2020
DOI: 10.1007/s11045-020-00732-1
|View full text |Cite
|
Sign up to set email alerts
|

A reliable and secure image watermarking algorithm using homomorphic transform in DWT domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(5 citation statements)
references
References 46 publications
0
5
0
Order By: Relevance
“…However, multiplicative noise has a multiplicative relationship with image signals, and the noise part changes with them. Multiplicative noise in images should be converted into additive noise by logarithmic transformation, 10 and the correlation between noise and signals should be removed. Then, the transformed image is denoised, and the final denoised image is obtained by combining the inverse exponential transformation.…”
Section: Homomorphism Transformationmentioning
confidence: 99%
“…However, multiplicative noise has a multiplicative relationship with image signals, and the noise part changes with them. Multiplicative noise in images should be converted into additive noise by logarithmic transformation, 10 and the correlation between noise and signals should be removed. Then, the transformed image is denoised, and the final denoised image is obtained by combining the inverse exponential transformation.…”
Section: Homomorphism Transformationmentioning
confidence: 99%
“…Previous studies [13,15,18] have selected LH, HL, and HH subbands for embedding watermarks because the LL subband contains significant information about the image. However, we choose the LL subband as an input of our decoder D and get the extract message with M ′ = D(W φ ).…”
Section: Embedding and Extracting Watermark On Dwtmentioning
confidence: 99%
“…Wavelet transform has been widely used in watermarking algorithm because of its large number of branches. The watermarking algorithm based on discrete wavelet transform (DWT) and integer wavelet transform (IWT) has good robustness to most attacks [3][4][5][6], but poor robustness to geometric attacks [7][8][9]. Li et al [10] proposed a watermarking algorithm based on the combination of redistributed discrete wavelet transform (RI-DWT) and singular value decomposition, which effectively improved the defects of poor robustness of DWT and IWT against geometric attacks.…”
Section: Introductionmentioning
confidence: 99%