2011
DOI: 10.1007/s10440-011-9629-3
|View full text |Cite
|
Sign up to set email alerts
|

A New Watermarking Algorithm Based on Entropy Concept

Abstract: This paper presents an alternative semi-blind watermarking algorithm in gray scale images. The new watermarking system changes the coefficients of discrete cosine transform in homogeneous manner. This algorithm is based on the modification of the base using the concept of the norm or the distance. Experimental results introduced at the end of this paper, demonstrates the robustness of the proposed strategy against different attacks.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…DCTs are essential and crucial for various applications in the field of medical science/engineering. In lossy compression of audio files, such as MP3, and images, such as JPEG, the small high-frequency elements may be discarded, and DCT is suitable [ 43 , 44 , 45 , 46 ].…”
Section: Methodsmentioning
confidence: 99%
“…DCTs are essential and crucial for various applications in the field of medical science/engineering. In lossy compression of audio files, such as MP3, and images, such as JPEG, the small high-frequency elements may be discarded, and DCT is suitable [ 43 , 44 , 45 , 46 ].…”
Section: Methodsmentioning
confidence: 99%
“…We measured our cryptography scheme’s performance by selecting some basic parameters to assess the algorithm. Visual inspection is one of the main parameters for assessing the encrypted images [ 51 , 52 , 53 ]. The characteristic diffusion survey is another parameter [ 54 , 55 ] determined for judging the randomization algorithm.…”
Section: Proposed Algorithmmentioning
confidence: 99%
“…ose blocks are used to construct a new image of the same size as the original one but represented on a new basis. e construction of the new basis is inspired by the work of Mokhtari and Melkemi [31]. After that transformation, they obtained a key image and used it to encrypt and decrypt images.…”
Section: Introductionmentioning
confidence: 99%