2015
DOI: 10.1016/j.sigpro.2014.11.007
|View full text |Cite
|
Sign up to set email alerts
|

Optimal and secure audio watermarking scheme based on self-adaptive particle swarm optimization and quaternion wavelet transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 37 publications
(24 citation statements)
references
References 37 publications
0
24
0
Order By: Relevance
“…Wang et al proposed a DCT‐based method to put the watermark in the middle frequency coefficients and make the watermark insertion process nearly lossless . Lei et al embedded the watermark in the singular values of low‐frequency coefficients based on QWT to improve watermark robustness …”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Wang et al proposed a DCT‐based method to put the watermark in the middle frequency coefficients and make the watermark insertion process nearly lossless . Lei et al embedded the watermark in the singular values of low‐frequency coefficients based on QWT to improve watermark robustness …”
Section: Methodsmentioning
confidence: 99%
“…Essentially, the QWT is an analytic signal with a shift‐invariant magnitude and three phases that can explicitly describe image content. Therefore, the QWT‐based watermarking method not only addresses the common drawbacks in standard wavelet transforms by providing the shift‐invariant feature but also exhibits superiority over the QFT because of its multiscale property . For instance, the QWT‐based watermarking method has demonstrated high robustness against many signal processing manipulations .…”
Section: Introductionmentioning
confidence: 99%
“…Data hiding algorithms with high capacity and low robustness are called steganography techniques, while the general term of watermarking usually refers to a low-capacity robust data hiding scheme. The capacity of a data hiding scheme defined as [53]:…”
Section: Capacitymentioning
confidence: 99%
“…In the last two decades, artificial intelligence (AI) techniques such as evolutionary algorithms (EAs), support vector machine, fuzzy logic and neural networks have played an important role in data hiding [25,71,72,83,95,94,99,105,116,121] for improving the performance. Under the category of evolutionary algorithms, genetic algorithm (GA) [7,23,25,47,71,72,81], particle swarm optimization (PSO) [53,85,94,99,108], differential evolution (DE) [4,6,2,8,52], Firefly algorithm [76], and artificial bee colony (ABC) [5] have made numerous valuable contributions to the field of data hiding. An image watermarking technique which uses a GA to find the optimal scaling factors for watermark insertion is designed by Lai [47].…”
Section: Application Of Artificial Intelligence In Data Hidingmentioning
confidence: 99%
See 1 more Smart Citation