2019
DOI: 10.1109/tmm.2018.2851447
|View full text |Cite
|
Sign up to set email alerts
|

A Channel-Dependent Statistical Watermark Detector for Color Images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 51 publications
(18 citation statements)
references
References 20 publications
0
18
0
Order By: Relevance
“…In Table 6, the average AUROC values of multiple test images are obtained under Gaussian filtering, cropping, rotation, scaling and gamma correction attacks. As can be observed from the table, although the performance of the detector in this paper is similar to that of HMM-based detector [24] under strong gamma correction and cropping attacks, on the whole, the proposed detector provides larger AUROC values than other detectors under both conventional attacks and geometric attacks. To clearly prove the robustness of the suggested algorithm, Fig.…”
Section: Auroc Values Under Various Attacksmentioning
confidence: 62%
See 2 more Smart Citations
“…In Table 6, the average AUROC values of multiple test images are obtained under Gaussian filtering, cropping, rotation, scaling and gamma correction attacks. As can be observed from the table, although the performance of the detector in this paper is similar to that of HMM-based detector [24] under strong gamma correction and cropping attacks, on the whole, the proposed detector provides larger AUROC values than other detectors under both conventional attacks and geometric attacks. To clearly prove the robustness of the suggested algorithm, Fig.…”
Section: Auroc Values Under Various Attacksmentioning
confidence: 62%
“…As shown in this table, the proposed watermark scheme provides lower time complexity, larger watermark capacity and stronger imperceptibility. Sadreazami's NIG [5], Amini's CHMM [24], Amirmazlaghani's WT-GARCH [37], and Amini's WHMM [7] based methods. We selected these eight methods based on their similarities to the proposed approach, and based on the presence of sufficient algorithm descriptions (including implementation details and parameter settings etc.)…”
Section: Capacity and Timementioning
confidence: 99%
See 1 more Smart Citation
“…The operation significantly improves robustness and resistance to channel interference. In the case where the size of the embedded key is much smaller than the maximum hidden capacity of the channel code [30], the concealment of the key is greatly enhanced.…”
Section: Proposed Schemementioning
confidence: 99%
“…Currently, there exist two extraction ways in watermarking, that is, nonblind extraction 27 and blind extraction. 28,29 The former needs the assistance of original carrier or watermark during entire operation procedure. It is hard to obtain the original data in the extraction process in most cases yet.…”
Section: Introductionmentioning
confidence: 99%