2014
DOI: 10.1007/s11227-014-1258-y
|View full text |Cite
|
Sign up to set email alerts
|

Visible watermarking with reversibility of multimedia images for ownership declarations

Abstract: Digital watermarking technology is primarily the joining of the rightful owner of the protected media. Once the media are suspected to be illegally used, an open algorithm can be used to extract the digital watermark for the purpose of showing the media's ownership. From a hidden watermark in the media from the appearance point of view, general digital watermarking technologies can be divided into two categories: visible watermark technology and invisible watermark technology. Visual watermark technology embed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 36 publications
(79 reference statements)
0
8
0
Order By: Relevance
“…In some scenarios, such as forensics, medical image analysis, historical art imaging, or military applications, reversible visible watermarking algorithms are required as these algorithms allow legitimate users to remove the embedded watermark and restore the original content [7,8,14,20,22].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In some scenarios, such as forensics, medical image analysis, historical art imaging, or military applications, reversible visible watermarking algorithms are required as these algorithms allow legitimate users to remove the embedded watermark and restore the original content [7,8,14,20,22].…”
Section: Related Workmentioning
confidence: 99%
“…Recently, Hsu et al [7] proposed a reversible visible watermarking method. Binary images were used as the watermarks.…”
Section: Related Workmentioning
confidence: 99%
“…The PSNR is calculated between the original watermarks and the extracted ones after applying attacks. The attacks include the compression (1), adding noise (2), rotation (3), cropping (4) and median filtering (5). The robustness of our approach are compared with the works in [19,20] and [21].…”
Section: Robustness Against Attacksmentioning
confidence: 99%
“…The security of computer field is provided with possibility techniques to cover these threats, like digital signature and watermarking techniques [1]. Watermarking techniques are applied in many fields in order to protect the content from unauthorized user [2], ensuring data integrity and authenticity [3], copyright proof [4] and data ownership [5]. The electronic data have to achieve security requirements.…”
Section: Introductionmentioning
confidence: 99%
“…The watermark is embedded into the cover image using LSB to produce the watermarked image. Hsu et al (2014) [29] proposed a reversible watermarking scheme in which a binary image is added to the gray-scale image. The visible watermark is simply achieved by modifying the pixel value of the cover image and can be distinguished by human.…”
Section: Introductionmentioning
confidence: 99%