2014
DOI: 10.1016/s1665-6423(14)71612-8
|View full text |Cite
|
Sign up to set email alerts
|

Robust Image Watermarking Theories and Techniques: A Review

Abstract: How to citeComplete issue More information about this article Journal's homepage in redalyc.org Scientific Information System Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Non-profit academic project, developed under the open access initiative

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
58
0
5

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 174 publications
(76 citation statements)
references
References 60 publications
0
58
0
5
Order By: Relevance
“…Different techniques have been proposed in the literature to address the problem related to geometrically resilient image watermarking [1][2][3][4][5][6][7]. However, almost all the algorithms [1][2][3][4][5][6][7] are designed to grayscale images and their application to color images is often inadequate since they usually work with an individual color channel [8].…”
Section: Introductionmentioning
confidence: 99%
“…Different techniques have been proposed in the literature to address the problem related to geometrically resilient image watermarking [1][2][3][4][5][6][7]. However, almost all the algorithms [1][2][3][4][5][6][7] are designed to grayscale images and their application to color images is often inadequate since they usually work with an individual color channel [8].…”
Section: Introductionmentioning
confidence: 99%
“…Desta forma, com a watermarking é possível inserir uma mensagem dentro de um arquivo e para, posteriormente, realizar a recuperação desta mensagem para fins diversos, por exemplo, para a verificação da autenticidade integridade do arquivo ou da própria mensagem. Tao (2014) defende que a watermark possibilita a proteção da propriedade intelectual e garante proteção contra adulterações, devido a ela ser de difícil discernimento e remoção por pessoas não autorizadas.…”
Section: Watermarkingunclassified
“…Segundo Tao (2014), uma watermarking digital surge com a finalidade de atuar nas limitações da criptografia e da esteganografia, garantindo e protegendo os direitos da propriedade intelectual. Quando comparada com a criptografia, a watermark é inserida sobre o material original, não impedindo que usuários ouçam, visualizem ou manipulem o conteúdo do material, enquanto a criptografia impossibilita o acesso ao conteúdo sem a chave criptográfica.…”
Section: Esteganografia E Watermarkingunclassified
“…The watermarks should not get destroyed as a result of unintentional or malevolent distortions like cropping, resampling, rotation, scaling and compression. On the other hand, if it is used for content authentication, the watermarks get disappeared whenever the content is modified so that the loss of integrity of document must be detected [Hai13]. Capacity: The capacity of insertion represents the quantity of information inserted in the content.…”
Section: Introductionmentioning
confidence: 99%