2022
DOI: 10.3390/electronics11223680
|View full text |Cite
|
Sign up to set email alerts
|

Robust, Secure and Semi-Blind Watermarking Technique Using Flexible Scaling Factor in Block-Based Wavelet Algorithm

Abstract: Multimedia security has received much attention recently because of the rapid transmission of elements such as text, images, audio, video, software, animation and games. Security is becoming especially critical for content owners concerned about the illegal usage of their original products. Encryption and watermarking are two methodologies for digital applications. Spatial domain and frequency domain watermarking algorithms give very promising results in embedding binary images into the cover images. This pape… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 48 publications
0
1
0
Order By: Relevance
“…The basic purpose of copy right protection watermarking schemes is to demonstrate ownership regardless of time Therefore, this is not a vital element in these situations; however, it cannot be ignored in broadcast monitoring when embedding and extraction are conducted live. In Table 6, it i evident that the computational complexity of the proposed scheme is greater than th other schemes but comparable to the scheme provided by Zhang et al [49] and is less than the scheme proposed by Elbasi et al [26]. This is due to the time required to redistribut the pixels in the image to their new locations in order to obtain singular values that ar invariant.…”
Section: Comparison With Similar Schemesmentioning
confidence: 74%
See 3 more Smart Citations
“…The basic purpose of copy right protection watermarking schemes is to demonstrate ownership regardless of time Therefore, this is not a vital element in these situations; however, it cannot be ignored in broadcast monitoring when embedding and extraction are conducted live. In Table 6, it i evident that the computational complexity of the proposed scheme is greater than th other schemes but comparable to the scheme provided by Zhang et al [49] and is less than the scheme proposed by Elbasi et al [26]. This is due to the time required to redistribut the pixels in the image to their new locations in order to obtain singular values that ar invariant.…”
Section: Comparison With Similar Schemesmentioning
confidence: 74%
“…In this section, a comparison of the performance of the proposed watermarking scheme with the performance of other relevant watermarking techniques that have been developed by Parah et al [48], Zhang et al [49], Zeng et al [50], Su et al [47], and Elbasi et al [26] is carried out. All these schemes have, in some way or another, utilized an idea that is similar to the proposed scheme.…”
Section: Experimental Results Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…AbdelAziz et al [24] developed a blind watermarking algorithm for color medical images using multi-channel fractional Legendre-Fourier moments. Elbasi et al [25] implemented a secure semi-blind watermarking algorithm using a block-based wavelet approach. In this paper, a robust blind watermarking algorithm has been implemented.…”
Section: Introductionmentioning
confidence: 99%