2023
DOI: 10.1007/s11042-023-15177-4
|View full text |Cite
|
Sign up to set email alerts
|

A robust semi-fragile watermarking system using Pseudo-Zernike moments and dual tree complex wavelet transform for social media content authentication

Abstract: With the growing use of mobile devices and Online Social Networks (OSNs), sharing digital content, especially digital images is extremely high as well as popular. This made us convenient to handle the ongoing COVID-19 crisis which has brought about years of change in the sharing of digital content online. On the other hand, the digital image processing tools which are powerful enough to make the perfect image duplication compromises the privacy of the transmitted digital content. Therefore, content authenticat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(2 citation statements)
references
References 58 publications
0
2
0
Order By: Relevance
“…A digital watermarking method is typically evaluated based on several essential attributes, including imperceptibility, robustness, security, and payload [23], [24]. However, zero-watermarking stands apart by not requiring the embedding of data directly into the original image, ensuring that the visual quality of the image remains unaltered, in line with imperceptibility requirements.…”
Section: Introductionmentioning
confidence: 99%
“…A digital watermarking method is typically evaluated based on several essential attributes, including imperceptibility, robustness, security, and payload [23], [24]. However, zero-watermarking stands apart by not requiring the embedding of data directly into the original image, ensuring that the visual quality of the image remains unaltered, in line with imperceptibility requirements.…”
Section: Introductionmentioning
confidence: 99%
“…Digital watermarking techniques are generally processed on two domains [5]: Pixel-Based domain and Frequency-Based domain. To transform the image in the frequency domain, techniques such as Discrete Fourier Transform (DFT) [6], Quaternion Curvelet Transform (QCT) [7], Discrete Cosine Transform (DCT) [8], Hilbert Transform [9], Wavelet Transform [Discrete wavelet (DWT) [10], Stationary Wavelet (SWT) [11], Integer Wavelet Transform (IWT) [12], Complex Wavelet Transform (CWT) [13]], etc. The hybrid embedding techniques are also been attracted by the researchers to achieve authentication [14].…”
Section: ░ 1 Introductionmentioning
confidence: 99%