Filters








80 Hits in 7.1 sec

A Robust Image Watermarking Method based on Contourlet Transform for Correcting Geometric Attacks

Abhinaya M, A Umamakeswari
2018 International Journal of Engineering & Technology  
After embedding the image or data, contourlet transform is applied in the frequency domain to improve robustness.  ...  A watermarking technique is proposed using Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), and Singular Value Decomposition (SVD) techniques to implement information hiding.  ...  In the frequency region, rotation in spatial domain causes same effect [5] . FFT is robust against compression. Embedding algorithm is based on the template.  ... 
doi:10.14419/ijet.v7i2.24.11992 fatcat:j3y6fzuihbga5ocm2kkd5tscmi

Color Image Blind Watermarking Algorithm Based on QR Decomposition and Voting in DWT Domain

Junxiang Wang, Ying Liu, Yonghong Zhu
2016 International Journal of Security and Its Applications  
To achieve a better trade-off between robustness and imperceptibility, a blind watermarking algorithm based on QR decomposition and voting for color image in DWT domain is proposed in the paper.  ...  In the embedding process, DCT is applied to the R, G and B color components, respectively. Then DWT is utilized on the DCT coefficients of each component and acquire corresponding LL, HL, LH, and HH.  ...  [2] have proposed a SVD-DCT based blind and robust audio watermarking scheme, in the approach a binary watermark is embedded into the highfrequency band of the SVD-DCT block with the synchronization  ... 
doi:10.14257/ijsia.2016.10.11.04 fatcat:hkw45oq6yzbs3ifzwrerbsovry

A Novel Semi-Blind Reference Color Image Watermarking using DWT-DCT-SVD

Satyanarayana Murty.P, Hima Bindu. R, Rajesh Kumar.P
2012 International Journal of Computer Applications  
In this paper we propose three robust and semi-blind digital color image watermarking algorithms.  ...  In the first algorithm we apply DCT on reference image. The singular values of the applied DCT coefficients and singular values of watermark are modified.  ...  Watermarking schemes usually focus on watermarking black and white or grayscale images. The data hiding capacity is high in spatial domain and frequency domain algorithms based on DCT, SVD.  ... 
doi:10.5120/8498-2446 fatcat:i4tvrve2ujg7zglfjhvjxjupou

Research on Digital Watermarking Algorithm for Anti-geometric Attack

Lixuan Lin, W. Deng
2019 MATEC Web of Conferences  
Next, the traditional wavelet transform algorithm and the improved algorithm based on DCT transform are selected for comparison experiments.  ...  digital watermarking technology, digital watermarking attack technology and digital watermarking evaluation method, and summarizes the improved algorithms proposed in recent years.  ...  In [18] a robust blind watermarking algorithm based on QR decomposition for Contourlet domain is proposed.  ... 
doi:10.1051/matecconf/201926702007 fatcat:7mhlvidcxvfe3ftlbdnrayhniu

A robust blind medical image watermarking approach for telemedicine applications

Fares Kahlessenane, Amine Khaldi, Redouane Kafi, Salah Euschi
2021 Cluster Computing  
In order to enhance the security of exchanged medical images in telemedicine, we propose in this paper a blind and robust approach for medical image protection.  ...  The watermarked image must present the same clinical reading as the original image. The proposed approach is applied in the frequency domain.  ...  Watermarking approach using NSCT Chen et al. present a robust blind watermarking scheme based on Non-Subsampled Contourlet Transform and Singular Value Decomposition.  ... 
doi:10.1007/s10586-020-03215-x pmid:33589859 pmcid:PMC7874995 fatcat:ttwxccsom5cfhcc3hcgy6qwgwq

A Classical Review On Advanced Digital Image Watermarking Techniques

BAISA L. GUNJAL
2018 Zenodo  
The world has become a global village in digital era due to advances in internet and communication technology.  ...  The access, sharing, replication and manipulation of medical images have become daily needs. Image data distributed can be copied repeatedly without errors putting the rights of owners at risk.  ...  [44] combined DWT,DCT and SVD for optimization of robustness and fidelity.  ... 
doi:10.5281/zenodo.1159107 fatcat:s7nloq2yojaefiusgyxjydgwjy

Performance Analysis of Combined Discrete Fourier Transformation (DFT) and Successive Division based Image Watermarking Scheme

2019 International journal of recent technology and engineering  
Performance analysis is done based on similarity between original and retrieved watermark images. The experimental results are better compared to other existing techniques.  ...  A combined Discrete Fourier Transformation (DFT) and Successive Division based image watermarking scheme has been proposed in this article.  ...  Contingent on the implanting domain selected, the imperceptibility and robustness have considerable effect on data embedding capacity of the algorithm.  ... 
doi:10.35940/ijrte.c3865.098319 fatcat:kz5rrzjbxjhbla7gmlkokelw5e

A blind image copyright protection scheme for e-government

Shi-Jinn Horng, Didi Rosiyadi, Tianrui Li, Terano Takao, Minyi Guo, Muhammad Khurram Khan
2013 Journal of Visual Communication and Image Representation  
(DCT) and the singular value decomposition (SVD) based on genetic algorithm (GA).  ...  The host image is not needed in the watermark extraction and it is more useful than nonblind one in real-world applications.  ...  Acknowledgments This paper was developed on the PhD research in National Taiwan University of Science and Technology, and the basis of LI-PI's competitive research entitled e-government Development  ... 
doi:10.1016/j.jvcir.2013.07.008 fatcat:njxcgqerjbeuljm3t25bxd7vk4

A Robust Blind Video Watermarking Scheme based on Discrete Wavelet Transform and Singular Value Decomposition

Amal Hammami, Amal Ben Hamida, Chokri Ben Amar
2019 Proceedings of the 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications  
We embed the watermark into the mid frequency sub-bands based on an additive method. The extraction process operates following a blind detection algorithm.  ...  Watermarking, consisting in hiding a signature known as watermark in a host signal, is one of the potential solutions used purposely for media security and authentication.  ...  ACKNOWLEDGMENTS The research leading to these results received funding from the Ministry of Higher Education and Scientific Research of Tunisia under the grant agreement number LR11ES48.  ... 
doi:10.5220/0007685305970604 dblp:conf/visapp/HammamiHA19 fatcat:dcvfucalhna2levg3il4akdwxy

Implementation of Secured and Robust DFT-Based Image Watermark Through Hybridization with Decomposition Algorithm

Mahbuba Begum, Mohammad Shorif Uddin
2021 SN Computer Science  
In this paper, an improved image watermarking scheme based on DFT with a decomposition algorithm is proposed.  ...  The hybridization of DFT with SVD ensures the increasing performance of the watermarking system from the perspectives of visual distortion and robustness.  ...  A hybrid DWT-DCT block-based blind watermarking method is proposed in the scheme [17] .  ... 
doi:10.1007/s42979-021-00608-6 fatcat:uze4hdbp3zdr5ihfbznzkt4zty

Blind and Robust Watermarking Scheme in Hybrid domain for Copyright Protection of Medical Images

Ali Alzahrani, Nisar Ahmed Memon
2021 IEEE Access  
This work presents a robust watermarking technique in hybrid domain for the copyright claim of medical images.  ...  The scheme is a fusion of three popular transforms: Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD).  ...  [46] reported a DCT-SVD based scheme in Contourlet Transform (CLT).  ... 
doi:10.1109/access.2021.3104985 fatcat:2jzamdiuhbc57fuxbcbw5ink5y

A QR Code Based Zero-Watermarking Scheme for Authentication of Medical Images in Teleradiology Cloud

V. Seenivasagam, R. Velumani
2013 Computational and Mathematical Methods in Medicine  
This paper presents a zero-watermarking scheme implemented in the composite Contourlet Transform (CT)—Singular Value Decomposition (SVD) domain for unambiguous authentication of medical images.  ...  Further, a framework is proposed for accessing patient records based on the watermarking scheme.  ...  Acknowledgment The authors thank Richard Wheeler for granting them permission to illustrate the structure of the QR code.  ... 
doi:10.1155/2013/516465 pmid:23970943 pmcid:PMC3732617 fatcat:5syhn6ehubehforq4pimtxgkwq

Analysis of Digital Image Watermarking Techniques through Hybrid Methods

Mahbuba Begum, Mohammad Shorif Uddin
2020 Advances in Multimedia  
For designing an efficient and robust digital image watermarking system, the trade-off among imperceptibility, robustness, capacity, and security must be maintained.  ...  In this paper, we have presented an analytical study of the existing hybrid digital image watermarking methods.  ...  Conflicts of Interest Authors' Contributions M.B. studied and drafted the whole paper; M.S.U. initiated the concept, supervised the study, and fine-tuned the manuscript.  ... 
doi:10.1155/2020/7912690 fatcat:k4sjofwfobhyndgqwg2dy267pe

A Survey on Robust Video Watermarking Algorithms for Copyright Protection

Xiaoyan Yu, Chengyou Wang, Xiao Zhou
2018 Applied Sciences  
In this paper, we review robust video watermarking algorithms for copyright protection based on original videos and compressed videos.  ...  Finally, we discuss the challenges in the research of robust video watermarking algorithms, and give possible development directions for the future.  ...  [34] proposed a robust video watermarking algorithm in DCT domain based on high-frequency coefficients correlation algorithm.  ... 
doi:10.3390/app8101891 fatcat:qctjt6d5jfeh3e7k2cwrmmyste

Secure Data Transfer over Internet Using Image Steganography: Review

Dakhaz Mustafa Abdullah, Siddeeq Y. Ameen, Naaman Omar, Azar Abid Salih, Dindar Mikaeel Ahmed, Shakir Fattah Kak, Hajar Maseeh Yasin, Ibrahim Mahmood Ibrahim, Awder Mohammed Ahmed, Zryan Najat Rashid
2021 Asian Journal of Research in Computer Science  
Finally, the best results that have been obtained in terms of higher PSNR, Capacity, and more robustness and security are discussed.  ...  According to the hiding domain, these techniques can be divided into two main parts: The spatial Domain and Transform Domain.  ...  Li and Chao [129] proposed a secure and blind watermarking approach based on a nonsubsampled contourlet transform and Schur decomposition.  ... 
doi:10.9734/ajrcos/2021/v10i330243 fatcat:pgi7epb54veqvaxkfnxpcece4m
« Previous Showing results 1 — 15 out of 80 results