2016
DOI: 10.1109/access.2016.2627241
|View full text |Cite
|
Sign up to set email alerts
|

Visual Attention-Based Image Watermarking

Abstract: Imperceptibility and robustness are two complementary but fundamental requirements of any watermarking algorithm. Low strength watermarking yields high imperceptibility but exhibits poor robustness. High strength watermarking schemes achieve good robustness but often infuse distortions resulting in poor visual quality in host media. If distortion due to high strength watermarking can avoid visually attentive regions, such distortions are unlikely to be noticeable to any viewer. In this paper, we exploit this c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
2
1

Relationship

3
6

Authors

Journals

citations
Cited by 40 publications
(19 citation statements)
references
References 72 publications
0
19
0
Order By: Relevance
“…Salient objects are not size specific therefore Multi-Resolution Analysis (MRA) is adopted within many models (e.g., [14]). Multiple orientation and MRA in the discrete wavelet transform (DWT) closely resembles human vision and maximise simultaneous localisation in both the spatial and frequency domains.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Salient objects are not size specific therefore Multi-Resolution Analysis (MRA) is adopted within many models (e.g., [14]). Multiple orientation and MRA in the discrete wavelet transform (DWT) closely resembles human vision and maximise simultaneous localisation in both the spatial and frequency domains.…”
Section: Discussionmentioning
confidence: 99%
“…Multiple orientation and MRA in the discrete wavelet transform (DWT) closely resembles human vision and maximise simultaneous localisation in both the spatial and frequency domains. As a result it is used in saliency computation and shows good promise in reducing complexity while achieving superior performance [14]. This algorithm uses a multi-resolution DWT as its core decomposition and therefore is a more suitable choice than other FPGA saliency implementations [15], [16] that naively follow algorithm implementations not amenable to FPGAs, e.g., by relying on external memory access [15] or by utilizing more computationally complex hardware implementations of calculations [16], such as the Gabor oriented-filter or convolution with smoothing filter.…”
Section: Discussionmentioning
confidence: 99%
“…Magnitude based multiplicative watermarking widely forms as the basis for non-blind watermarking [15] [16]. We embed the watermark in to the graph Fourier coefficientsf as follows:…”
Section: Non-blind Watermarkingmentioning
confidence: 99%
“…Digital watermarking technology is an effective way to solve this problem, and it is able to protect information security, achieve security traceability and copyright protection [1][2][3][4]. Some identification information (digital watermarking) is directly or indirectly embedded into the digital carrier, and does not only affect the value of the original carrier, but is also uneasy to be detected or modified.…”
Section: Introductionmentioning
confidence: 99%