2007
DOI: 10.1016/j.eswa.2006.01.028
|View full text |Cite
|
Sign up to set email alerts
|

Expert system for low frequency adaptive image watermarking: Using psychological experiments on human image perception

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(13 citation statements)
references
References 15 publications
0
13
0
Order By: Relevance
“…Also, this method provides the robustness against typical watermark attack channels such as AWGN noise, JPEG compression, median, and Wiener filtering. Later, Moon et al [50] proposed an adaptive image watermarking system based on the statistical data from psychological experiments on human image perception. The main strength of this technique is that the fidelity of images was remarkably enhanced through controlling the watermark strength with the data associated with brightness and contrast as local image characteristics without sacrificing the robustness of images.…”
Section: Dwt-based Watermarkingmentioning
confidence: 99%
“…Also, this method provides the robustness against typical watermark attack channels such as AWGN noise, JPEG compression, median, and Wiener filtering. Later, Moon et al [50] proposed an adaptive image watermarking system based on the statistical data from psychological experiments on human image perception. The main strength of this technique is that the fidelity of images was remarkably enhanced through controlling the watermark strength with the data associated with brightness and contrast as local image characteristics without sacrificing the robustness of images.…”
Section: Dwt-based Watermarkingmentioning
confidence: 99%
“…The watermarking application is considered one of the criteria for watermarking classification. Figure 3 shows the subcategories based on watermarking applications [16][17][18]. Image watermarking techniques proposed so far can be divided into two main groups: those which embed the watermark directly in Fig.…”
Section: Watermarkingmentioning
confidence: 99%
“…The image resolution applying DWT is divided into 4 submatrices called approximations a, horizontal h, vertical v, and diagonal d, see Figure 1. Each submatrix is a copy of the original image but in different frequency level which provides a certain amount of energy (Moon ,2007;Walker, 2003). In this image subdivision the steganographic algorithm is applied only in the submatrix h and the other ones are discarded.…”
Section: Proposed Methodsmentioning
confidence: 99%