The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2019
DOI: 10.1016/j.aci.2018.06.003
|View full text |Cite
|
Sign up to set email alerts
|

Text-image watermarking based on integer wavelet transform (IWT) and discrete cosine transform (DCT)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(23 citation statements)
references
References 18 publications
0
20
0
1
Order By: Relevance
“…The stego file is directly built. For example, authors of LSB methods [3,8,9] extract the quantized samples in binary and replace the least significant bits of each sample by a secret bit. These works, including our previous papers [2,7], are well-known in terms of the simplicity of extracting the secret message.…”
Section: Audio Data Hiding Based On Time Domainmentioning
confidence: 99%
See 1 more Smart Citation
“…The stego file is directly built. For example, authors of LSB methods [3,8,9] extract the quantized samples in binary and replace the least significant bits of each sample by a secret bit. These works, including our previous papers [2,7], are well-known in terms of the simplicity of extracting the secret message.…”
Section: Audio Data Hiding Based On Time Domainmentioning
confidence: 99%
“…The audio file is transformed into the frequency domain. This transformation happens by applying one of the most commonly used transformation algorithms such as Fast Fourier Transforms (FFT), Discrete Wavelet Transform (DWT), DCT [9,10]. For instance, the authors in [1] proposed a method that uses Singular Value Decomposition (SVD) and DCT.…”
Section: Audio Steganography Based On Frequency Domainmentioning
confidence: 99%
“…Another robust algorithm to protect gray scale images of Arabic text is employed by Alotaibi et al [11]. This one combines both IWT and DCT to hide the gray scale watermark.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The most commonly used frequency domain in image watermarking research is DCT and DWT [11][12][13][14]. In the image watermarking method, the combination of DCT and DWT have proved that the method can generate better results than the use of one transformation only [15][16][17][18]. This is caused by each transformation has its own advantages.…”
Section: Introductionmentioning
confidence: 99%