2019
DOI: 10.1002/ett.3771
|View full text |Cite
|
Sign up to set email alerts
|

Application of discrete transforms with selective coefficients for blind image watermarking

Abstract: Watermarking scheme is not helpful in conveying the original image continually so as identifying the owner's mark from the watermarked image. In the current situation, our chosen topic is significant in real‐time applications like fraud recognition, emergency clinic, and government divisions. In this study, an optimal multiblind watermarking model is proposed for the watermark detection process. Our proposed model is a combination of intelligent domain transforms like Discrete Shearlet Transform and Discrete C… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(17 citation statements)
references
References 43 publications
0
17
0
Order By: Relevance
“…When a node in the cluster receives this message, it will send digital at this interval. After the digital transmission period, the cluster head node collects the digital sent from the nodes in the cluster, processes the digital by running digital-intensive algorithms, and sends the results directly to the receiver node [33][34][35].…”
Section: Intracluster Routingmentioning
confidence: 99%
See 1 more Smart Citation
“…When a node in the cluster receives this message, it will send digital at this interval. After the digital transmission period, the cluster head node collects the digital sent from the nodes in the cluster, processes the digital by running digital-intensive algorithms, and sends the results directly to the receiver node [33][34][35].…”
Section: Intracluster Routingmentioning
confidence: 99%
“…e research premise of unconnected effector Internet topology control is to control the power supply and select the corresponding backbone Internet node copper cables to meet the the Internet coverage and connection conditions [35]. Time eliminates those unimportant communication paths in the nodes, enabling it to form a structured and efficient digital transmission network topology.…”
Section: Topological Structure Controlmentioning
confidence: 99%
“…Aiming at the problems of slow training speed of high-dimensional image information input network and low information utilization rate, the feature selection is performed to reduce the image dimension and simplify the image information, and extract useful feature information that can better reflect the essence of the target image, and improve Network recognition rate. Feature extraction is the process of obtaining effective information that reflects the image from the original image information through different function transformations [32]. Methods such as principal component analysis (PCA) and linear discrimination are more common linear transformation methods [33][34].…”
Section: ) Feature Extraction and Selectionmentioning
confidence: 99%
“…It is a model that describes system characteristics related to the timing and sequence of operations, events that affect change, sequence of events, context of events, and organization of events. It is usually expressed as a mathematical equation for a continuous or discrete time variable [10]. e dynamic model of the system can be described by sequence diagram, state diagram, and activity diagram.…”
Section: Dynamic Degreementioning
confidence: 99%