2014 6th International Conference on Computer Science and Information Technology (CSIT) 2014
DOI: 10.1109/csit.2014.6805973
|View full text |Cite
|
Sign up to set email alerts
|

Robust image watermarking based on Dual Intermediate Significant Bit (DISB)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…images, audio, texts and videos) copyright protection, e.g. [20], [23], [25], digital vector data received less attention, as pointed out in several recent review papers [1], [4], [28].…”
Section: Introductionmentioning
confidence: 99%
“…images, audio, texts and videos) copyright protection, e.g. [20], [23], [25], digital vector data received less attention, as pointed out in several recent review papers [1], [4], [28].…”
Section: Introductionmentioning
confidence: 99%
“…In this method, the watermark image is protected from various attacks and alteration of watermarked image is minimized [66]. Another study [67] concentrated on the dual intermediate significant bit (DISB) model, in which two bits are embedded into each pixel of the host image and the remaining six (06) bits are changed to adjust the original pixel. The watermark image can be chosen by selecting the nearest pixel value to the original, if there exists a difference between the original and the embedded one.…”
Section: Intermediate Significant Bit (Isb)mentioning
confidence: 99%
“…By the spatial domain, Jobin Abraham [7] generated a fragile watermark that could better resist noise attacks, by the least significant bit (LSB) algorithm [8]. Ghassan N. Mohammed [9] proposed watermarking images algorithm based on DISB model, and in this method, two bits were embedded in each pixel of the original image. In the case of high watermark image quality, the proposed model had better robustness and was superior to the LSB algorithm.…”
Section: Literature Surveymentioning
confidence: 99%
“…In this paper, median filtering attacks of [3,3], [5,5], [7,7] and [9,9], and 1, 10 and 20 times were carried out on the original image respectively. Parts of the attack results and extracted watermark were shown in Fig.…”
Section: Median Filter Attacksmentioning
confidence: 99%