2012
DOI: 10.1016/j.jss.2012.02.045
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation of moment-based watermarking methods: A review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
27
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 84 publications
(28 citation statements)
references
References 40 publications
0
27
0
Order By: Relevance
“…We apply a minimum bounded isothetic rectangle (MBIR) format to eye image for eliminating these factors. Thus, we obtain rectangular iris templates which are normalized to a size of 120×200 pixels by MBIR format [9,10]. The normalized 120× 200 iris image are applied with row-wise, 1D DCT and retaining of DC value of each row, to obtain a 1×200 set of pixels [11].…”
Section: Watermark Pretreatmentmentioning
confidence: 99%
“…We apply a minimum bounded isothetic rectangle (MBIR) format to eye image for eliminating these factors. Thus, we obtain rectangular iris templates which are normalized to a size of 120×200 pixels by MBIR format [9,10]. The normalized 120× 200 iris image are applied with row-wise, 1D DCT and retaining of DC value of each row, to obtain a 1×200 set of pixels [11].…”
Section: Watermark Pretreatmentmentioning
confidence: 99%
“…In [29], Wang et al proposed a geometrically invariant watermarking scheme using radial harmonic Fourier moments to embed the watermark into their magnitudes by quantization. Tsougenis et al [30] made great efforts to analyze advantages and disadvantages of watermarking methods based on moment theory, and achieved comparative study on performance of moment-based watermarking scheme. Due to the efficiency of SIFT for image matching and image features, it is becoming an innovative option for the image watermarking method in recent years.…”
Section: Introductionmentioning
confidence: 99%
“…The reported typical ways are as follows: the choice of embedded method [1,2], an adaptive watermarking algorithm based on HVS/HAS (human vision system/human auditory system) Model [3,4], the application of error-correcting code[5~9],the way based on CDMA [10]etc. However, today's typical methods on the digital watermark technique are the hot spot of algorithm.…”
Section: Introductionmentioning
confidence: 99%