2005
DOI: 10.1007/11596981_168
|View full text |Cite
|
Sign up to set email alerts
|

A New Watermarking Method Based on DWT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(13 citation statements)
references
References 1 publication
0
13
0
Order By: Relevance
“…There have been algorithms using two [6][7][8][9]11], three [15,[22][23][24] and four [13,14,19] levels of wavelet decompositions. Joint compression-watermarking algorithms used the same number of levels of decompositions used in the compression algorithm.…”
Section: Subbandmentioning
confidence: 99%
See 1 more Smart Citation
“…There have been algorithms using two [6][7][8][9]11], three [15,[22][23][24] and four [13,14,19] levels of wavelet decompositions. Joint compression-watermarking algorithms used the same number of levels of decompositions used in the compression algorithm.…”
Section: Subbandmentioning
confidence: 99%
“…The choice of subbands for watermark embedding is often driven by the imperceptibility and robustness criteria. Algorithms intending to meet low embedding distortion and imperceptibility requirements use high frequency subbands for embedding [7][8][9][11][12][13][14]17,28]. On the other hand, algorithms designed to achieve high robustness against compression use low frequency subbands for embedding [6,16,19,22].…”
Section: Subbandmentioning
confidence: 99%
“…In non-blind extraction, since the original copy of the host image is available as reference, the watermark data is usually embedded by directly altering the magnitude of wavelet coefficients [5][6][7][8][9][10][11][12][13][14][15][16], which can be represented as follows:…”
Section: Watermarking Preliminariesmentioning
confidence: 99%
“…Based on the modification algorithms we have broadly categorized the algorithms into two groups: direct modification [1,2,6,8,9] and quantization based modification [4,5,7,3].…”
Section: Wavelet Based Watermarkingmentioning
confidence: 99%