2021
DOI: 10.1007/s11042-021-10610-y
|View full text |Cite
|
Sign up to set email alerts
|

Artificial bee colony based perceptually tuned blind color image watermarking in hybrid LWT-DCT domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(5 citation statements)
references
References 31 publications
0
5
0
Order By: Relevance
“…8. PSNR comparison with [15,28,29] in terms of dB Table 3 shows the NC comparison with [14,18,[25][26][27][28] for common image attacks for Lena standard image. The proposed watermarking method performs good against SLP(0.01), SPLN(0.01) and SCL(2.0) attacks, but for GN(0.01) attack it is not performing well, it could be because the GN(0.01) attacks affects the pixels relationship badly.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…8. PSNR comparison with [15,28,29] in terms of dB Table 3 shows the NC comparison with [14,18,[25][26][27][28] for common image attacks for Lena standard image. The proposed watermarking method performs good against SLP(0.01), SPLN(0.01) and SCL(2.0) attacks, but for GN(0.01) attack it is not performing well, it could be because the GN(0.01) attacks affects the pixels relationship badly.…”
Section: Resultsmentioning
confidence: 99%
“…One of the important steps is to select the region for watermarking it may be done using segmentation [4] or other method. Discrete wavelet transforms (DWT) [5][6], discrete cosine transforms (DCT) [7][8], discrete fourier transform (DFT) [9][10], redundant discrete wavelet transforms (RDWT) [11][12], and integer/Lifting wavelet transform (IWT/LWT) [13][14][15][16][17][18] have previously been used for image watermarking. LWT is second generation wavelet and it has various advantages over the conventional methods and it is most significantly known for absorbing more image distortion due to having more energy compaction properties.…”
Section: Introductionmentioning
confidence: 99%
“…Step 2: Perform SVD on the block embedded with the digital signature, and extract six digital signatures ESN i according to Formula (18).…”
Section: Extraction Of the Digital Signaturementioning
confidence: 99%
“…There are many methods to solve the falsepositive problem. The first method is to encrypt the watermark image [18][19][20][21][22][23]. If the attacker does not understand the encryption process, the false-positive problem will not appear.…”
Section: Introductionmentioning
confidence: 99%
“…This scheme has the advantages of spatial as well as transforms domain techniques, resulting in fewer computations and improved robustness; however, it has a lower embedding capacity. Sharma et al [20] demonstrated a watermarking approach incorporating the fusion of lifting wavelet transform (LWT) and discrete cosine transform (DCT) techniques and further applied the arti cial bee colony (ABC) algorithm to improve visual quality and robustness. This scheme is robust against various attacks, but a detailed security analysis needs to be conducted.…”
Section: Related Workmentioning
confidence: 99%