2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI) 2015
DOI: 10.1109/icacci.2015.7275917
|View full text |Cite
|
Sign up to set email alerts
|

A secure non-blind block based digital image watermarking technique using DWT and DCT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
12
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 12 publications
0
12
0
Order By: Relevance
“…Invisible watermark insertion has two domains, namely spatial domain and transforms domain. Watermarking can also be categorized as blind watermarking (a watermark image validation process that does not require a host image) and non-blind watermarking (a watermark image validation process that requires a host image) [7]. In the spatial domain, the watermark image can be inserted into the host image pixels directly, and it can be done easily and quickly; if the transform domain, the host image will be converted into a frequency before inserting the watermark image [8].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Invisible watermark insertion has two domains, namely spatial domain and transforms domain. Watermarking can also be categorized as blind watermarking (a watermark image validation process that does not require a host image) and non-blind watermarking (a watermark image validation process that requires a host image) [7]. In the spatial domain, the watermark image can be inserted into the host image pixels directly, and it can be done easily and quickly; if the transform domain, the host image will be converted into a frequency before inserting the watermark image [8].…”
Section: Introductionmentioning
confidence: 99%
“…The experiment results on eight attacks resulted in the Correlation Coefficient (CC) value, which did not produce a perfect value for the Gaussian noise attack, which only reached 0.6. In contrast, the image without attack resulted in CC = 1, and the highest PSNR was 45 dB [7]. also carried out the merger of DCT and DWTwass.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The most commonly used frequency domain in image watermarking research is DCT and DWT [11][12][13][14]. In the image watermarking method, the combination of DCT and DWT have proved that the method can generate better results than the use of one transformation only [15][16][17][18]. This is caused by each transformation has its own advantages.…”
Section: Introductionmentioning
confidence: 99%
“…Different transforms can be used in order to decompose images in the frequency domain, such as discrete Fourier transform (DFT) [4], discrete cosine transform (DCT) [5], or discrete wavelet transform (DWT) [6]. DWT transform has more benefits compared to the other aforementioned transforms.…”
Section: Introductionmentioning
confidence: 99%