International Conference on Computing, Communication &Amp; Automation 2015
DOI: 10.1109/ccaa.2015.7148543
|View full text |Cite
|
Sign up to set email alerts
|

Transform domain robust image-adaptive watermarking: Prevalent techniques and their evaluation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…So, to maintain the required quality of watermarked image it is necessary to select a suitable scaling factor for the algorithm. The resultant image of this embedding process is known as watermarked image and this image gets floated over the social networks where the malicious attackers try to modify it using image processing and geometrics tools available [4][5][6][7]. The attacked watermarked image then becomes the input to the extractor unit, where the owner can claim his copyright.…”
Section: Introductionmentioning
confidence: 99%
“…So, to maintain the required quality of watermarked image it is necessary to select a suitable scaling factor for the algorithm. The resultant image of this embedding process is known as watermarked image and this image gets floated over the social networks where the malicious attackers try to modify it using image processing and geometrics tools available [4][5][6][7]. The attacked watermarked image then becomes the input to the extractor unit, where the owner can claim his copyright.…”
Section: Introductionmentioning
confidence: 99%
“…Watermarking techniques are categorized as robust, fragile, and hybrid according to the purpose they serves. Robust watermarks are used for copy protection and copyright protection [ 6 , 7 ] as they are resistant to image processing operations like rotation, scaling, cropping, and so forth. Robust watermarking methods assume the transmission channel as lossless and hence embedding is done in either lossless or lossy environment.…”
Section: Introductionmentioning
confidence: 99%