2010 International Conference on Signal Acquisition and Processing 2010
DOI: 10.1109/icsap.2010.71
|View full text |Cite
|
Sign up to set email alerts
|

Image Watermarking Scheme Using Singular Value Decomposition, Quantization and Genetic Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 11 publications
0
12
0
Order By: Relevance
“…Eventually, many of us present the particular robustness in opposition to JPEG attack by way of laptop simulation. B. Jagadeesh, S. S. Kumar and K. R. Rajeswari, 2010 [15] discussed Digital camera Watermarking and facts covering has grown to be a vital instrument regarding preserving digital illustrations or photos coming from theft, illegal copying and unlawful reproduction. A few digital watermarking algorithms were being proposed using spatial sector and transform domain.…”
Section: Related Workmentioning
confidence: 99%
“…Eventually, many of us present the particular robustness in opposition to JPEG attack by way of laptop simulation. B. Jagadeesh, S. S. Kumar and K. R. Rajeswari, 2010 [15] discussed Digital camera Watermarking and facts covering has grown to be a vital instrument regarding preserving digital illustrations or photos coming from theft, illegal copying and unlawful reproduction. A few digital watermarking algorithms were being proposed using spatial sector and transform domain.…”
Section: Related Workmentioning
confidence: 99%
“…This algorithm which modified the DCT coefficients are generally concentrated in the middle or lowfrequency AC coefficients, so it has certain robustness. Another improved DCT domain algorithm is through the exchange of selected DCT coefficients to embed watermark information, this algorithm is a blind watermarking algorithm, but it has a greater impact on the visual effects of the host image [5].…”
Section: Introductionmentioning
confidence: 99%
“…Jagadeesh [25] employed singular value decomposition and genetic algorithm based watermarking technique. This technique produced good quality stego image which is robust to image processing attacks like Low Pass Filtering, JPEG Compression, Resizing, and Row-Column Copying.…”
Section: Iintroductionmentioning
confidence: 99%