2020
DOI: 10.1007/s10462-020-09877-8
|View full text |Cite
|
Sign up to set email alerts
|

A new chaotic complex map for robust video watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(18 citation statements)
references
References 74 publications
0
18
0
Order By: Relevance
“…Simulation tests and experimentation prove that the method has high performance and is highly efficient. A novel video watermarking scheme using a two-dimensional complex chaotic map is presented in [50]. The simulation results showed that the scheme has good visual quality using standard criteria.…”
Section: Related Workmentioning
confidence: 99%
“…Simulation tests and experimentation prove that the method has high performance and is highly efficient. A novel video watermarking scheme using a two-dimensional complex chaotic map is presented in [50]. The simulation results showed that the scheme has good visual quality using standard criteria.…”
Section: Related Workmentioning
confidence: 99%
“…e steps of the extraction module are illustrated in Figure 2. us, the process starts by normalizing the watermarked 3D object and then computing the DCT transform decomposition of (11) for j � 1 to length(Msg vector) do (12) [Coefficient 1 , Coefficient 2 , Coefficient 3 ] � DC T(Vertex x(j), Vertex y(j), Vertex z(j)) (12) Embed the Enc Msg value within the Coefficients values as the following equation system: the vertices. So, the encrypted grayscale image pixel can be extracted using the parameters β and the 3 D obj( 􏽢 C) coefficients according to the following equation:…”
Section: E Extraction Procedurementioning
confidence: 99%
“…In [38][39][40][41], the presented methods were based on embedding the QR code and binary bits into images based on various domains. Moreover, Ayubi et al in [12] presented a video watermarking method using 2D binary image. On the other hand, in [42,43], the proposed methods watermarked the 3D printed object, and in [18,[44][45][46], the presented methods were based on watermarking the 3D object using a different watermark sequence.…”
Section: Computational Intelligence and Neurosciencementioning
confidence: 99%
See 1 more Smart Citation
“…Generally, such schemes are computationally complex [28] and unable to recover the lossless watermark image due to shiftvariant property [29]. Moreover, few schemes are based on linear wavelet transform (LWT) [17][18][19]. The LWT-based video-watermarking schemes are resistant to both image processing attacks and temporal video attacks such as impulse noise, Gaussian noise, filtering, compression attacks, but fails against geometric attacks [25][26][27][28]30].…”
Section: Introductionmentioning
confidence: 99%