2011 International Conference on Recent Trends in Information Technology (ICRTIT) 2011
DOI: 10.1109/icrtit.2011.5972280
|View full text |Cite
|
Sign up to set email alerts
|

Non blind image watermarking based on similarity in contourlet domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…When it is mentioned that a watermark approach is robust, it means that even after the watermarked protected image received various attacks, the watermark will still be able to be taken from the image [8]. Alternatively, the extraction activity should be influenced by the attacks.…”
Section: Proposed Methodsmentioning
confidence: 98%
See 1 more Smart Citation
“…When it is mentioned that a watermark approach is robust, it means that even after the watermarked protected image received various attacks, the watermark will still be able to be taken from the image [8]. Alternatively, the extraction activity should be influenced by the attacks.…”
Section: Proposed Methodsmentioning
confidence: 98%
“…Even though, in terms of the usage the LSB sounds very simple, the detection process of the watermarks is very difficult [7]. Although this approach is not easily detectable and there is not any distinguished variations between the original image and the watermarked image, this approach is not strong enough to protect the power of the images that are watermarked, meaning that in the spatial domain, where there is a chance of the capacity to be large, still the watermark could be easily detected by intruders.…”
Section: Conventional Lsbmentioning
confidence: 99%
“…The general steps involved in this paper are described as follows. The first step has to embed the watermarking in the test inputs [9,10], then these images undergone half toning, that is the input images are converted into binary image. These binary images are encrypted into number of shares as per the prescribed scheme.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…To implement the act of recognition in machines we need to show an algorithm of millions of images before it makes a pattern by generalizing the input and start making predictions for images it has never seen before [36]. The aim is to evolve a more robust and imperceptible watermarking scheme that can cater to the needs of content protection [37].…”
Section: Literature Reviewmentioning
confidence: 99%