2013
DOI: 10.1049/iet-ipr.2013.0048
|View full text |Cite
|
Sign up to set email alerts
|

Robust quantisation index modulation‐based approach for image watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(20 citation statements)
references
References 27 publications
0
20
0
Order By: Relevance
“…That is, separating matrix, W=A-1 can be easily got. Y, estimated value of independent data S, can be computed by (8):…”
Section: Figure 2 Framework Of Watermark Extractionmentioning
confidence: 99%
See 1 more Smart Citation
“…That is, separating matrix, W=A-1 can be easily got. Y, estimated value of independent data S, can be computed by (8):…”
Section: Figure 2 Framework Of Watermark Extractionmentioning
confidence: 99%
“…Frequency domain concentrates the whole image into some spectral coefficients where watermarks can be embedded, just like DCT, DWT and RT (ridgelet transform) [4]. DWT based image watermarking methods are presented by Chuntao Wang et al [5], N. Bi et al [6], D. Kundur et al [7], Mohsen Zareian et al [8] and V. Sentthil et al [9]. It is widely accepted that the frequency domain methods can easily exploit the perceptual models based on characteristics of the human visual system (HVS) to match the best tradeoff between invisibility and robustness [10].…”
Section: Introductionmentioning
confidence: 99%
“…4 over more than 1,500 8-bit gray-scale photographic images ( [27] and [33] combined). With a modulation separation A varying from 0.5 to 5, the true distortion obtained empirically and the distortion predicted by (39) are shown in Fig. 4 for both arbitrary carrier and optimal carrier cases.…”
Section: M-pam Ss Embedding With Precodingmentioning
confidence: 99%
“…Data embedding can be performed either directly in the time/spatial domain [5,9,17,23,32] or in a transform domain (for example, for images, we may consider full-frame discrete Fourier transform (DFT) [3,4,7], block DFT or DCT [2,15,26,30,39], or discrete wavelet transforms (DWT) [24,25,37]). …”
Section: Introductionmentioning
confidence: 99%
“…Also, the algorithm attaches only binary watermark images and it became computationally inefficient, since it used vector quantization algorithm for the optimization of adaptive quantization parameters, while indexing the blocks. Many other algorithms (Bhosale et al, 2012;Chen et al, 2012;Coatrieux et al, 2012;Ishikawa et al, 2012;Kandpal et al, 2012;Vargas et al, 2013;Varghese et al, 2014;Walia et al, 2013;Wang et al, 2011;Wang et al, 2012;Wu et al, 2005;Yang et al, 2010;Zareian et al, 2013) also developed in the literature by meeting some requirements of watermarking, but these algorithms also failed in simultaneously meeting other vital requirements of watermarking (Mason et al, 2000) including perceptibility, robustness, orthogonality, protection against attacks etc.…”
Section: Introductionmentioning
confidence: 99%