2010
DOI: 10.1109/tip.2009.2038774
|View full text |Cite
|
Sign up to set email alerts
|

Contourlet-Based Image Watermarking Using Optimum Detector in a Noisy Environment

Abstract: In this paper, an improved multiplicative image watermarking system is presented. Since human visual system is less sensitive to the image edges, watermarking is applied in the contourlet domain, which represents image edges sparsely. In the presented scheme, watermark data is embedded in directional subband with the highest energy. By modeling the contourlet coefficients with General Gaussian Distribution (GGD), the distribution of watermarked noisy coefficients is analytically calculated. The tradeoff betwee… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
90
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 141 publications
(92 citation statements)
references
References 47 publications
(78 reference statements)
2
90
0
Order By: Relevance
“…As is evident from the tables, our scheme produces much better results than the compared technique presented in [9]. Figure 22 shows that for an AWGN attack of variance 30, two versions of our proposed technique (using block size 8 and block size 16) produce lower BER (%) than that of Akhaee et al [9] with four types of host images. Table 11.…”
Section: Robustness Quantitative Comparison With Contourlet-based Schmentioning
confidence: 80%
See 2 more Smart Citations
“…As is evident from the tables, our scheme produces much better results than the compared technique presented in [9]. Figure 22 shows that for an AWGN attack of variance 30, two versions of our proposed technique (using block size 8 and block size 16) produce lower BER (%) than that of Akhaee et al [9] with four types of host images. Table 11.…”
Section: Robustness Quantitative Comparison With Contourlet-based Schmentioning
confidence: 80%
“…In Tables 11 and 12 the three versions of the proposed scheme are compared with the watermarking scheme presented by Akhaee et al [9] for AWGN noise attack (variance 25 and 30), JPEG compression attack (quality factor 10%), and scaling attack of different levels. As is evident from the tables, our scheme produces much better results than the compared technique presented in [9].…”
Section: Robustness Quantitative Comparison With Contourlet-based Schmentioning
confidence: 99%
See 1 more Smart Citation
“…when a small perturbation is added to an image, the values do not change significantly. Thus it was oyed for image watermarking [8], [9].…”
Section: Computer Science and Information Technology (Cs And It)mentioning
confidence: 99%
“…One of the unique properties of contourlet transform is that we could have any number of directional decompositions at every level of resolutions [3]. Thus making it a one of the suitable technique for watermarking [8] [9], [10].…”
Section: Introductionmentioning
confidence: 99%