2008
DOI: 10.1109/tifs.2007.916275
|View full text |Cite
|
Sign up to set email alerts
|

Color Image Watermarking Using Multidimensional Fourier Transforms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
101
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 207 publications
(110 citation statements)
references
References 26 publications
0
101
0
Order By: Relevance
“…In the same vein as [49], Kougianos et al [25] have investigated several DCT-DWT domain dual (robust-fragile) watermarking methods which are embedded in a hardware processor in order to achieve low power usage, real-time performance, reliability, and ease of integration with existing consumer electronic devices. Other common transforms such as the Fourier transform [41], [42], the fractional Fourier Transform [38], the Hadamard transform [31] or the Schur transform [39] have been used in the cited robust watermarking schemes to lower the computation cost and improve the authentication assessment of the watermark during common image processing attacks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the same vein as [49], Kougianos et al [25] have investigated several DCT-DWT domain dual (robust-fragile) watermarking methods which are embedded in a hardware processor in order to achieve low power usage, real-time performance, reliability, and ease of integration with existing consumer electronic devices. Other common transforms such as the Fourier transform [41], [42], the fractional Fourier Transform [38], the Hadamard transform [31] or the Schur transform [39] have been used in the cited robust watermarking schemes to lower the computation cost and improve the authentication assessment of the watermark during common image processing attacks.…”
Section: Related Workmentioning
confidence: 99%
“…In [4] the color pixels are interpreted as quaternions and the Quaternion DFT is applied to compute coefficients which are marked with the Quantization Index Modulation; a watermarking scheme is obtained that is judged suitable for data hiding by its authors. In [42] the DFT is applied for the robust, non-blind watermarking of color images: two approaches are presented, both aimed at minimizing the watermark visual impact giving more strength to the yellow-blue component; the first approach is based on the Spatio-Chromatic DFT whilst the second applies the Quaternion Fourier Transform (QFT).…”
Section: Related Workmentioning
confidence: 99%
“…Step 4: R 11 and I 11 calculation by eq (13) There are two unknowns and two equations eq (14) and eq (15) Now R 11 is equivalent to R 01 , That is 28 and I 11 is negation of I 01 , which is -44 by eq (13). This two pair 28 + j 44 and 28 -j 44 are known as complex conjugate pair.…”
Section: 41algorithm For Forward Z-transformationmentioning
confidence: 99%
“…However, it still has relative low capacity and gener− ally is not robust against attacks. On the other hand, the fre− quency domain transformed the host image using frequency transformations such as discrete cosine transform (DCT) [3,4], discrete wavelet transform (DWT) [5,6], discrete Fou− rier transform (DFT) [7,8], discrete Hadamard transform (DHT) [9,10] and Ridgelet transform (RT) [11,12]. Then, watermark is embedded by modifying these coefficients.…”
Section: Introductionmentioning
confidence: 99%