2022
DOI: 10.18280/isi.270215
|View full text |Cite
|
Sign up to set email alerts
|

A Robust Color Image Watermarking Scheme Based on Discrete Wavelet Transform Domain and Discrete Slantlet Transform Technique

Abstract: Watermarking is primarily used to prevent unauthorized copying of digital data by inserting a watermark as a symbol of ownership in the digital data. The purpose of this work is to increase the imperceptibility and robustness of watermarked image by utilizing the Discrete Wavelet Transform (DWT) domain and Discrete Slantlet Transform (DST) technique. In compared to existing methodologies, the strategies used in this work considerably increased the robustness, imperceptibility, and protection of the watermarked… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Watermarking [11] is a process of hiding a bit of information into multimedia content such as images, sounds and videos that are not detected by the human visual system (HVS) but easily detected by computer. Prior to the development of digital image watermarking [12]- [15], it was very difficult to achieve the following objectives: obtaining copyright protection, authentication, content identification and proof of ownership.…”
Section: Introductionmentioning
confidence: 99%
“…Watermarking [11] is a process of hiding a bit of information into multimedia content such as images, sounds and videos that are not detected by the human visual system (HVS) but easily detected by computer. Prior to the development of digital image watermarking [12]- [15], it was very difficult to achieve the following objectives: obtaining copyright protection, authentication, content identification and proof of ownership.…”
Section: Introductionmentioning
confidence: 99%
“…A stego image hosts the secret data with a certain quality, whereas the cover image is pure without containing the secret information. The steganography technique has been applied in the field of medical diagnoses [8], military and defense [9], [10], multimedia biometric data security [11], and cloud computing [12]. On the next page, Figure 1 exposes the fundamental issues and difficulties concerning the performance of the existing steganography schemes related to the payload capacity, imperceptibility, and security [12], [13].…”
Section: Introductionmentioning
confidence: 99%
“…Image steganography system has become the most popular research area than the other types of systems because of the availability, ease to use by users, and the ability to hold a large amount of data, in addition to the difficulty of noticing the hidden data by the unwanted third party [5].…”
Section: Introductionmentioning
confidence: 99%