2016
DOI: 10.1186/s13634-016-0373-8
|View full text |Cite
|
Sign up to set email alerts
|

Optimal watermark embedding combining spread spectrum and quantization

Abstract: This paper presents an optimal watermark embedding method combining spread spectrum and quantization. In the method, the host signal vector is quantized to embed a multiple-bit watermark, and meanwhile, the quantized signal is made to locate in the detectable region defined in the context of spread spectrum watermarking. Under the two constraints, the optimal watermarked signal is derived in the sense of minimizing the embedding distortion. The proposed method is further implemented in wavelet transform domain… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…Step3 (watermarking embedding): calculating the greatest perceptual threshold value for each sub-block by Watson model and record its position Bk(row, column); obtaining embedding formulas (10) and (11) by the principle of embedding one subblock w' to one DCT block and the general embedding method. In formula (11), where I(i,j,k)(row, column) is the pixel of the optimal embedding position in the carrier image after DCT transform; a is the watermark strength, determined by the above EDA-PSO algorithm.…”
Section: Insertion and Extraction Methods Of Image Watermarkmentioning
confidence: 99%
See 1 more Smart Citation
“…Step3 (watermarking embedding): calculating the greatest perceptual threshold value for each sub-block by Watson model and record its position Bk(row, column); obtaining embedding formulas (10) and (11) by the principle of embedding one subblock w' to one DCT block and the general embedding method. In formula (11), where I(i,j,k)(row, column) is the pixel of the optimal embedding position in the carrier image after DCT transform; a is the watermark strength, determined by the above EDA-PSO algorithm.…”
Section: Insertion and Extraction Methods Of Image Watermarkmentioning
confidence: 99%
“…Experimental results on test images demonstrate that the proposed approach can provide better imperceptibility and robustness. Zhu Xin-Shan and others [10] proposed an optimal watermark embedding method combining spread spectrum and quantization. Simulations on real images by using the wavelet-based implementations demonstrate the proposed method performs very well in both watermark imperceptibility and robustness .Jero, Edward S. and others [11] proposed that ECG Steganography ensures protection of patient data when ECG signals embedded with patient data are transmitted over the internet.…”
Section: Introductionmentioning
confidence: 99%
“…Removal attacks aim to remove the watermarking data from the watermarking object. Based on these attacks, watermarking represents an additional noise of signals, which are present within the host's signal [79,80].…”
Section: Removal Attackmentioning
confidence: 99%