2017
DOI: 10.1007/s00500-017-2489-7
|View full text |Cite
|
Sign up to set email alerts
|

Robust color image watermarking technique in the spatial domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

1
115
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 178 publications
(116 citation statements)
references
References 24 publications
1
115
0
Order By: Relevance
“…Performance of the contemplated method is assessed to test its effectiveness. Mean square rrror (MSE), PSNR, structural similarity index measurement (SSIM), and quality index (Q‐index) are computed to test the perceptible characteristics after embedding. Also normalize correlation coefficient (NCC), bit error rate (BER), SD, and correlation coefficient (CC) are computed for tamper detection in a watermark image.…”
Section: Experimental Results and Comparisonmentioning
confidence: 99%
See 3 more Smart Citations
“…Performance of the contemplated method is assessed to test its effectiveness. Mean square rrror (MSE), PSNR, structural similarity index measurement (SSIM), and quality index (Q‐index) are computed to test the perceptible characteristics after embedding. Also normalize correlation coefficient (NCC), bit error rate (BER), SD, and correlation coefficient (CC) are computed for tamper detection in a watermark image.…”
Section: Experimental Results and Comparisonmentioning
confidence: 99%
“…The algorithmic complexity of a watermarking scheme is one of the most important parameters for real‐time applications. The execution time of the proposed scheme has been tested by using system clock and compared with some recent works , , , and the comparison results have been reported in Table . It is observed that our technique requires 0.521 seconds for total execution which is relatively better than all the existing schemes.…”
Section: Experimental Results and Comparisonmentioning
confidence: 99%
See 2 more Smart Citations
“…The existing algorithms can be also classified into spatial and transform domains. Spatial domain techniques [5] embed the watermark by directly modifying the image pixels, whereas in frequency domain techniques [6] a transformation is first performed and then the watermark is embedded into discrete cosine transform (DCT) [7][8] [18] [19], discrete wavelet transform (DWT) [9][17] [16] [22] or discrete Fourier transform (DFT) coefficients [10] [11]. For applications, such as authentication, tamper detection, copyright protection, it is desirable to be able to extract the watermark without the original image.…”
Section: Introductionmentioning
confidence: 99%