2014
DOI: 10.1016/j.ijleo.2013.07.126
|View full text |Cite
|
Sign up to set email alerts
|

A robust watermarking algorithm based on salient image features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(16 citation statements)
references
References 19 publications
0
16
0
Order By: Relevance
“…In order to test the imperceptibility and capacity of the devised lossless watermarking technology, based on MB software, the watermark performance test was carried out, and the literature [5] and the literature [7] were used as the control group to reflect the superiority of the watermarking technique. The experimental conditions are: DELL, 3.5GHZ, dual-core CPU, 500GB hard drive and 8G memory.…”
Section: ⅵ Simulation Results and Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…In order to test the imperceptibility and capacity of the devised lossless watermarking technology, based on MB software, the watermark performance test was carried out, and the literature [5] and the literature [7] were used as the control group to reflect the superiority of the watermarking technique. The experimental conditions are: DELL, 3.5GHZ, dual-core CPU, 500GB hard drive and 8G memory.…”
Section: ⅵ Simulation Results and Analysismentioning
confidence: 99%
“…In order to describe the mixed binary system in detail, the decimal integer 314 is taken as an example, which can be represented as (6), it is changed into integer q ; then, through formula (7) and formula (8), q is changed into different cardinals and values.…”
Section: Hybrid Binary Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…Usually, the embedding processes can be categorized as those in the space and transform domain, and each can be implemented by means of additive, multiplicative, and quantization-based one, and so forth [1][2][3][4].…”
Section: Introductionmentioning
confidence: 99%
“…Experimental work shows the robustness of proposed scheme against various image processing attacks. Another watermarking algorithm robust against geometric attacks, based on image features is proposed in [20]. In this scheme, Watermark is embedded in the areas represented by the salient features of the image.…”
Section: Introductionmentioning
confidence: 99%