2021
DOI: 10.1002/cpe.6251
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy‐based secure exchange of digital data using watermarking in NSCT‐RDWT‐SVD domain

Abstract: Summary Due to the remarkable development of Internet technologies, a great deal of valuable digital data is now transmitted over public networks. To guarantee the security of this data during the transfer process, the authentication of its integrity is extremely important. This paper introduces a robust and secure dual‐watermarking‐based fusion of watermarking, optimization, and a compression method utilizing non‐sub‐sampled contourlet transform (NSCT), redundant discrete wavelet transform (RDWT), and singula… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 27 publications
0
7
0
Order By: Relevance
“…Although DWT has major advantages of multi-scalability, multi-resolution and space frequency localization, it suffers from the issues of shift sensitivity and poor directionality [19] . RDWT solved these issues as suffered by DWT.…”
Section: Background Informationmentioning
confidence: 99%
See 2 more Smart Citations
“…Although DWT has major advantages of multi-scalability, multi-resolution and space frequency localization, it suffers from the issues of shift sensitivity and poor directionality [19] . RDWT solved these issues as suffered by DWT.…”
Section: Background Informationmentioning
confidence: 99%
“…RDWT solved these issues as suffered by DWT. RDWT is shift invariant and holds all the desirable properties of DWT for robust and imperceptible watermarking [19] . As presented in Fig.…”
Section: Background Informationmentioning
confidence: 99%
See 1 more Smart Citation
“…Digital color watermarking methods are generally separated into three categories: 4 robust, semi‐fragile, and fragile. Robust methods have been developed in order to resist all kinds of attacks that attempt to destroy the watermark 5‐9 . These watermarking methods are used for the application areas of copyright, fingerprinting, and ownership.…”
Section: Introductionmentioning
confidence: 99%
“…Robust methods have been developed in order to resist all kinds of attacks that attempt to destroy the watermark. [5][6][7][8][9] These watermarking methods are used for the application areas of copyright, fingerprinting, and ownership. Moreover, semi-fragile methods have been designed in order to resist some kinds of attacks and to localize the manipulated regions of the images.…”
Section: Introductionmentioning
confidence: 99%