2020
DOI: 10.1007/s11042-020-09686-9
|View full text |Cite
|
Sign up to set email alerts
|

An adaptive reversible watermarking in IWT domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 27 publications
(15 citation statements)
references
References 44 publications
0
15
0
Order By: Relevance
“…( 14). The masking of 𝑧 sequence and 𝑑 3 is done to construct 𝑑 4 in such a way that whenever 𝑀 𝑖 𝑀𝑖𝑙𝑙 π‘π‘’π‘π‘œπ‘šπ‘’ 1 , c 𝑑 𝑖 3 will be complemented to get 𝑑 𝑖 4 . Otherwise, no change occurs.…”
Section: Encryption and Decryptionmentioning
confidence: 99%
See 2 more Smart Citations
“…( 14). The masking of 𝑧 sequence and 𝑑 3 is done to construct 𝑑 4 in such a way that whenever 𝑀 𝑖 𝑀𝑖𝑙𝑙 π‘π‘’π‘π‘œπ‘šπ‘’ 1 , c 𝑑 𝑖 3 will be complemented to get 𝑑 𝑖 4 . Otherwise, no change occurs.…”
Section: Encryption and Decryptionmentioning
confidence: 99%
“…Information hiding is the art of protecting the information in a secured manner. Steganography and watermarking methods are two main categories of Information hiding [3,4]. The watermarking is considered a process of making information imperceptible, where it changes a work to embed information related to the particular work.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…e transform domain scheme used a series of transforms to convert image into transform coefficients and then used the correlation between the coefficients for information hiding. More researched schemes included discrete cosine transform, wavelet transform [5,6], and so on. In addition, in order to improve the secrecy and robustness of hidden information, information hiding schemes based on image compression [7] and encryption [8] have also been proposed.…”
Section: Introductionmentioning
confidence: 99%
“…All the positions and strengths of hiding information as well as the hiding domain are automatically achieved by training the networks. However, these works have one or more of the following shortcomings: (1) the colors of the generated steganographic images are distorted [18]; (2) the hiding capacity is limited in [15,[18][19][20][21]. (3) the model [15][16][17]22] does not fit the steganographic process well; and (4) the secret image is not encrypted and then steganographic in [16,21,23]; thus, it is not sufficiently secure.…”
Section: Introductionmentioning
confidence: 99%