2017
DOI: 10.3390/jimaging3030034
|View full text |Cite
|
Sign up to set email alerts
|

Image Fragile Watermarking through Quaternion Linear Transform in Secret Space

Abstract: Abstract:In this paper, we apply the quaternion framework for color images to a fragile watermarking algorithm with the objective of multimedia integrity protection (Quaternion Karhunen-Loève Transform Fragile Watermarking (QKLT-FW)). The use of quaternions to represent pixels allows to consider the color information in a holistic and integrated fashion. We stress out that, by taking advantage of the host image quaternion representation, we extract complex features that are able to improve the embedding and ve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…From these figures it may be observed that for the distributions having a steepest start (for example, the MP3 file type distribution) there is a bigger gain in assigning a variable number of bits to every symbol: this is due to the fact that when there are symbols more frequent than others then allocating more bits to them increases the average payload (2).…”
Section: Empirical Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…From these figures it may be observed that for the distributions having a steepest start (for example, the MP3 file type distribution) there is a bigger gain in assigning a variable number of bits to every symbol: this is due to the fact that when there are symbols more frequent than others then allocating more bits to them increases the average payload (2).…”
Section: Empirical Analysismentioning
confidence: 99%
“…Digital watermarking and steganography are part of the field of data hiding where some piece of information is stored in digital objects for various purposes ranging from simple information saving to copyright protection, from integrity protection or origin authentication to covert communication [1]. The digital objects involved in data hiding may be of any type, like images [2][3][4], audio files [5,6], movies [7][8][9], 3D models [10][11][12], neural networks [13][14][15][16], and textual data [17][18][19].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The use of quaternions to represent pixels was previously considered in [12][13][14], which allows for consideration of the color information in a holistic and integrated fashion. In this manuscript, we use the quaternion algebraic structure for pattern recognition.…”
Section: Introductionmentioning
confidence: 99%
“…Such interventions might encompass nuanced pixel value manipulations or orchestrated bit position alterations. The trade-off, however, is a somewhat reduced armor against attacks, rendering this methodology particularly suited for unearthing telltale signs of unauthorized tampering [10], [11].…”
Section: Introductionmentioning
confidence: 99%