2012
DOI: 10.1016/j.proeng.2012.06.432
|View full text |Cite
|
Sign up to set email alerts
|

The Robust Digital Image Watermarking Scheme with Back Propagation Neural Network in DWT Domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(14 citation statements)
references
References 8 publications
0
14
0
Order By: Relevance
“…In addition, a binary image with half the size of the video frames is considered as the watermark shown in Figure.4. The perceptual quality of watermarked frames is studied with PSNR, which is given by Eq.11 [24]. While the capability of tamper detection is investigated by CER, which is used as a general measure of the similarity between the original and extracted watermarks, and is defined by Eq.13 [25].…”
Section: Resultsmentioning
confidence: 99%
“…In addition, a binary image with half the size of the video frames is considered as the watermark shown in Figure.4. The perceptual quality of watermarked frames is studied with PSNR, which is given by Eq.11 [24]. While the capability of tamper detection is investigated by CER, which is used as a general measure of the similarity between the original and extracted watermarks, and is defined by Eq.13 [25].…”
Section: Resultsmentioning
confidence: 99%
“…While frequency domain schemes transform the representation of spatial domain into the frequency domain and then modify its frequency coefficients to embed the watermark. There are many transform domain watermarking schemes such as discrete cosine transforms (DCT) [4,9,57,39,37,38,113], singular value decomposition (SVD) [8,14,22,27,28,34,48,52,63,74,77,84,85,90,91,113], discrete Fourier transforms (DFT) [18,64,67,70,94], and discrete wavelet transforms (DWT) [7,28,51,83,90,102,117]. These methods typically provide higher imperceptibility and are much more robust to distortion attacks, but the computational cost is higher than spatial-domain watermarking methods.…”
Section: Digital Watermarkingmentioning
confidence: 99%
“…It is expected that intelligent data hiding schemes have better results in terms of robustness, transparency or tradeoff between them. In the last two decades, artificial intelligence (AI) techniques such as evolutionary algorithms (EAs), support vector machine, fuzzy logic and neural networks have played an important role in data hiding [25,71,72,83,95,94,99,105,116,121] for improving the performance. Under the category of evolutionary algorithms, genetic algorithm (GA) [7,23,25,47,71,72,81], particle swarm optimization (PSO) [53,85,94,99,108], differential evolution (DE) [4,6,2,8,52], Firefly algorithm [76], and artificial bee colony (ABC) [5] have made numerous valuable contributions to the field of data hiding.…”
Section: Application Of Artificial Intelligence In Data Hidingmentioning
confidence: 99%
See 2 more Smart Citations