2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing 2010
DOI: 10.1109/iihmsp.2010.39
|View full text |Cite
|
Sign up to set email alerts
|

Fast Watermarking Based on QR Decomposition in Wavelet Domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0
2

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(25 citation statements)
references
References 16 publications
0
23
0
2
Order By: Relevance
“…The brightness of each firefly equal to the objective function given by (15). The results of the proposed method are compared with the methods given in [10,20,25,26,38], where the methods given in [25,26,38] are the optimised non-blind image watermarking methods and the methods used in [10,20] are the traditional blind image watermarking methods without using any optimisation algorithm. The performance of the proposed algorithm is shown in the following two subsections.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The brightness of each firefly equal to the objective function given by (15). The results of the proposed method are compared with the methods given in [10,20,25,26,38], where the methods given in [25,26,38] are the optimised non-blind image watermarking methods and the methods used in [10,20] are the traditional blind image watermarking methods without using any optimisation algorithm. The performance of the proposed algorithm is shown in the following two subsections.…”
Section: Resultsmentioning
confidence: 99%
“…The matrix decomposition can be used to extract the geometric features of an image, which is more robust against geometric attacks. Therefore, the image watermarking method based on combined DWT and matrix decomposition take the advantages of DWT and matrix decomposition and thus robust against both geometric attacks and image processing attacks [2,[15][16][17][18][19][20][21]. These traditional image watermarking methods have advantages in terms of high computing speed, but they cannot balance the invisibility and robustness automatically because invisibility and robustness are in conflict to each other.…”
Section: Introductionmentioning
confidence: 99%
“…In this subsection, the robustness of the proposed image watermarking method is tested by performing several attacks. In this paper, the proposed method is compared with the similar image watermark methods based on DWT and QR decomposition (abbreviated as DWT+QR) (Naderahmadian and Hosseini-Khayat, 2010) and watermark method based on QR decomposition (abbreviated as QR) (Naderahmadian and Hosseini-Khayat, 2014). The image processing attacks robustness is explored when the watermarked cover image are attacked by compression, smooth and noise.…”
Section: Robustnessmentioning
confidence: 99%
“…The SVD or QR can be used to extract the geometric features of an image, which is more robust to geometric attacks. Therefore, the image watermarking method based on DWT and SVD or QR is proposed and thus robust against both geometric attacks and image processing attacks (Ye et al, 2014;Ali and Ahn, 2014;Naderahmadian and Hosseini-Khayat, 2010). The fractional wavelet transform (FRWT) is a generation of WT associated with the convolution theorem in fractional Fourier transform (FRFT) domain.…”
Section: Introductionmentioning
confidence: 99%
“…Also, in other hand the tradeoff between the said features can be seen as an optimization issue which invokes opportunities in terms of research. Nature inspired algorithms (NIAs) such as particle swarm optimization (PSO) [9,10], genetic algorithm (GA) [11], artificial bee colony (ABC) [12,13], differential evolution [14,15], ant colony optimization [16], Firefly algorithm [17] have been used to fix the issue with optimizatin. Cuckoo Search (CS) is one among the metaheuristic algorithms that Xin-She Yang and Suash Deb have developed [18] in 2009 being inspired by the concept of constrained blood parasitism behavior of few cuckoo species which uses other birds nest to lays eggs.The studies have suggested in recent past that CS is more effective than other algorithms inspired by nature such as PSO and GA [19].…”
Section: Introductionmentioning
confidence: 99%