2020
DOI: 10.1007/s11042-020-09918-y
|View full text |Cite
|
Sign up to set email alerts
|

Visual attention model based dual watermarking for simultaneous image copyright protection and authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 49 publications
0
4
0
Order By: Relevance
“…The approach is robust in contrast to all calculated attacks that achieve a fair payload capability with the standards visual consistency of the medical watermarked image. S. Koley [74], proposed the process embeds two watermarks into the host picture concurrently. The proposed scheme is extremely robust against geometric, signal processing, and hybrid assaults.…”
Section: Extensive Research On Fragile Watermark As Follow;mentioning
confidence: 99%
“…The approach is robust in contrast to all calculated attacks that achieve a fair payload capability with the standards visual consistency of the medical watermarked image. S. Koley [74], proposed the process embeds two watermarks into the host picture concurrently. The proposed scheme is extremely robust against geometric, signal processing, and hybrid assaults.…”
Section: Extensive Research On Fragile Watermark As Follow;mentioning
confidence: 99%
“…Digital watermarking involves the embedding of concealed information in the form of a watermark into the host signal, to secure copyrights [6,44], tamper detection [7,8], telemedicine [42,43], content authentication [9,10], source authentication [49], etc. Based on domains, digital watermarking is classified into two groups: spatial and transform/frequency domain techniques [45,46].…”
Section: Introductionmentioning
confidence: 99%
“…To perform watermarking, transform-domain methods usually convert the host image into a transformed domain first, and then hide the watermark information by modifying the transformed coefficients. Commonly employed transformations for image watermarking include discrete Fourier transform (DFT) (Fares et al 2020;Hsu and Hu 2020; Urvoy et al 2014), discrete wavelet transform (DWT) (Barni et al 2001;Hu and Hsu 2017;Huynh-The et al 2016), DCT (Hsu and Hu 2017;Hu et al 2022;Moosazadeh and Ekbatanifard 2019;Patra et al 2010;Singh and Bhatnagar 2018), matrix decomposition (MD) (Ali et al 2015;Chang et al 2005;Hsu and Tu 2020;Koley 2021;Nha et al 2022;Su et al 2020), and combinations of these transforms (Hu and Hsu 2015;Kang et al 2020).…”
Section: Introductionmentioning
confidence: 99%