Computer Science Conference Proceedings 2012
DOI: 10.5121/csit.2012.2113
|View full text |Cite
|
Sign up to set email alerts
|

Dwt-SVD Based Secured Image Watermarking for Copyright Protection Using Visual Cryptography

Abstract: In this paper, a new robust watermarking technique for copyright protection based on Discrete Wavelet Transform and Singular Value Decomposition is proposed. The high frequency subband of the wavelet decomposed cover image is modified by modifying its singular values. A secret key is generated from the original watermark with the help of visual cryptography to claim the ownership of the image. The ownership of the image can be claimed by superimposing this secret key on the extracted watermark from the waterma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…16 Formula for calculating image blockiness Fig. 17 Graphical representation of the blockiness algorithm [13] to steganography and watermarking [60,107]. This paper discussed targeted and blind steganalysis strategies, used for breaking steganography techniques.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…16 Formula for calculating image blockiness Fig. 17 Graphical representation of the blockiness algorithm [13] to steganography and watermarking [60,107]. This paper discussed targeted and blind steganalysis strategies, used for breaking steganography techniques.…”
Section: Resultsmentioning
confidence: 99%
“…Many of these hybrid techniques make use of a mathematical decomposition called the Singular Value Decomposition. SVD is considered to be one of the most valuable numerical analysis tools available, mainly because singular values obtain inherent algebraic properties and provide stability that permits secret data to be hidden without degrading the perceptual quality of an image [60,107]. We next look at biometric systems & biometric security.…”
Section: Introductionmentioning
confidence: 99%