2016 International Conference on Communication and Signal Processing (ICCSP) 2016
DOI: 10.1109/iccsp.2016.7754176
|View full text |Cite
|
Sign up to set email alerts
|

Comparison analysis of digital image watermarking using DWT and LSB technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…erefore, it is an effective way to protect information security, such as anticounterfeiting traceability and copyright protection. Earlier digital watermarking technologies [1,2] focused on grayscale images, and watermarks were embedded in spatial or frequency domains. With the development of artificial intelligence and the special demand for host images, adaptive watermarking [3,4], reversible watermarking [5], and deep learning watermarking [6] have received attention.…”
Section: Introductionmentioning
confidence: 99%
“…erefore, it is an effective way to protect information security, such as anticounterfeiting traceability and copyright protection. Earlier digital watermarking technologies [1,2] focused on grayscale images, and watermarks were embedded in spatial or frequency domains. With the development of artificial intelligence and the special demand for host images, adaptive watermarking [3,4], reversible watermarking [5], and deep learning watermarking [6] have received attention.…”
Section: Introductionmentioning
confidence: 99%
“…When the beneficiary approves and decodes the information, the item can be hence taken from any substance distinguishing proof, verification of-proprietorship or other graphic data. This may prompt further duplication and re-appropriation leaving the rights holders weak and sovereignty less [5]. To enhance the security of audio data, digital watermarking and steganography techniques complement cryptography for protecting content even after it is deciphered [6].…”
Section: Introductionmentioning
confidence: 99%
“…It is done by embedding additional information called digital signature or watermark into the digital contents such that it can be detected, extracted later to make an assertion about the multimedia data. [1,2] For image cryptography, the algorithms can be categorized into one of the two domains: spatial domain or transform domain. [1,2] In Spatial domain the data is embedded directly by modifying pixel values of the host image, while transform domain schemes embed data by modifying transform domain coefficients.…”
Section: Introductionmentioning
confidence: 99%
“…[1,2] For image cryptography, the algorithms can be categorized into one of the two domains: spatial domain or transform domain. [1,2] In Spatial domain the data is embedded directly by modifying pixel values of the host image, while transform domain schemes embed data by modifying transform domain coefficients. Algorithms used for special domain are less robust for various attacks as the changes are made at least Significant Substitution (LSB) of original data.…”
Section: Introductionmentioning
confidence: 99%