2015
DOI: 10.1007/s11042-015-3084-5
|View full text |Cite
|
Sign up to set email alerts
|

LWT- QR decomposition based robust and efficient image watermarking scheme using Lagrangian SVR

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
19
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(19 citation statements)
references
References 22 publications
0
19
0
Order By: Relevance
“…Geometric features of an image can be extracted by using matrix decomposition method and the robustness is more against geometric attacks. Consequently, he combination of DWT and matrix decomposition are applied in watermarking techniques takes advantages of both the methods and thus demonstrates robustness on geometric and image processing attacks [1][2][3][4][5][6][7][8]. Though the traditional watermarking methods provide good computing speed, they didn't automatically balance the invisibility and robustness because the said features will have conflict by nature with each other.…”
Section: Introductionmentioning
confidence: 99%
“…Geometric features of an image can be extracted by using matrix decomposition method and the robustness is more against geometric attacks. Consequently, he combination of DWT and matrix decomposition are applied in watermarking techniques takes advantages of both the methods and thus demonstrates robustness on geometric and image processing attacks [1][2][3][4][5][6][7][8]. Though the traditional watermarking methods provide good computing speed, they didn't automatically balance the invisibility and robustness because the said features will have conflict by nature with each other.…”
Section: Introductionmentioning
confidence: 99%
“…Transform domain techniques provide greater levels of invisibility, as well as robustness against a variety of attacks in comparison with spatial domain techniques [36; 38]. Transform domain watermarking techniques have been developed using discrete wavelet transform (DWT) [11; 39], discrete Fourier transform (DFT) [5], discrete cosine transform (DCT) [23; 29] or matrix decompositions, including singular value decomposition (SVD) [16], QR decomposition [21], LU decomposition [15], Schur decomposition [32] and Hessenberg decomposition [37]. Several watermarking schemes which use more than one transform domain technique in order to improve the performance of the watermarking method have been proposed and the combination of these transformations may compensate for each other's drawbacks [30].…”
Section: Introductionmentioning
confidence: 99%
“…The host colour images and the watermark image measure the feasibility and robustness capabilities of the proposed colour image watermarking scheme, the peak signal-to-noise ratio (PSNR)[1] and the structural similarity index measure (SSIM) [7] are used to evaluate the invisibility of the reconstructed watermarked colour image. Meanwhile, normalised cross-correlation (NC)[21] is utilised to evaluate the similarity between the corresponding final watermark image and the original watermark image. The performance metrics are mathematically defined as follows.…”
mentioning
confidence: 99%
“…The matrix decomposition can be used to extract the geometric features of an image, which is more robust against geometric attacks. Therefore, the image watermarking method based on combined DWT and matrix decomposition take the advantages of DWT and matrix decomposition and thus robust against both geometric attacks and image processing attacks [2,[15][16][17][18][19][20][21]. These traditional image watermarking methods have advantages in terms of high computing speed, but they cannot balance the invisibility and robustness automatically because invisibility and robustness are in conflict to each other.…”
Section: Introductionmentioning
confidence: 99%