2010 International Conference on Multimedia Information Networking and Security 2010
DOI: 10.1109/mines.2010.81
|View full text |Cite
|
Sign up to set email alerts
|

Novel Hybrid Blind Digital Image Watermarking in Cepstrum and DCT Domain

Abstract: The problem of affine transform attacks refers to many watermarking algorithms. A slight change in the geometry of watermarked image can disable the decoding of embedded information; therefore the advanced watermarking methods should be robust against the above-mentioned procedures. This paper contains a description of the algorithm consisting of two complementary methods of image watermarking. The watermark is encoded in the luminance and chrominance components in the spatial and frequency domains. The decodi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0
1

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 15 publications
0
6
0
1
Order By: Relevance
“…2 Example of 2 homomorphic deconvolution filter Fig. 3 The diagram of the masking algorithm [15], its detection based on function D wm f , which is tantamount to determining the coordinates of the coefficient of the two-dimensional autocepstral function and translation values p x ; p y of the copy of the luminance matrix of the original signal O. Then the PSNR value was measured:…”
Section: Efficiency Test Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…2 Example of 2 homomorphic deconvolution filter Fig. 3 The diagram of the masking algorithm [15], its detection based on function D wm f , which is tantamount to determining the coordinates of the coefficient of the two-dimensional autocepstral function and translation values p x ; p y of the copy of the luminance matrix of the original signal O. Then the PSNR value was measured:…”
Section: Efficiency Test Resultsmentioning
confidence: 99%
“…Taking into account the quality of the recovered host image, the algorithm used l ¼ 4 and M size ¼ 4; 4 ½ as the most optimal values for the method of masking the watermark signal. In addition, the method contained in [15] was tested using a popular masking algorithm removing embedded content described in [12] and it demonstrated high resistance to this type of …”
Section: Efficiency Test Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Research interests for watermarking in audio are new compared to that of video [2] and image [7]. The embedding schemes for audio watermarking can be classified either based on domain transformation (time domain-based scheme [8][9][10][11][12] and transform domain-based schemes [16][17][18][19][20][21][22][23][24][25][26][27][28][29][30][31][32]) or based on the necessity of host signal during extraction (blind schemes and non-blind schemes).…”
Section: Related Workmentioning
confidence: 99%