2021
DOI: 10.1007/s00034-021-01773-y
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Dual Watermarking of Color Images with SWT and SVD Through Genetic Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…Protecting medical images against manipulation in ehealthcare systems is crucial need to prevent incorrect diagnoses and treatments. Thus, various techniques have been presented to confirm the authenticity of medical data based on signature or hash [4], encryption [5], [6], and watermarking (e.g., [7], [8], [9]). For instance, Jabbar et al [4] suggested a frequency domain method that combines the hash signature with the watermarking system.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Protecting medical images against manipulation in ehealthcare systems is crucial need to prevent incorrect diagnoses and treatments. Thus, various techniques have been presented to confirm the authenticity of medical data based on signature or hash [4], encryption [5], [6], and watermarking (e.g., [7], [8], [9]). For instance, Jabbar et al [4] suggested a frequency domain method that combines the hash signature with the watermarking system.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The watermark is hidden in the chosen DCT coefficients of 8 × 8 blocks. A dual watermarking method using stationary wavelet transform and SVD is introduced in [8] for color general and medical images. This algorithm hides two watermarks: gray-scale watermark concealed in the green layer of the color image for the copyright protection purpose, and binary watermark concealed in the blue channel for tamper detection purpose.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In Ref. 19, a digital watermarking algorithm that embeds a full-size gray-scale watermark image as that of the host image for copyright protection is developed but less imperceptible against hybrid attacks. Reference 20 proposes a watermarking method in which the main steps are scaling, block separation, computation of feature vectors, spotting regions for watermarking, message transformation, watermark embedding, inverse DCT, and message restoration.…”
Section: Literature Surveymentioning
confidence: 99%
“…The proposed watermarking technique lacks authentication, 18 and robustness is not good against geometric attacks. In Ref 19,. a digital watermarking algorithm that embeds a full-size gray-scale watermark image as that of the host image for copyright protection is developed but less imperceptible against hybrid attacks.…”
Section: Literature Surveymentioning
confidence: 99%
“…The advantages and disadvantages of each scheme are used as inspiration to combine several transformations, or hybrids with new transformations to the scheme, or combined across different domains. For example, DCT with SVD scheme [39], DWT with SVD scheme [40], DWT with DCT scheme [41], SVD with Hadamard transform [42], DWT with LSB [43], SVD with DFT [44], DWT with DFT [45], SVD with SWT [46], SVD in spatial domain [47], hybrid SDV, DWT, and HVS [48], and many more hybrid image watermarking schemes. These hybrid examples show there are improvement opportunities to get better performances.…”
mentioning
confidence: 99%