2022
DOI: 10.1007/s11042-022-12456-4
|View full text |Cite
|
Sign up to set email alerts
|

LWT-DCT-SVD and DWT-DCT-SVD based watermarking schemes with their performance enhancement using Jaya and Particle swarm optimization and comparison of results under various attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 36 publications
(14 citation statements)
references
References 33 publications
0
14
0
Order By: Relevance
“…The overhead of the proposed technique increased due to the use of multiple keys and pseudovector generation. Reference 2 proposes a robust method by comparing two optimization techniques. Reference 3 proposes a medical image watermarking with its authentication using a feature extraction technique.…”
Section: Literature Surveymentioning
confidence: 99%
See 2 more Smart Citations
“…The overhead of the proposed technique increased due to the use of multiple keys and pseudovector generation. Reference 2 proposes a robust method by comparing two optimization techniques. Reference 3 proposes a medical image watermarking with its authentication using a feature extraction technique.…”
Section: Literature Surveymentioning
confidence: 99%
“…1 This type of medical data can be in any form, such as audio, video, and image. 2 Copyright protection of these data is the need of the hour. Watermarking is one of the methods to protect the copyright of critical medical information.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The discrete cosine transform coefficient has only real values, unlike the discrete Fourier transform. DCT has the ability to compress an image’s pixels information into a small number of DCT coefficient values, resulting in data consolidation into less values [ 7 ]. The 2D DCT and inverse DCT of an N × N image are defined as shown in Eq.…”
Section: Preliminariesmentioning
confidence: 99%
“… Singular value decomposition (SVD), Genetic algorithm (GA) Host image of size 256 × 256: Lena; Watermark image of size: 32 × 32 (grey-level) Correlation coefficient (CC), PSNR Rotation, Average filter, Scaling, Gaussian noise, Gamma correction, Histogram, Median filter In the proposed method, GA is utilized to obtain multiple scaling factors (SF) for achieving the highest possible robustness without degrading image quality. [ 7 ] This paper provides a comparison between PSO and JAYA as well as between LWT and DWT LWT, DWT, DCT, SVD, PSO, JAYA Host grayscale image: 512 × 512; Watermark grayscale: 256 × 256 PSNR, SSIM, Normalized correlation coefficient (NCC), Mean square error (MSE) JPEG compression, Gaussian noise, Median filter, Salt and Pepper, Low pass filter, Sharpening, Gamma correction, Scaling, Translation The proposed work has been tested under different attacks and found robust and imperceptible. [ 8 ] To improve the watermarked image’s integrity and perceived quality and to enhance the security of watermarking DWT, SVD, Quantization, Shore, Lena, Baboon, Pepper, Dark cloud: 200 × 200 PSNR, Bit error rate (BER) JPEG compression, Gaussian noise, Median filter, Cropping The enhanced perceptual quality of the watermarked images and the proposed scheme preserve high PSNR.…”
Section: Introductionmentioning
confidence: 99%