2018
DOI: 10.1109/access.2018.2808172
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
126
0
6

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 164 publications
(132 citation statements)
references
References 61 publications
0
126
0
6
Order By: Relevance
“…Security can be confirmed by various encryption methods, where the key decides the degree of security. Several methods, such as chaos-based, Discrete Cosine Transform (DCT), and logistic map-based encryption techniques, have been used to ensure the security and confidentiality of the embedded watermark [24]. The security of functional magnetic resonance imaging (fMRI) images is important, as they are related to brain activities.…”
Section: Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…Security can be confirmed by various encryption methods, where the key decides the degree of security. Several methods, such as chaos-based, Discrete Cosine Transform (DCT), and logistic map-based encryption techniques, have been used to ensure the security and confidentiality of the embedded watermark [24]. The security of functional magnetic resonance imaging (fMRI) images is important, as they are related to brain activities.…”
Section: Securitymentioning
confidence: 99%
“…Their proposed method extracts the watermark by generating dynamic stochastic resonance (DSR) phenomena, ensuring imperceptibility and robustness against conventional attacks. A chaotic encryption-based blind digital image watermarking technique has been proposed, which works both for grayscale and color images [24]. The method divides the host image into 8 × 8 blocks after performing DCT operation and, then, embeds the watermark using the DCT coefficients of adjacent blocks.…”
Section: Discrete Cosine Transform (Dct)mentioning
confidence: 99%
“…Further, along with data compression, it also needs security, when handling with sensitive medical images [8]- [10]. Medical image compression includes high image compression ratio and the ability to decode the medical image into unknown form.…”
Section: Introductionmentioning
confidence: 99%
“…Para agregar robustez e segurançaà marca d'água há duas técnicas comumente aplicadas: a inserção aleatória de bits de marca d'água em posições da imagem ou de sua transformada; e a cifragem da marca d'água. Ambas podem ser incorporadas a um algoritmo de marca d'água com a utilização de mapas caóticos [9]- [13]. Esses mapas são caracterizados por possuírem sensibilidadeà condição inicial e comportamento pseudo-aleatório, apesar de serem determinísticos, o que se traduz em trajetórias (ou sinais) assemelhadasà ruído [14].…”
Section: Introductionunclassified
“…Esses mapas são caracterizados por possuírem sensibilidadeà condição inicial e comportamento pseudo-aleatório, apesar de serem determinísticos, o que se traduz em trajetórias (ou sinais) assemelhadasà ruído [14]. Os mapas caóticos são empregados para embaralhar os bits de marca d'água [9]- [11] (agregando segurança ao método), bem como para definir as posições na imagem em que serão inseridos estes bits [12], [13] (agregando robustez ao método). Para suportar uma distorção severa impostaà imagem, códigos corretores de erro podem ser aplicados para tornar a marca d'água mais robusta [15]- [18].…”
Section: Introductionunclassified