2007
DOI: 10.1016/j.ins.2006.05.002
|View full text |Cite
|
Sign up to set email alerts
|

Color image watermark extraction based on support vector machines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
48
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 134 publications
(49 citation statements)
references
References 20 publications
0
48
0
Order By: Relevance
“…In this section, the authors compare the proposed method with some existing state-of-the-art methods, concretely, Chou and Liu (2010), Xiang-yang et al (2013), Niu et al (2011), Tsai andSun (2007), Fu and Shen (2008), and Tsougenis et al (2014). These methods describe the watermarking schemes for color images using a binary watermark image without the requirement of the original image in the extraction process, so they can be essentially seen as A C C E P T E D M A N U S C R I P T blind watermarking techniques.…”
Section: Comparison With State-of-the-art Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, the authors compare the proposed method with some existing state-of-the-art methods, concretely, Chou and Liu (2010), Xiang-yang et al (2013), Niu et al (2011), Tsai andSun (2007), Fu and Shen (2008), and Tsougenis et al (2014). These methods describe the watermarking schemes for color images using a binary watermark image without the requirement of the original image in the extraction process, so they can be essentially seen as A C C E P T E D M A N U S C R I P T blind watermarking techniques.…”
Section: Comparison With State-of-the-art Methodsmentioning
confidence: 99%
“…A single secret key is considered in the Arnold transform (Xiang-yang et al, 2013), the quantization process (Tsougenis et al, 2014), and the coefficient block selection (Niu et al, 2011) to enhance the security. A mixture key containing the copyright owner's privacy is also expressed in studies of Tsai and Sun (2007) and Fu and Shen (2008). Although presented under different manners, a secret key is firstly used to protect the watermark out of attackers and secondly support for the extraction process.…”
Section: Comparison With State-of-the-art Methodsmentioning
confidence: 99%
“…Fingerprint generation produces the fingerprint code to be embedded into media content. Fingerprint embedding/detection means to embed or detect the fingerprint code, which is based on watermark embedding/detection [7,28,31]. Thus, fingerprint's robustness against such signal processing operations as recompression, additive noise, filtering, etc.…”
Section: Digital Fingerprintingmentioning
confidence: 99%
“…In addition to the template, support vector machines (SVMs) have also been incorporated to obtain geometrical parameters. For example, a number of recently developed schemes [25][26][27][28] generate patterns, such as the inserted template and Zernike moments, from geometrically attacked watermarked images. These patterns are then input to the SVM to train the classification model, and finally, the trained model is used to predict the geometrical parameters of the to-be-checked image.…”
Section: Introductionmentioning
confidence: 99%