2021
DOI: 10.1109/access.2021.3067245
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Image Watermarking by Modifying Selected DWT-DCT Coefficients

Abstract: Digital images can be easily copied or manipulated by irresponsible persons. The right property needs to be secured and protected from illegal copies and piracy. Digital watermarking is one of the solutions to protect the intellectual property of digital images. This paper proposed the adaptive scaling factor based on selected DWT-DCT coefficients of its image content. The adaptive scaling factor was generated based on the role of selected DWT-DCT coefficients against the average value of DWT-DCT coefficients.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
35
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 52 publications
(36 citation statements)
references
References 29 publications
1
35
0
Order By: Relevance
“…The suggested method was also assessed for imperceptibility of watermarked pictures. According to the results, the suggested technique displayed very low BER value of the retrieved watermark even after subjecting to different attacks [1].…”
Section: Literature Survey Ferda Ernawan Et Al (Feb 2021)mentioning
confidence: 94%
“…The suggested method was also assessed for imperceptibility of watermarked pictures. According to the results, the suggested technique displayed very low BER value of the retrieved watermark even after subjecting to different attacks [1].…”
Section: Literature Survey Ferda Ernawan Et Al (Feb 2021)mentioning
confidence: 94%
“…Hence, integrating multiple techniques into one is a cumbersome task. When compared to other transformations, such as DFT (or its fast version FFT) and DWT, the main merit of DCT-based watermarking methods is their resilience to image compression attacks [ 12 , 41 ]. Compression is one of the most widely used modifications within the whole image processing space; thus, withstanding it is a must for a robust watermarking strategy.…”
Section: Related Workmentioning
confidence: 99%
“…For C (3,4),C(4, 3) and C (5,6),C (6,5) the two pairs of coefficients are directly exchanged if the condition is not satisfied; for C (3,5),C(4, 4),C(5, 3) and C(4, 6),C(5, 5),C (6,4) the four pairs of coefficients , if they do not satisfy the condition, are sorted according to the size relationship and assigned to each coefficient in turn; for C (3,6),C(4, 5),C(5, 4),C(6, 3) the three pairs of coefficients, if the condition is not satisfied, are modified according to Eq. (8).…”
Section: Watermark Embedding Processmentioning
confidence: 99%
“…And in the transform domain, where pixel values are transformed into frequency coefficients and then is used to embed, commonly used techniques are Discrete Cosine Transform(DCT) [2,3], Discrete Wavelet Transform(DWT) [4], Discrete Fourier Transform(DFT) [5], there are some improvements on these basic techniques such as Redundant Discrete Wavelet Transformation(RDWT) [6], Quaternion Discrete Fourier transform(QDFT) [7], etc. Sometimes multiple frequency techniques are used in combination such as DCT-DWT [8,9], Dual Tree Complex Wavelet Transform-Discrete Cosine Transform(DTCWT-DCT ) [10] etc. The screen photography process, which is the process of capturing a screen with a mobile phone and generating an image, undergoes analog-to-digital and digital-to-analog conversion attacks [11] and also causes many distortions.…”
Section: Introductionmentioning
confidence: 99%