2017 3rd International Conference on Pattern Recognition and Image Analysis (IPRIA) 2017
DOI: 10.1109/pria.2017.7983054
|View full text |Cite
|
Sign up to set email alerts
|

Introducing a new method robust against crop attack in digital image watermarking using two-step sudoku

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…The Canny's edge detection algorithm is well known for its ability to generate a continuous edge. First, the image is smoothed by Gaussian convolution [32]. Where Ø can be used to adjust the scale.…”
Section: Eye Location and Recognitionmentioning
confidence: 99%
“…The Canny's edge detection algorithm is well known for its ability to generate a continuous edge. First, the image is smoothed by Gaussian convolution [32]. Where Ø can be used to adjust the scale.…”
Section: Eye Location and Recognitionmentioning
confidence: 99%
“…TSSLSB, on the other hand, was developed to cater decent cropping attack. TSSLSB had been introduced by two researchers from Islamic Azad University [3]. This technique is a hybrid implementation of sudoku methodology with LSB technique.…”
Section: A Comparison Between the Techniquesmentioning
confidence: 99%
“…Based on the watermarking processes explained in [3], the watermark image will be broken up into nine parts, and each part will be randomized accordingly based on the sudoku method, and this process will be repeated once more, and the scrambled image will be embedded inside the host image. The experiment result was flabbergasted, as every part of the watermarked image contains at least one retrievable watermark image, even after a 98.8% cropping of the host image, the embedded watermark is retrievable [3]. Based on a study of the algorithm of TSSLSB, as an early hypothesis, it is assumed that this technique can withstand against compression attack by social media.…”
Section: A Comparison Between the Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…More recently, inspired by the mathematics of Sudoku [18,19], research has been done such as [20,21,22] to solve image cropping and collage attack problems. Their embedding strategy using Sudoku follows the same principle of self-embedding previsously described except the authors use a resizing function to reduce the watermark size.…”
Section: Literaturementioning
confidence: 99%