2013
DOI: 10.1007/s11042-013-1375-2
|View full text |Cite
|
Sign up to set email alerts
|

Rightful ownership through image adaptive DWT-SVD watermarking algorithm and perceptual tweaking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 27 publications
(13 citation statements)
references
References 33 publications
0
13
0
Order By: Relevance
“…Recently, researchers have been working on integrating watermarking techniques based on wavelet transform coefficients and SVD to improve the robustness of watermarked images against non-geometric and geometric attacks [14], [15], [24], [27], [41], [50], [54]. Furthermore, hybrid schemes that combine these transforms with SVD are very successful in recent years [24], [37], [41].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Recently, researchers have been working on integrating watermarking techniques based on wavelet transform coefficients and SVD to improve the robustness of watermarked images against non-geometric and geometric attacks [14], [15], [24], [27], [41], [50], [54]. Furthermore, hybrid schemes that combine these transforms with SVD are very successful in recent years [24], [37], [41].…”
Section: Related Workmentioning
confidence: 99%
“…Compared with traditional image processing techniques, even geometric distortion, the SVD-based scheme shows better strength and robustness. However, watermark embedding using the SVD technique can lead to ambiguity in the false-positive problem (FPP) [32], [45], [50], [51]. An intruder could freely get the right secret information from an illegal image, which is taken from the web or a publicly accessible source.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally particle swarm optimization has been utilized to optimize the scheme. [12] recently presented a non-blind, adaptive watermarking scheme, based on DWT and SVD, where they used principle components and perceptual tuning. [13] used a family of chaotic maps and SVD.…”
Section: Introductionmentioning
confidence: 99%
“…The frequency domain algorithms are resistant to filtering and compressions attacks and are generally, rotation, translation and scale invariant. Discrete Cosine Transform (DCT) [15][16][17][18] and Discrete Wavelet Transform (DWT) [19][20][21][22][23] are commonly used frequency domain techniques. Our system can be used for identifying the pirate person due to the payload that has been embedded consist the time stamp of video playback, so the suspect list can be limited.…”
Section: Introductionmentioning
confidence: 99%