2015
DOI: 10.13164/re.2015.0240
|View full text |Cite
|
Sign up to set email alerts
|

Copyright Protection of Color Imaging Using Robust-Encoded Watermarking

Abstract: Abstract. In this paper we present a robust-encoded watermarking method applied to color images for copy- KeywordsDigital watermarking, image normalization, geometric and signal processing operations convolutional encoder, Viterbi decoder, discrete cosine transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
18
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(19 citation statements)
references
References 22 publications
1
18
0
Order By: Relevance
“…Analyzing the results in Figure 8 we show that our method is robust against several geometric distortions including scaling from 0.5 to 2, symmetric and asymmetric line and column removal, shearing, cropping attack with 1% and 2% and common signal processing including median filter and gaussian filter. In all cases we have obtained NC values greater than the predefined threshold value TNC = 0.75 [Man15] and we detect the watermark without managing to ameliorate the attacked images unlike with other methods [Sra17]. Table 2 confirms the results shown Figure 8, all the values of BER are less than the predefined threshold value TBER = 0.2 [Wke15].…”
Section: Robustness Resultssupporting
confidence: 74%
See 2 more Smart Citations
“…Analyzing the results in Figure 8 we show that our method is robust against several geometric distortions including scaling from 0.5 to 2, symmetric and asymmetric line and column removal, shearing, cropping attack with 1% and 2% and common signal processing including median filter and gaussian filter. In all cases we have obtained NC values greater than the predefined threshold value TNC = 0.75 [Man15] and we detect the watermark without managing to ameliorate the attacked images unlike with other methods [Sra17]. Table 2 confirms the results shown Figure 8, all the values of BER are less than the predefined threshold value TBER = 0.2 [Wke15].…”
Section: Robustness Resultssupporting
confidence: 74%
“…In addition, our proposed method obtains BER values better than [Man15].For scaling attack, we obtain BER equal to 0.001 and 0.009 respectively for scale_0.5 and Table 4: Comparison of robustness between the proposed approach and other existing image watermarking schemes scale_2, [Man15] obtain BER =0.02 for both attacks. On the other hand, the method proposed in [Job17] has a similar performance against the above mentioned common signal processing.…”
Section: Comparison With Existing Algorithmsmentioning
confidence: 72%
See 1 more Smart Citation
“…This illegal distribution and copyright violation results in the form of millions of dollars loss [1]. To overcome this illicit distribution and copyright violation digital watermarking is proposed as a prominent solution [2][3][4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%
“…In terms of information required at the time of watermark extraction, watermarking is divided into blind and non-blind [2]. In later case, original image is required (and may be key) at the time of watermark extraction, whereas in former watermarking type there is no need of original image for extraction of watermark [3]. Therefore, blind watermarking is considered to be more secure and convenient, hence in this paper blind watermarking schemes are proposed.…”
Section: Introductionmentioning
confidence: 99%