IEEE 6th Workshop on Multimedia Signal Processing, 2004.
DOI: 10.1109/mmsp.2004.1436530
|View full text |Cite
|
Sign up to set email alerts
|

Reversible data hiding based on wavelet spread spectrum

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(3 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…In transform domain watermarking, prior to embedding the watermark, transformation such as discrete Fourier transform (DFT) [32][33][34][35][36], discrete-cosine transform (DCT) [37][38][39][40][41][42][43][44][45], discrete-wavelet transform (DWT) [9,22,[46][47][48][49][50][51][52][53][54][55][56][57][58][59][60][61][62][63][64][65], dual tree complex wavelet transform (DTCWT) [66][67][68], contourlet [69][70][71][72], or singular value decomposition (SVD) [44,47,49,52,[73][74][...…”
Section: Transform Domain Techniquesmentioning
confidence: 99%
“…In transform domain watermarking, prior to embedding the watermark, transformation such as discrete Fourier transform (DFT) [32][33][34][35][36], discrete-cosine transform (DCT) [37][38][39][40][41][42][43][44][45], discrete-wavelet transform (DWT) [9,22,[46][47][48][49][50][51][52][53][54][55][56][57][58][59][60][61][62][63][64][65], dual tree complex wavelet transform (DTCWT) [66][67][68], contourlet [69][70][71][72], or singular value decomposition (SVD) [44,47,49,52,[73][74][...…”
Section: Transform Domain Techniquesmentioning
confidence: 99%
“…As mentioned above, researches on reversible watermarking are mainly focused on raster images. Surveys were made by Feng (2004, 2006) and the existing reversible watermarking for raster images were classified into three categories: lossless compression (Celik et al, 2002(Celik et al, , 2005, difference expansion (Tian, 2003;Alattar, 2004;Weng, 2009;Wang & Hu, 2009) and histogram modification (De et al, 2001;Ni & Shi, 2006;Xuan et al, 2004). Nevertheless, only a few attempts had been made towards vector graphics, such as 3D models and 2D vector maps.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Therefore, security of the watermark becomes a critical issue in many applications. The problem of watermark security can be solved using spread-spectrum scheme [24][25][26][27]. Spread-spectrum is a military communication scheme invented during World War II [28].…”
Section: Introductionmentioning
confidence: 99%