting-based integer-to-integer Haar transform [8,21] and lifting-based non-linear wavelets [22] have been used in watermarking algorithms. A more comprehensive study on the use of various wavelet kernels in watermarking algorithms can be found at [33,36,37].…”
Section: Wavelet Kernelmentioning
confidence: 99%
“…However, extracting the hidden message would fail, even with a slight alteration to the stego-images. A remarkable feature of digital watermarking is its tolerance of common image-processing operations [5], [6]. To demonstrate hiding performance, most authors use gray-level images as the test sample.…”
Section: Introductionmentioning
confidence: 99%
“…In digital watermarking, the embedded message (or watermark) is often related to the medium and conveys additional information about the medium. Robust performance is a key feature of the watermarking schemes [3][4][5]. In steganography, the hidden message often has nothing to do with the host media; however, both hiding capacity and perceived quality are the two areas of concern pursued by the authors [6][7][8].…”
Section: Introductionmentioning
confidence: 99%