2015
DOI: 10.1080/02564602.2015.1042927
|View full text |Cite
|
Sign up to set email alerts
|

An Overview of Robust Digital Image Watermarking

Abstract: This paper presents a thorough literature review of robust digital image watermarking applied in diverse applications. Researchers have already done lots of noteworthy work in the field of digital image watermarking. Even though, it is interesting to point out that current methods designed for image integrity may not be perfect. Therefore, the main aim of this paper is to offer a comprehensive reference source to the researchers involved in the design of robust digital image watermarking schemes, regardless of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0
1

Year Published

2016
2016
2021
2021

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 51 publications
(25 citation statements)
references
References 80 publications
0
24
0
1
Order By: Relevance
“…For other methods such as Fourier Transform, Wavelet Transform, Walsh Transform, KL transform and other frequency transform, our design framework provided by this paper can be quickly implemented. What's more, the high-efficiency batch processing capability of the proposed system can extend to other image or video processing applications such as image compression [22] and video digital encryption. Our cloud acceleration method has broad application prospects.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…For other methods such as Fourier Transform, Wavelet Transform, Walsh Transform, KL transform and other frequency transform, our design framework provided by this paper can be quickly implemented. What's more, the high-efficiency batch processing capability of the proposed system can extend to other image or video processing applications such as image compression [22] and video digital encryption. Our cloud acceleration method has broad application prospects.…”
Section: Discussionmentioning
confidence: 99%
“…Broadly, watermarking can be divided into two classes: robust and fragile watermarking [22]. Robust watermarks are required to remain in the watermarked image even after it has been manipulated by different attacks whereas the fragile watermarks are designed to be broken easily by image processing operations.…”
Section: Related Work a Digital Watermarkingmentioning
confidence: 99%
“…. [1], [2]. Hiện nay có nhiều giải pháp để bảo vệ nội dung số và có thể chia thành hai loại chính: mật mã (cryptography) và giấu tin (data hiding) [3].…”
Section: Giới Thiệuunclassified
“…The watermark can be retrieved back to its original form, which is used for ownership verification. Thus, the digital watermark and the algorithm for its embedding must have the following properties (Begum, Uddin, 2020;Verma, Jha, 2015):…”
Section: Introductionmentioning
confidence: 99%