2016
DOI: 10.1016/j.sigpro.2015.10.005
|View full text |Cite
|
Sign up to set email alerts
|

Robust watermarking using orthogonal Fourier–Mellin moments and chaotic map for double images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
33
0
2

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 101 publications
(35 citation statements)
references
References 23 publications
0
33
0
2
Order By: Relevance
“…The real and imaginary parts of the radial polynomial of EFMs have 2n and 2n+1 zeros in the interval 0 ≤ r ≤ 1, respectively [39]. Meanwhile, the Bessel polynomials and the orthogonal Fourier-Mellion polynomials have n+2 and n zeros in the interval 0 ≤ r ≤ 1, respectively [6,40]. Zernike polynomials only have (n − m)/2 zeros in the interval 0 ≤ r ≤ 1.…”
Section: Properties Of Efms and Other Radial Orthogonal Momentsmentioning
confidence: 99%
See 2 more Smart Citations
“…The real and imaginary parts of the radial polynomial of EFMs have 2n and 2n+1 zeros in the interval 0 ≤ r ≤ 1, respectively [39]. Meanwhile, the Bessel polynomials and the orthogonal Fourier-Mellion polynomials have n+2 and n zeros in the interval 0 ≤ r ≤ 1, respectively [6,40]. Zernike polynomials only have (n − m)/2 zeros in the interval 0 ≤ r ≤ 1.…”
Section: Properties Of Efms and Other Radial Orthogonal Momentsmentioning
confidence: 99%
“…Moments and moment invariants are global descriptors for image feature extraction that have become a hot topic in the field of image analysis. In recent years, various moments have been widely used in image reconstruction [1,2], image detection [3,4], target classification [5], digital watermarking [6,7], image compression [8], and other applications [9,10]. The study of moments mainly focuses on three directions.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…al. [24] described a combined watermarking method using Orthogonal Fourier transformation and chaotic maps.…”
Section: Introductionmentioning
confidence: 99%
“…resistência a diversos ataques [2], [3]. As transformadas mais empregadas são a transformada discreta de Fourier (DFT) [2], [4], a transformada Mellin-Fourier [5], a transformada wavelet discreta [6], [7] e a transformada discreta do cosseno (DCT) [3], [8]. A escolha da transformada dependerá de alguns fatores, destacando-se: o esforço computacional, a distorção por manipulação não autorizada ou decorrente de padrões.…”
Section: Introductionunclassified