2019
DOI: 10.1016/j.optlastec.2018.08.011
|View full text |Cite
|
Sign up to set email alerts
|

Review on optical image hiding and watermarking techniques

Abstract: Information security is a critical issue in modern society and image watermarking can effectively prevent unauthorized information access. Optical image watermarking techniques generally have advantages of parallel high-speed processing and multi-dimensional capabilities compared with digital approaches. This paper provides a comprehensive review on the research works related to optical image hiding and watermarking techniques conducted in the past decade.The past research works are focused on two major aspect… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
3

Relationship

2
8

Authors

Journals

citations
Cited by 137 publications
(32 citation statements)
references
References 80 publications
0
31
0
1
Order By: Relevance
“…The extraction process involves non-blind watermark extraction and then blind watermark extraction techniques. [2](Shuming Jiao, et.al, 2019) have proposed a paper that provides a comprehensive review of the research works concerned to the optical image hiding and watermarking techniques. The previous research works mainly focused on two major aspects they are systems concerning to image hiding, and the methods concerned to embedding the optical system output within host image.…”
Section: Fig1generic Block Diagram Of Image Watermarkingmentioning
confidence: 99%
“…The extraction process involves non-blind watermark extraction and then blind watermark extraction techniques. [2](Shuming Jiao, et.al, 2019) have proposed a paper that provides a comprehensive review of the research works concerned to the optical image hiding and watermarking techniques. The previous research works mainly focused on two major aspects they are systems concerning to image hiding, and the methods concerned to embedding the optical system output within host image.…”
Section: Fig1generic Block Diagram Of Image Watermarkingmentioning
confidence: 99%
“…The authors claimed that this approach was invariant to common attacks on 3D models (mesh simplification, addition of noise, model cropping, as well as their combinations) . The great majority of encryption protocols are based on optical encryption methods, such as digital holography, diffractive imaging, integral imaging, multiple cameras, and detector photogrammetry (Muniraj et al, 2014;Mehra et al, 2015;Jiao et al, 2019). In spite of optical encryption methods have some advantages, such as parallel processing and data handling in various domains, these algorithms are difficult in efficient software implementation.…”
Section: Related Workmentioning
confidence: 99%
“…For different security applications, both the visual keys and the secret image can be protected as invisible to unauthorized users. VC can be categorized as an optical encryption technique [13][14][15] and the decryption of a secret image is realized optically. In comparison, both the encryption and decryption steps in conventional digital encryption schemes are implemented with computer algorithms.…”
Section: Introductionmentioning
confidence: 99%