2007
DOI: 10.1117/1.2769366
|View full text |Cite
|
Sign up to set email alerts
|

Watermarking by encrypted Fourier holography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
6
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…Encrypted images, digital holograms, and full phase images have been used in the watermarking scheme to enhance the security of contents [4,[38][39][40][41][42][43]. Various watermarking schemes with different architectures have been reported in the literature, such as digital watermarking using GT, FRT, computational ghost imaging, joint FrT correlator, DCT, among others [44][45][46][47][48][49][50].…”
Section: Introductionmentioning
confidence: 99%
“…Encrypted images, digital holograms, and full phase images have been used in the watermarking scheme to enhance the security of contents [4,[38][39][40][41][42][43]. Various watermarking schemes with different architectures have been reported in the literature, such as digital watermarking using GT, FRT, computational ghost imaging, joint FrT correlator, DCT, among others [44][45][46][47][48][49][50].…”
Section: Introductionmentioning
confidence: 99%
“…The integrity test will be failed if the extracted watermark from the host media is found to be destroyed. These types of techniques are termed fragile watermark techniques, as opposed to robust watermarking methods, which are used mainly for copyright protection [4][5][6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…A possible solution to protect from hologram piracy could be embedding a watermark into the hologram. Watermarking of 2D or 3D data has been extensively studied to provide protection for digital image, audio, and video [1][2][3][4][5][6][7][8][9].…”
mentioning
confidence: 99%