2018
DOI: 10.1049/iet-ipr.2018.5399
|View full text |Cite
|
Sign up to set email alerts
|

Watermarking image encryption using deterministic phase mask and singular value decomposition in fractional Mellin transform domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 41 publications
(13 citation statements)
references
References 48 publications
0
13
0
Order By: Relevance
“…e reason to choose luminance component Y is that the human eye is not sensitive to this component; thus, embedding watermark information into this component will give strength to invisibility. Watermark encryption and then embedding it in the host image proposed by [8] make use of FrMT, DPMs, and SVD, provide enhanced security due to the nonlinear transformation, and keep a balance between invisibility and robustness to some extent. Combining IWT, DWT, contourlet transform, and 3D Henon Map in embedding and extracting watermark has good imperceptibility and acceptable robustness [30].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…e reason to choose luminance component Y is that the human eye is not sensitive to this component; thus, embedding watermark information into this component will give strength to invisibility. Watermark encryption and then embedding it in the host image proposed by [8] make use of FrMT, DPMs, and SVD, provide enhanced security due to the nonlinear transformation, and keep a balance between invisibility and robustness to some extent. Combining IWT, DWT, contourlet transform, and 3D Henon Map in embedding and extracting watermark has good imperceptibility and acceptable robustness [30].…”
Section: Related Workmentioning
confidence: 99%
“…Most of the existing watermarking techniques suffer from certain watermarking attacks, are not optimized, and are not coupled with hyperchaotic maps. A few studies have been published on watermarking followed by hyperchaotic encryption [8]. To this end, a novel watermarking technique by exploiting the interblock coefficient correlation for embedding the watermark is proposed by [9], in which chaos and Arnold transform is used for improving security.…”
Section: Introductionmentioning
confidence: 99%
“…Use the conjugate of the encrypted image or the conjugate of the RPM to decrypt and return to tracing the optical path. In addition, DRPE -based coding methods are prolonged from Fourier transform (FT) to many other domains, such as fractional Fourier transform [7][8][9][10][11][12], Fresnel transform [13,14], Fresnel wavelet transform [15], fractional Mellin transform [16][17][18][19], gyrator transform (GT) [20][21][22][23][24][25], gyrator wavelet transform (GWT) [26,27], ghost Holography [28], etc.…”
Section: Introductionmentioning
confidence: 99%
“…In this, singum non‐linearity is used with chaotic map to reduce the bias from chaotic sequence. Singh [51] designed an image encryption approach using fractional Mellin transform, singular value decomposition, and deterministic phase masks. As fractional Mellin transform has a non‐linear nature, which provides enhanced security as compared to other approaches.…”
Section: Introductionmentioning
confidence: 99%