2022
DOI: 10.1007/s00371-022-02610-2
|View full text |Cite
|
Sign up to set email alerts
|

A robust and secure blind color image watermarking scheme based on contourlet transform and Schur decomposition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 34 publications
0
6
0
Order By: Relevance
“…Poor robustness of geometric attacks Transformation domain NSCT-schur [9] 2022 Good translation invariance Performance of rotation attack was not tested Curvelet-DCT [19] 2020 Good invisibility and robustness of conventional attacks…”
Section: Spatial Domain Lsb-dwt [10] 2022 Good Robustness Of Gaussian...mentioning
confidence: 99%
See 3 more Smart Citations
“…Poor robustness of geometric attacks Transformation domain NSCT-schur [9] 2022 Good translation invariance Performance of rotation attack was not tested Curvelet-DCT [19] 2020 Good invisibility and robustness of conventional attacks…”
Section: Spatial Domain Lsb-dwt [10] 2022 Good Robustness Of Gaussian...mentioning
confidence: 99%
“…In recent years, medical image watermarking algorithms have become a popular research topic. According to the location of the watermark embedding, it can be divided into spatial domain watermarking and transform domain watermarking [8,9]. Spatial domain watermarking has the advantage of simple operation by directly modifying image pixels for watermark embedding.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The embedded secret information bits are obtained according to the partition index values of the output codewords. As an information hiding algorithm in compressed domain, QIM steganography is widely popularized to other various streaming media including speeches, such as, images [35], audios [36], videos [37], etc.. In view of of the QIM-based speech steganography, Xiao et al [29] proposed the complementary neighbor vertices (CNV) QIM-based algorithm for information embedding during the VQ process of LPC for the first time.…”
Section: Introductionmentioning
confidence: 99%