Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
27
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 63 publications
(27 citation statements)
references
References 35 publications
0
27
0
Order By: Relevance
“…Comparing the two signatures helps us to detect whether the image has been tampered with or not [5,6,7,8]. The watermarking method can be categorized into robust watermarking [9,10,11,12,13,14,15], semi-fragile watermarking [16,17,18,19] and fragile watermarking [20,21,22,23,24,25,26,27,28,29,30,31,32,33,34]. In the robust watermarking method, hidden watermarks can be retrieved from the watermarked images after they have undergone image processing, such as noise processing or image compression.…”
Section: Introductionmentioning
confidence: 99%
“…Comparing the two signatures helps us to detect whether the image has been tampered with or not [5,6,7,8]. The watermarking method can be categorized into robust watermarking [9,10,11,12,13,14,15], semi-fragile watermarking [16,17,18,19] and fragile watermarking [20,21,22,23,24,25,26,27,28,29,30,31,32,33,34]. In the robust watermarking method, hidden watermarks can be retrieved from the watermarked images after they have undergone image processing, such as noise processing or image compression.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, our image cryptosystems have strong robustness to resist against noise attack and occlusion attack. Furthermore, PSNR (Peak Signal to Noise Ratio) is often used to evaluate the restoring ability of an image and expressed using the following equation [ 43 , 44 ]: where , M and N are the size of the image, O is the original image and D is the decrypted image of the cipher image contaminated by noise or occlusion-attack. The larger the value of PSNR, the less distortion of the image.…”
Section: Experimental Results and Security Analysismentioning
confidence: 99%
“…Spatial domain algorithms usually have lower computational complexity than the transform domain watermarking algorithms. However, due to the limitations of watermarking in the spatial domain involving visualization and robustness [17], most image watermarking algorithms use the transforms such as Cosine transform [18][19][20][21][22], Fourier transform [23,24], Wavelet transform [25,26], Contourlet transform [27,28], and Shearlet transform [29][30][31].…”
Section: Introductionmentioning
confidence: 99%