2015 International Conference on Industrial Instrumentation and Control (ICIC) 2015
DOI: 10.1109/iic.2015.7150868
|View full text |Cite
|
Sign up to set email alerts
|

A new digital image watermarking algorithm based on image interlacing, DWT, DCT

Abstract: The availability of digital data such as images, audio and videos to the public is growing day by day with the expansion of the Internet . Hence preserving the rightfulness of the data is a critical factor and the solution is effectively provided by digital watermarking. Digital watermarking is a developing technology which ensures and facilitates security, authentication and copyright protection of digital data. We tries to propose a secure and robust watermarking algorithm based on the combination of image i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…The introduction of PPLU decomposition to the watermarking arena presents a fortified method, deploying mathematical transformations to safeguard the watermark [11]. Block-based watermarking approaches have proved beneficial in scenarios where additional space is necessitated for multiple watermarks, thereby enhancing capacity [12].…”
Section: Related Workmentioning
confidence: 99%
“…The introduction of PPLU decomposition to the watermarking arena presents a fortified method, deploying mathematical transformations to safeguard the watermark [11]. Block-based watermarking approaches have proved beneficial in scenarios where additional space is necessitated for multiple watermarks, thereby enhancing capacity [12].…”
Section: Related Workmentioning
confidence: 99%
“…The digital watermarking technique comprises two processes-embedding process and extraction process. In the embedding phase, the secret information (known as a watermark) is inserted into the multimedia object (known as a cover image) and is called "watermarked image" [17]. This watermarked image is then transmitted through the communication channel and the stored watermark can be retrieved at the receiver end to ensure the validity of the digital data.…”
Section: Digital Watermarking Conceptmentioning
confidence: 99%
“…This watermarked image is then transmitted through the communication channel and the stored watermark can be retrieved at the receiver end to ensure the validity of the digital data. This retrieval process is called "watermark extraction" [17]. The embedding and extraction process is schematically shown in Fig.…”
Section: Digital Watermarking Conceptmentioning
confidence: 99%
“…The owner of digital products is threatened severely by the tampered copyright. Therefore, digital watermarking technology is suggested as an effective method to protect copyright authentication and product tracking [10,11]. The protections of different digital contents often require different watermarking algorithms [12].…”
Section: Introductionmentioning
confidence: 99%