2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN) 2015
DOI: 10.1109/spin.2015.7095436
|View full text |Cite
|
Sign up to set email alerts
|

Lagrangian support vector regression based image watermarking in wavelet domain

Abstract: To enhance the imperceptibility and robustness against image processing operations, the advantage of artificial neural network (ANN) and machine learning algorithms such as support vector regression (SVR), extreme learning machine (ELM) etc. are employed into watermarking applications. In this paper, Lagrangian support vector regression (LSVR) based blind image watermarking scheme in wavelet domain is proposed. The good learning capability, high generalization property against noisy datasets and less computati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(14 citation statements)
references
References 18 publications
0
10
0
1
Order By: Relevance
“…Meanwhile, the values of our scheme were measured by applying our scheme to the same image set and the same set of attacks as the corresponding existing scheme. For the watermark data, we used the same size of data (marked as "-" in Table 4) as the one used in the scheme to be compared: 32×16 for [17], 32×32 for [9,16], and 64×64 for [14,15]. First we compare with [17], which is in Table 5.…”
Section: Experimental Results and Comparison With Existingmentioning
confidence: 99%
See 4 more Smart Citations
“…Meanwhile, the values of our scheme were measured by applying our scheme to the same image set and the same set of attacks as the corresponding existing scheme. For the watermark data, we used the same size of data (marked as "-" in Table 4) as the one used in the scheme to be compared: 32×16 for [17], 32×32 for [9,16], and 64×64 for [14,15]. First we compare with [17], which is in Table 5.…”
Section: Experimental Results and Comparison With Existingmentioning
confidence: 99%
“…Finally [9] is compared with ours in Table 9, whose robustness was assessed by BER. This scheme included some pixel-value change attacks and the 25% cropping geometric attack.…”
Section: Experimental Results and Comparison With Existingmentioning
confidence: 99%
See 3 more Smart Citations