2017
DOI: 10.1007/978-3-319-62407-5_5
|View full text |Cite
|
Sign up to set email alerts
|

Fast Semi-blind Color Image Watermarking Scheme Using DWT and Extreme Learning Machine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…Therefore protection of ownership rights in a scientific manner is of vital importance. One of the strong mechanism to deal with copyright protection of digital content is watermarking, which has undergone a thorough research over the past few decades and accordingly resulted into to development of numerous watermarking schemes [17,24,35,43,47,55,61,63,68,71,79]. However in view of the growing volume of data in every walk of life and its usage, it is imperative to explore new and more effective techniques to protect its ownership rights.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore protection of ownership rights in a scientific manner is of vital importance. One of the strong mechanism to deal with copyright protection of digital content is watermarking, which has undergone a thorough research over the past few decades and accordingly resulted into to development of numerous watermarking schemes [17,24,35,43,47,55,61,63,68,71,79]. However in view of the growing volume of data in every walk of life and its usage, it is imperative to explore new and more effective techniques to protect its ownership rights.…”
Section: Introductionmentioning
confidence: 99%
“…Watermarkingofimagesisachallengingresearchareawhichinvolvesprinciplesandtechniquesof communications,signalprocessingandencryption (Cox,MillarandBloom,2002).Thisresearchhas manypotentialapplicationsandisdirectedtowardsdevisinganefficientwatermarkingschemewhich canbesuccessfullyimplementedinspatialand/ortransformdomains.Robustnessofembedding processisoneoftheimportantprerequisiteoftheseschemes.Evenifaschemeisprovedtoberobust enoughtotheselectedimageprocessingattacks,newattackscanbedevisedinfutureandthus,an apparentlyrobustwatermarkingschemecanbeprovedfatal.Thefinancialimplicationsofcopyright protectionareenormousandthereisarigorousincreaseofresearchactivitybyfamousresearch groupsacrosstheworldatpresent.Theresearchintheareaofimagewatermarkinginparticularhas takentwodirections.ThefirstoneisorientedtowardsitsSSPbasedindustrialapplicationslikethe onediscussedinthiswork.Thesecondorientationisevenmoreinterestingandabstractinnature.It majorlyinvolvestheuseofmachinelearningandothersoftcomputingtechniquestooptimallyembed thewatermarkintotheoptimallyidentifiedlocationswithintheimagesorvideos.Anumerousresearch activityiscarriedoutatpresentinthisdirection.Nearlyallkindsofsoftcomputingtechniques-ArtificialNeuralNetworks(ANNs) (Agarwal,2013(Agarwal, ,2015,FuzzyInferenceSystems(FIS) (Mishra, 2014(Mishra, ,2017,SupportVectorRegressionModels(SVMs) (Rajpal,2016)aswellasMetaheuristic techniques(GAanditsvariants)havebeenemployedforthispurpose.Inadditiontothesetechniques, hybridintelligentnetworksarealsoprofuselyusedtocarryoutwatermarkembeddingandextraction. Therefore,itissurethatsoonerorlaterthedevelopmentofnewandrobustwatermarkingschemes willofferacompetentandcomprehensivesolutiontotheproblemofintellectualpropertyrights(IPR) protectionandcontentauthentication.Toachievethisobjective,somestepsshouldbetaken.Such stepsmustconsistofacceptanceandimplementationofagloballyacceptedwatermarkingprotocol anddevisingwatermarkperformancebenchmarks.Tothisend,asasecondlineofresearchinsignal processingandparticularlytheimageprocessinginencrypteddomainhasattractedconsiderable attentionofresearchersinrecentyears (Erkin,Piva,Katzenbeisser,Lagendijk,Shokrollahi,Neven, andBarni,2007).Although,cryptosystemsplayasignificanttaskinsecuresignalprocessing,yet notallsystemsaresuitableforthispurpose.ThemainreasonisthatseveralcryptosystemslikeDES (DataEncryptionStandard)andAES(AdvancedEncryptionStandard)donotpreservealgebraic relationswiththeplaintextsaftertheencryptionprocess (Elgamal,1985).Ontheotherhand,special cryptosystemssuchasthosewhichofferhomomorphismkeepthisrelationship.Thus,theybecome suitableforsignalprocessingapplications.…”
Section: Introductionmentioning
confidence: 99%