1998
DOI: 10.1016/s0165-1684(98)00015-2
|View full text |Cite
|
Sign up to set email alerts
|

A DCT-domain system for robust image watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
287
0
16

Year Published

2000
2000
2017
2017

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 622 publications
(321 citation statements)
references
References 14 publications
0
287
0
16
Order By: Relevance
“…However; it is intricate to determine the distortion bound. This paper assumes that the distortion bound is proportional to the value of the magnitude of the transform coefficient itself, as is commonly assumed in transform-domain watermark hiding [10][11][12]. In the case of the polar Fourier-transform hashing, the distortion bound δ Q [j] corresponding to the intermediate hash H Q [j] of the query Q in (1) is given by…”
Section: Proposed Weighted Hash Matchingmentioning
confidence: 99%
“…However; it is intricate to determine the distortion bound. This paper assumes that the distortion bound is proportional to the value of the magnitude of the transform coefficient itself, as is commonly assumed in transform-domain watermark hiding [10][11][12]. In the case of the polar Fourier-transform hashing, the distortion bound δ Q [j] corresponding to the intermediate hash H Q [j] of the query Q in (1) is given by…”
Section: Proposed Weighted Hash Matchingmentioning
confidence: 99%
“…From the perspective of the working domain where the watermark is embedded, this effective technique can be divided into spatial domain and transform domain [4]. The spatial domain methods modify the pixel value of the digital image directly to embed the watermark information.…”
Section: Introductionmentioning
confidence: 99%
“…2) Trustworthiness [5]- [8]: a satisfactory watermarking scheme should also guarantee that it is impossible to generate forged watermarks and should provide trustworthy proof to protect the lawful ownership. 3) Robustness [9]- [12]: an unauthorized person should not be able to destroy the watermark without also making the document useless, i.e., watermarks should be robust to signal processing and intentional attacks. In particular, after common signal processing operations have been applied to the watermarked image like filtering, re-sampling, cropping, scaling, digital-to-analog, analog-to-digital conversions, compression, geometric transformation, rotation, etc., they should still be detectable.…”
Section: Introductionmentioning
confidence: 99%