2016
DOI: 10.1109/access.2016.2570812
|View full text |Cite
|
Sign up to set email alerts
|

On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 58 publications
(9 citation statements)
references
References 92 publications
0
7
0
Order By: Relevance
“…The rate of watermark distortion represents the amount of tampering attacks occurring on the contents of the attacked Arabic context, which is denoted by W5 WDR and calculated by Eq. (8).…”
Section: Watermark Detection Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…The rate of watermark distortion represents the amount of tampering attacks occurring on the contents of the attacked Arabic context, which is denoted by W5 WDR and calculated by Eq. (8).…”
Section: Watermark Detection Algorithmmentioning
confidence: 99%
“…Zero-watermarking is a modern technique that can be used with smart algorithms without any modification on original digital contents to embed the watermark information. Moreover, in this technique the contents of given digital context can be utilized to generate the watermark information [1], [6]- [8].…”
Section: Introductionmentioning
confidence: 99%
“…The trade-off between the robustness of the encrypted data and image quality is a significant challenge in digital watermarking research. The success of watermarking and de-watermarking processes depends on the successful retrieval of hidden data under different image processing attacks on the stego image [ 2 , 3 ]. Generally, the carrier image is not always enough to uphold the full length of the embedded data due to the degradation of image quality.…”
Section: Introductionmentioning
confidence: 99%
“…The classic digital watermark application is connected with multimedia protection. However, at present, the application of such methods to protect data of a different type [2] is becoming relevant.…”
Section: Introductionmentioning
confidence: 99%