2015
DOI: 10.1007/s11042-015-2925-6
|View full text |Cite
|
Sign up to set email alerts
|

Photograph watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…Thus the watermarking algorithmic robustness is determined conveniently and directly in this method. To demonstrate the robustness in a more reliably persuasive way, algorithm comparisons verify the robustness result of those proposed watermarking algorithms and others [ 8 , 18 , 21 , 22 , 23 ]. In addition, the robustness criteria systems and platforms, which defined a variety of sample data, attacking types (including image cropping attack), attacking strength and other parameters, have been studied and published.…”
Section: Introductionmentioning
confidence: 87%
See 1 more Smart Citation
“…Thus the watermarking algorithmic robustness is determined conveniently and directly in this method. To demonstrate the robustness in a more reliably persuasive way, algorithm comparisons verify the robustness result of those proposed watermarking algorithms and others [ 8 , 18 , 21 , 22 , 23 ]. In addition, the robustness criteria systems and platforms, which defined a variety of sample data, attacking types (including image cropping attack), attacking strength and other parameters, have been studied and published.…”
Section: Introductionmentioning
confidence: 87%
“…From the perspective of computational complexity, the experimental methods can be divided into three types: robustness verification, algorithm comparisons, and criteria systems. The robustness verification experiments are mainly conducted after the watermarking algorithms have been proposed by performing some attacks [ 8 , 10 , 11 , 17 , 18 , 19 , 20 , 21 , 22 , 23 ]. Normalized correlation ( NC ) [ 10 , 17 , 23 ] and bit error rate ( BER ) [ 17 , 24 ] have been used as the evaluation indexes, which are calculated by comparing the extracted copyright information with the original.…”
Section: Introductionmentioning
confidence: 99%