2020
DOI: 10.1007/s11042-020-08987-3
|View full text |Cite
|
Sign up to set email alerts
|

Imperceptible digital watermarking scheme combining 4-level discrete wavelet transform with singular value decomposition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(23 citation statements)
references
References 32 publications
0
23
0
Order By: Relevance
“…Since the DCT can help concentrate the image energy and is beneficial to resist the signal processing attack, the NC values of the proposed watermark scheme in the resistance of the noise attack are worse than those of Refs. [28] and [29]. However, the proposed watermarking scheme combining with Harris feature point detection could still achieve acceptable results in resisting other attacks, particularly the rotation attack.…”
Section: Comparison With the Existing Workmentioning
confidence: 98%
See 1 more Smart Citation
“…Since the DCT can help concentrate the image energy and is beneficial to resist the signal processing attack, the NC values of the proposed watermark scheme in the resistance of the noise attack are worse than those of Refs. [28] and [29]. However, the proposed watermarking scheme combining with Harris feature point detection could still achieve acceptable results in resisting other attacks, particularly the rotation attack.…”
Section: Comparison With the Existing Workmentioning
confidence: 98%
“…In Ref. [29], a more robust watermarking scheme based on 4-level DWT, DCT and SVD was designed, while the ability to resist the half cutting attack and rotation attack is not good. In this paper, a digital watermarking scheme based on 4-level DWT, DFAT and SVD is proposed.…”
Section: Comparison With the Existing Workmentioning
confidence: 99%
“…In the case of having attacks, we compare the NC values with other methods [41][42][43] under six forms of attacks, such as shear and pretzel, all of which reflect the effectiveness of the proposed method. Specially, JPEG with Q = 100, NC = 1.…”
Section: Implementation Detailsmentioning
confidence: 99%
“…Another data reduction approach is the independent components analysis (ICA) [1], [7]. As well as there is Another important data reduction tool which is singular value decomposition (SVD) that has good energy compaction and stability properties which make it widely used for many image processing applications [13], [14].…”
Section: Introductionmentioning
confidence: 99%