2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI) 2018
DOI: 10.1109/icoei.2018.8553743
|View full text |Cite
|
Sign up to set email alerts
|

Study on Watermarking Techniques in Digital Images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…The first phase is to embed a watermark with a size of 128*128 in a cover image with a size of 512*512 pixels. The watermark image and the cover image specifications are relatively large, whether gray or RGB, in order to bear the watermark image, which is embedded in the cover image.The embeding phase is depend on secret key composed of 8 digits with the range (1)(2)(3)(4)(5)(6)(7)(8), where the numbers 1-8 are selected randomly . Every digit in the key determines the bit position (sequence) of the watermark pixels which will be embeded in the LSB of the cover image.…”
Section: A Least Significant Bit Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The first phase is to embed a watermark with a size of 128*128 in a cover image with a size of 512*512 pixels. The watermark image and the cover image specifications are relatively large, whether gray or RGB, in order to bear the watermark image, which is embedded in the cover image.The embeding phase is depend on secret key composed of 8 digits with the range (1)(2)(3)(4)(5)(6)(7)(8), where the numbers 1-8 are selected randomly . Every digit in the key determines the bit position (sequence) of the watermark pixels which will be embeded in the LSB of the cover image.…”
Section: A Least Significant Bit Methodsmentioning
confidence: 99%
“…Preventative measures, data validation, data concealment, and broadcast monitoring Photographic Image Watermarking technology offers a wide range of uses, including data protection, certification, digital media distribution, and tagging of user information. Watermarking data has developed into a critical aspect of information concealment [2].…”
Section: Introductionmentioning
confidence: 99%
“…To have a good watermarking scheme, the watermarking design algorithm must meet some requirements and characteristics [46]. These requirements evaluate the performance of the watermarking technology.…”
Section: Performance Requirements In Digital Watermarkingmentioning
confidence: 99%
“…Discrete cosine transform (DCT) is the most popular type of frequency domain transformation that divides a digital image into the cosine and sine frequencies, having distinct amplitudes [10], [11]. Due to this capability, DCT is highly favored in the data compression field and pattern recognition.…”
Section: Discrete Cosine Transform (Dct)mentioning
confidence: 99%
“…Due to its translation invariance attribute, spatial shifts of the digital image only impact the phase representation and not the magnitude representation of the image. Moreover, since DFT is a scaling, translation, and rotation invariant, it can be utilized to recover from geometric distortions, unlike DWT and DCT [10]. Despite its various benefits, DFT's implementation is highly complex and requires high computing cost.…”
Section: Discrete Fourier Transform (Dft)mentioning
confidence: 99%