2012 International Conference on Communications, Devices and Intelligent Systems (CODIS) 2012
DOI: 10.1109/codis.2012.6422191
|View full text |Cite
|
Sign up to set email alerts
|

Non blind digital watermarking technique using DCT and Cross chaos map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 23 publications
(15 citation statements)
references
References 7 publications
0
15
0
Order By: Relevance
“…All of these watermarks are encrypted before embedding by number of iterations less than the Arnold Period as illustrated in Section 3.2. For 32 × 32 watermark image or video frames the Arnold Period is equal to 48 [11], so we can encrypt them by a number of iterations such as N = 20.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…All of these watermarks are encrypted before embedding by number of iterations less than the Arnold Period as illustrated in Section 3.2. For 32 × 32 watermark image or video frames the Arnold Period is equal to 48 [11], so we can encrypt them by a number of iterations such as N = 20.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Arnold Transform is one of the popular image/video frame encryption methods [4, 11]. In this transform, which is a periodic transform, the original organization of the image/video frame pixels is randomized, and after a number of iterations called Arnold's period the image/video frame is returned to its original state.…”
Section: The Based Techniquesmentioning
confidence: 99%
“…Another scheme which makes use of the visual cryptography, transform domain, chaos, noise reduction and error correcting code techniques is given in [26]. A non-blind DCT, cross-chaos and Arnold map based watermarking method is presented in [27]. The robustness of this method is evaluated against JPEQ, scaling and white Gaussian noise attacks.…”
Section: Introductionmentioning
confidence: 99%
“…In our paper we have focused on the digital image watermarking. Digital image watermarking can be possible in both spatial and transform domain, where the transforms used are Discrete Fourier Transform [1], Discrete Cosine Transform [2], Discrete Wavelet Transform [3], Discrete Fast Walsh Hadamard Transform.Digital Watermark can be visible and invisible watermark. In case of visible watermark the watermark is visible to normal eye such as company logo ,TV channel icon, but for invisible watermark the watermark is not visible to normal eye.…”
Section: Introductionmentioning
confidence: 99%