2010
DOI: 10.1007/s11633-010-0017-7
|View full text |Cite
|
Sign up to set email alerts
|

Watermarking of digital images in frequency domain

Abstract: Invisible watermarking methods have been applied in frequency domains, trying to embed a small image inside a large original image. The original bitmap image will be converted into frequency domain to obtain the discrete cosine transform (DCT) matrices from its blocks. The bits of the logo image are embedded in random color components of the original image, as well as in random positions in each selected block. These positions are alternating current (AC) coefficients of the DCT matrix. The randomness is obtai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…Attribution is the focus of cross-industry coalitions (e.g., CAI [43], Origin [1]) and emerging standards (e.g., C2PA [11]). A robust identifier may be embedded via metadata, watermarking [13,2], steganography [56,53]) or obtained via perceptual hash of content (fingerprinting [40,57,4]). The identifier serves as a key to lookup provenance information in a database operated by a trusted source [1] or in a decentralized trusted database such as a blockchain [12,7].…”
Section: Related Workmentioning
confidence: 99%
“…Attribution is the focus of cross-industry coalitions (e.g., CAI [43], Origin [1]) and emerging standards (e.g., C2PA [11]). A robust identifier may be embedded via metadata, watermarking [13,2], steganography [56,53]) or obtained via perceptual hash of content (fingerprinting [40,57,4]). The identifier serves as a key to lookup provenance information in a database operated by a trusted source [1] or in a decentralized trusted database such as a blockchain [12,7].…”
Section: Related Workmentioning
confidence: 99%
“…The manifest encodes a signed graph structure of provenance records describing the content's capture and manipulation. If the manifest is stripped from the asset, it may be recovered using a perceptual hash [7,30,53], or watermark [6,13,49] via look-up in a distributed database. Recently, visual fingerprinting has been used to detect and attribute images to the GenAI models that made them [51].…”
Section: Related Workmentioning
confidence: 99%
“…Some basic characteristics of digital watermark are insensitivity, robustness, capacity, non-inverse and ability to provide indisputably positive proof of ownership [2]. For inserting the watermark in the data, many transformations could be used such as Discrete Cosine Transformation (DCT) [3], Discrete Wavelet Transformation (DWT) [4], Singular Value Decomposition (SVD transformation) [2], [5], and many other combinations of them are used for watermarking.…”
Section: Introductionmentioning
confidence: 99%