2017
DOI: 10.1016/j.sigpro.2017.01.019
|View full text |Cite
|
Sign up to set email alerts
|

A new locally optimum watermark detection using vector-based hidden Markov model in wavelet domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
15
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(15 citation statements)
references
References 30 publications
0
15
0
Order By: Relevance
“…Furthermore, image steganalysis algorithms based on deep learning technology, such as Convolutional Neural Network (CNN) models, often use various network structures to learn the effective features of images to distinguish cover and stego images [18], thus proposing higher requirements for the detection resistant performance of steganographic algorithms. Therefore, how to balance the resilience of embedded messages under lossy channel [1] and the detection resistance of stego images [3] is a major problem for image steganography on mobile devices, which access multiple changing communication channels.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, image steganalysis algorithms based on deep learning technology, such as Convolutional Neural Network (CNN) models, often use various network structures to learn the effective features of images to distinguish cover and stego images [18], thus proposing higher requirements for the detection resistant performance of steganographic algorithms. Therefore, how to balance the resilience of embedded messages under lossy channel [1] and the detection resistance of stego images [3] is a major problem for image steganography on mobile devices, which access multiple changing communication channels.…”
Section: Introductionmentioning
confidence: 99%
“…The main aim of digital watermarking is to provide copyright safety. Under the application of this model, the scope is progressively developed along with copyright security, copy management, fingerprint analyzing, content authorization, broadcast observation, video monitoring, and so forth [3]. At the same time, the application objects are expanded from traditional digital images to alternate applications like videos, texts, speech etc.…”
Section: Introductionmentioning
confidence: 99%
“…Fast Fourier Transform (FFT), Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Singular Value Decomposition (SVD), Contourlet Transform and hidden markov model (HMM) in wavelet domain has been presented [3]. Therefore, watermarking methods are dependson discrete Fourier transform (DFT) experiences cropping intrusions and if the aspect ratio is modified, it is impossible for watermark to retain the modifications as it affects the image frequency content.…”
Section: Introductionmentioning
confidence: 99%
“…• Choosing coefficients in a specific subband for embedding the watermark: e.g., embedding in high frequency subbands for better imperceptibility [9,22,28,33,42]; embedding in low frequency subband to achieve high robustness [49,50] or the approaximation subband with the maximum variance [6,8] and balancing imperceptibility and robustness with all subbands spread spectrum embedding [17,38]. • Using different wavelet kernels: e.g., Haar or other Daubechies family orthogonal wavelets [5,9,10,28,33,49] and biorthogonal wavelets [50].…”
Section: Introductionmentioning
confidence: 99%
“…• Using different wavelet kernels: e.g., Haar or other Daubechies family orthogonal wavelets [5,9,10,28,33,49] and biorthogonal wavelets [50]. • Optimising the host coefficient selection: e.g., choosing all coefficients in a subband [8,9,17]; using a threshold based on their magnitude significance [22]; the just noticeable difference(JND) [42,50]; a mask based on the Human Visual System (HVS) model [6,7,9,36]; a fusion rule-based mask for refining the selection of host coefficients [10] and blind re-quantization of a coefficient with respect to a group of coefficients within a given window [28,33,38,49]. Though many independent algorithms are available in the literature, a gap, that requires a generalized mathematical analysis to identify the relationship between distortion performance and various wavelet-based watermarking parameters responsible for embedding distortion, was identified.…”
Section: Introductionmentioning
confidence: 99%