2002
DOI: 10.1049/el:20021131
|View full text |Cite
|
Sign up to set email alerts
|

Distortionless data hiding based on integer wavelet transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
121
0

Year Published

2005
2005
2017
2017

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 250 publications
(121 citation statements)
references
References 3 publications
0
121
0
Order By: Relevance
“…Column (c) shows the dissimilarity between watermarked and the original image, indicating indiscernible embedding of the watermark by using the best evolved expression using GP simulations The naked eye is unable to differentiate this difference, so some amplification is done to enhance the difference as shown in column Fig.7. compares the existing reversible watermarking techniques [36], [37], [28], [31], [18], [3], [35], [27], [25], [19], [8], [12] with the proposed IWT-Med. Tian's technique is quite interesting but its disadvantage is that for locating the expanded differences, extra information of location map is inserted besides the watermark in the image.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Column (c) shows the dissimilarity between watermarked and the original image, indicating indiscernible embedding of the watermark by using the best evolved expression using GP simulations The naked eye is unable to differentiate this difference, so some amplification is done to enhance the difference as shown in column Fig.7. compares the existing reversible watermarking techniques [36], [37], [28], [31], [18], [3], [35], [27], [25], [19], [8], [12] with the proposed IWT-Med. Tian's technique is quite interesting but its disadvantage is that for locating the expanded differences, extra information of location map is inserted besides the watermark in the image.…”
Section: Resultsmentioning
confidence: 99%
“…Another disadvantage of the Xuan's approach is that the thresholding is performed using hit and trial method. Existing reversible watermarking techniques provide a useful tradeoff between capacity and imperceptibility of watermarked image [36], [37], [35], [28], [13]. However, there is still a margin of improvement that mainly depends on the selection of the threshold.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Reversible data hiding [1][2][3][4][5][6][7][8][9][10], often referred to as reversible watermarking, was proposed as a promising technique for sensitive image (such as medical and remote sensed images) authentication, and it has drawn much attention in the recent years. Such an embedding algorithm allows extraction of intact hidden data from the watermarked digital carriers and lossless recovery of the original images, if no modification has been made to the watermarked digital carriers.…”
Section: Introductionmentioning
confidence: 99%
“…One category applies data embedding in the spatial domain [1][2][3][4], with relatively low capacity. The other category hides data into the coefficients in the transform domains [5][6][7][8][9], such as the integer DCT and the integer wavelet transform domains. The second category of methods are all facing the same problem: how to choose appropriate embedding locations to avoid pixel value overflow and underflow, and all the solutions have to pay the overhead cost to record all the embedding locations, which greatly reduces the embedding capacity.…”
Section: Introductionmentioning
confidence: 99%