2022
DOI: 10.1016/j.jisa.2022.103296
|View full text |Cite
|
Sign up to set email alerts
|

A secure gray-scale image watermarking technique in fractional DCT domain using zig-zag scrambling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 41 publications
0
4
0
Order By: Relevance
“…Another experiment was conducted using lena, pepper, and boat as the carrier images to evaluate the NC values of the extracted watermark under diferent attacks, including Gaussian noise (variance 0.001), salt and pepper noise (density 0.001), cropping (25% center, 25% rows, and 50% rows), and JPEG compression (compression factor 70 and 60). Te results were compared with those of references [46,47], as shown in Table 8.…”
Section: Robustness Testmentioning
confidence: 99%
See 1 more Smart Citation
“…Another experiment was conducted using lena, pepper, and boat as the carrier images to evaluate the NC values of the extracted watermark under diferent attacks, including Gaussian noise (variance 0.001), salt and pepper noise (density 0.001), cropping (25% center, 25% rows, and 50% rows), and JPEG compression (compression factor 70 and 60). Te results were compared with those of references [46,47], as shown in Table 8.…”
Section: Robustness Testmentioning
confidence: 99%
“…Furthermore, the BER values of the extracted watermark were evaluated under attacks such as Gaussian noise (variance of 0.001 and 0.1), salt and pepper noise (density of 0.01), cropping (25% rows and 50% rows), JPEG compression (compression factors of 80), median fltering (window size 3 × 3), and average fltering (window size 3 × 3). Te results were compared with those of references [46,48], as presented in Table 9.…”
Section: Robustness Testmentioning
confidence: 99%
“…Chaos is widely used and highly respected in the field of image encryption due to its unpredictability, pseudorandomness, and high sensitivity to initial values. At present, a variety of encryption methods have been proposed, including quantum cipher [13][14][15], bit-level encryption [16][17][18], discrete wavelet transform [19][20][21], thumbnail-preserving encryption [22][23][24], biological coding [25][26][27], discrete cosine transform [28][29][30], Fourier transform [31][32][33], chaos theory [34][35][36][37][38][39][40] and so on [41][42][43][44][45].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the utilization of image encryption techniques can effectively prevent important data from being leaked during transmission. Many encryption methods have been proposed, such as quantum cipher [1][2][3], thumbnail-preserving encryption [4][5][6][7], biological coding [8][9][10], discrete wavelet transform [11][12][13], discrete cosine transform [14][15][16], bit-level encryption [17][18][19], Fourier transform [20][21][22], chaos theory [23][24][25], and so on [26][27][28]. Moreover, the unpredictability, pseudo-randomness, and high sensitivity to initial values of chaos make it the most effective and widely used approach for image encryption algorithms.…”
Section: Introductionmentioning
confidence: 99%