2016
DOI: 10.1016/j.engappai.2015.12.004
|View full text |Cite
|
Sign up to set email alerts
|

Robust and false positive free watermarking in IWT domain using SVD and ABC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
53
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 118 publications
(53 citation statements)
references
References 32 publications
0
53
0
Order By: Relevance
“…Due to these properties, SVD has been gradually applied in digital watermarking schemes [16][17][18]. Taking N = 4 for example, the SVD can be rewritten as …”
Section: Singular Value Decomposition (Svd)mentioning
confidence: 99%
“…Due to these properties, SVD has been gradually applied in digital watermarking schemes [16][17][18]. Taking N = 4 for example, the SVD can be rewritten as …”
Section: Singular Value Decomposition (Svd)mentioning
confidence: 99%
“…I. A. Ansari et al [19] proposed robust and false positive free watermarking scheme using LWT and SVD. The authors employed a metaheuristic optimization technique in their scheme to find the optimal value of scaling factor.…”
Section: Fig 1 a Block Diagram Of Generic Watermarking Systemmentioning
confidence: 99%
“…Frequency domain algorithms provide an alternative for this issue and hence the watermarking schemes based on DCT [8], DWT, RDWT [9,10] and SVD [11] have gained momentum in watermarking concepts. SVD combined with transforms such as DCT, DWT, RDWT are more efficient than SVD based methods [12]. DWT-SVD based watermarking schemes provide better robustness and imperceptibility [13] because of the sensitiveness to modeling of DWT.…”
Section: Introductionmentioning
confidence: 99%
“…Transform coefficients of the host image are modified in accordance to the watermark image coefficients as per the watermarking criteria [12] Less robustness and imperceptibility against various attacks [16] Better robustness and imperceptibility [5,17] Less complex [18,19] Complexity based on the type of the transform Even distribution of watermark values in the host image Watermark values are distributed all over the host image because of the inverse transform [20] These robust methods are very much useful for the protection of copyrights and ownership authentication.…”
Section: Introductionmentioning
confidence: 99%