2016
DOI: 10.1007/s11042-016-3975-0
|View full text |Cite
|
Sign up to set email alerts
|

Digital watermark extraction in wavelet domain using hidden Markov model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(6 citation statements)
references
References 49 publications
0
6
0
Order By: Relevance
“…The strategy is robust and imperceptible for different attacks. Amini et al [35] proposed a blind watermark decoder utilizing a vectorbased Hidden Markov model (HMM) in the DWT. The results demonstrated that the strategy is profoundly robust for different assaults including checkmark and offered a lower bit error rate than other methods [36].…”
Section: Related Workmentioning
confidence: 99%
“…The strategy is robust and imperceptible for different attacks. Amini et al [35] proposed a blind watermark decoder utilizing a vectorbased Hidden Markov model (HMM) in the DWT. The results demonstrated that the strategy is profoundly robust for different assaults including checkmark and offered a lower bit error rate than other methods [36].…”
Section: Related Workmentioning
confidence: 99%
“…However, this watermarking scheme is not so ideal when dealing with large-capacity watermarks. Amini et al [8] used vector-based HMM to capture multiple correlations of wavelet coefficients. The statistical watermark decoder was developed by the maximum likelihood criterion.…”
Section: Related Workmentioning
confidence: 99%
“…So far, the commonly used transforms include discrete Wavelet transform (DWT) [1]- [8], Contourlet transform [9]- [16], dual tree complex Wavelet transform (DT-CWT) [17], nonsubsampled Shearlet transform (NSST) [18], nonsubsampled Contourlet transform (NSCT) [19], discrete Cosine transform (DCT) [20], and discrete Shearlet transform (DST) [21]. The usually adopted statistical models include Gaussian distribution [5], Gaussian mixture model (GMM) [3], bivariate Gaussian distribution [15], general Gaussian distribution (GGD) [7], [16], normal inverse Gaussian distribution (NIG) [9], [12], Bessel-K form (BKF) distribution [10], [18], Gamma distributions [17], Rayleigh distributions [17], Weibull distributions [17], [20], two dimensional generalized autoregressive conditional heteroscedasticity (2D-GARCH) model [2], [13], t Location-Scale distribution [11], [14], Cauchy distributions [19], vector-based Gaussian HMT model [6], [8] and Laplacian distribution [21]. The two most common methods of digital watermark embedding are addition [2], [4], [7], [8], [11], [13], [17], [19] and multiplication [1], [6], [9],…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Frequency domain watermarking first involves transforming the host image, commonly including matrix decomposition, three major transformations (namely discrete wavelet transform (DWT) [ 21 , 22 , 23 , 24 , 25 ], discrete cosine transform (DCT) [ 26 , 27 , 28 , 29 , 30 ], and discrete Fourier transform (DFT) [ 31 , 32 , 33 , 34 ]), and other transformations [ 20 , 35 , 36 , 37 , 38 , 39 ], followed by modifying the transform coefficients to embed the watermark.…”
Section: Introductionmentioning
confidence: 99%