2010 Chinese Control and Decision Conference 2010
DOI: 10.1109/ccdc.2010.5498711
|View full text |Cite
|
Sign up to set email alerts
|

A color image fragile watermarking algorithm based on DWT-DCT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
9
0

Year Published

2012
2012
2013
2013

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…Therefore, there is a strong need for developing techniques which can help to identify intellectual property of digital documents [1]. Digital Watermarking is one of possible technologies which can be used for protecting intellectual property of digital content [2][3][4][5]. The research performed by the author, published in [6] has demonstrated that there is no commercial software nor technology which satisfies all requirements of robust digital watermarking.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, there is a strong need for developing techniques which can help to identify intellectual property of digital documents [1]. Digital Watermarking is one of possible technologies which can be used for protecting intellectual property of digital content [2][3][4][5]. The research performed by the author, published in [6] has demonstrated that there is no commercial software nor technology which satisfies all requirements of robust digital watermarking.…”
Section: Introductionmentioning
confidence: 99%
“…In practical applications Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT), Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) are used. Most authors focus on a single watermark embedding scheme in a single domain and compare the scheme with a traditional one, usually in the same domain [3,4,7]. As a result, it is very difficult to determine which watermark embedding scheme performs actually best in terms of robustness and how much the embedding domain influences the robustness of the scheme.…”
Section: Introductionmentioning
confidence: 99%
“…Fragile algorithms aim at discovering and locating the changes introduced in a watermarked picture [18]. The aim of semi-fragile al-gorithms is to detect and locate the area which has been changed in the watermarked picture, at the same time providing sufficient robustness so that the additional information is not removed by the most basic image processing (such as [8,31]).…”
Section: Introductionmentioning
confidence: 99%
“…In addition, imperceptible methods may be further divided into those which use the perceptual models of a human being [4,55]-the Watson model may be given as an example [16,43]. There are many methods which do not take into account the perceptible models [9,17,18,27].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation