2016
DOI: 10.1016/j.neucom.2015.03.115
|View full text |Cite
|
Sign up to set email alerts
|

Online Sequential Extreme Learning Machine for watermarking in DWT domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0
1

Year Published

2016
2016
2020
2020

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 33 publications
0
9
0
1
Order By: Relevance
“…Furthermore, a scaling factor is assigned for embedding strength in each block which is estimated by genetic algorithm. A similar embedding method is utilized by [16], which propose Extreme Learning Machine (ELM) for prediction in the DWT domain. In spite of vast research proposals for the application of machine learning tools in watermarking, none of the above-mentioned methods propose a unified watermarking framework based on machine learning approaches.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, a scaling factor is assigned for embedding strength in each block which is estimated by genetic algorithm. A similar embedding method is utilized by [16], which propose Extreme Learning Machine (ELM) for prediction in the DWT domain. In spite of vast research proposals for the application of machine learning tools in watermarking, none of the above-mentioned methods propose a unified watermarking framework based on machine learning approaches.…”
Section: Related Workmentioning
confidence: 99%
“…Nowadays the application of machine learning tools in watermarking is growing very rapidly, because of their effective solutions to embedding and extraction processes [12,13,14,15,16,17]. Nevertheless, most of them generally utilize machine learning tools such as Support Vector Machine (SVM) [18], Support Vector Regression (SVR) [19], Radial Basic Function Neural Network (RBFNN) [20], and K Nearest Neighbor (KNN) [21] for specific parts of watermarking procedure such as parameter optimization [12,13], prediction of transform domain coefficients [14,15,16] and attack estimation several image blocks, rather than simply swapping in a single block. Thus, the watermarked image demonstrates impressive robustness against several heavy attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Compared with the multiple classifier ensemble algorithms, the single classifier learning algorithms have lower computational complexity but poor adaptability. The typical algorithms include VFDT [15], ELM-TV [16], ODTC [17], iCaRL [18] and so on. The multiple classifier algorithms are more popular than the single classifier algorithms.…”
Section: The Related Research Workmentioning
confidence: 99%
“…Görüntü uzayı tekniklerinde damga ekleme işlemleri görüntünün gri-seviye piksel değerleri değiştirilerek gerçekleştirilir [7][8][9]. Ayrık Fourier Dönüşümü [10][11][12], Ayrık Kosinüs Dönüşümü (AKD) [13][14][15][16] ve Ayrık Dalgacık Dönüşümü (ADD) [17][18][19] gibi frekans uzayı damgalama tekniklerinde dönüşüm katsayıları değiştirilerek damga ekleme işlemleri gerçekleştirilir. Vektör kuantalama tabanlı tekniklerde, damga vektör kuantalama yöntemleriyle sıkıştırılarak vektör kuantalama uzayında orijinal görüntüye eklenebilir [20][21][22].…”
Section: Gi̇ri̇ş (Introduction)unclassified