2013 9th International Conference on Innovations in Information Technology (IIT) 2013
DOI: 10.1109/innovations.2013.6544389
|View full text |Cite
|
Sign up to set email alerts
|

Multi watermarking algorithm based on DCT and hash functions for color satellite images

Abstract: This paper deals with a multi watermarking algorithm which embeds robust ownership watermark and fragile authentication information into satellite images to protect the copyright ownership and integrity of the images. This new watermarking technique is totally blind and does not require the original satellite image for the extraction process of the embedded information. The robust watermark is embedded first in the discrete cosine transform (DCT) and the second hash authentication code is embedded in the spati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…As shown in Table 3, the superiority of our proposed method to [14, 17–19, 28] is its blindness. Furthermore, the advantage of our approach over [13, 15, 16, 20–22, 29, 41] is that they use a spatial domain and LSB method to embed the watermark information which might be changed by innocent image processing operations. As opposed to our generic construction, the methods of [24–26] also have limited applications such as GIS and colourful images.…”
Section: Experimental Results and Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…As shown in Table 3, the superiority of our proposed method to [14, 17–19, 28] is its blindness. Furthermore, the advantage of our approach over [13, 15, 16, 20–22, 29, 41] is that they use a spatial domain and LSB method to embed the watermark information which might be changed by innocent image processing operations. As opposed to our generic construction, the methods of [24–26] also have limited applications such as GIS and colourful images.…”
Section: Experimental Results and Comparisonmentioning
confidence: 99%
“…In order to authenticate the images, some of these approaches need either the original embedded logo or the host image, hence they are non‐blind schemes [14, 16–19]. Some of them also use the spatial domain to authenticate the image [13–16, 20–22]; however, this domain is too sensitive and an image which is changed unintentionally or by innocent image processing operations is detected as corrupt. Therefore these techniques are not able to distinguish between intentional and unintentional manipulations [18].…”
Section: Introductionmentioning
confidence: 99%
“…In addition, it is noticed that the simulated results are exactly the same in both situations; RGB-green channel and YC b C r -Y channel. For an instance, if we shift the multi-watermarked image by (18,20) pixels, the watermark might be retrieved when ( , ). The proposed fragile hash framework (encoder and decoder) is designed to check the authenticity of DubaiSat-1 satellite imagery.…”
Section: Results and Analysismentioning
confidence: 99%
“…Peng et al [13] proposed a multipurpose watermarking scheme, in which the robust watermark and the fragile watermark are embedded in the feature and nonfeature points, respectively, and the watermarks are mutually independent. Kunhu and Al-Ahmad [14] proposed a multiwatermarking algorithm which embeds the robust watermark in the DCT and hash authentication code in the spatial domain. Refs.…”
Section: Introductionmentioning
confidence: 99%
“…Refs. [13,14] are suitable for color images. However, they are not applicable to a wide range of color images.…”
Section: Introductionmentioning
confidence: 99%