2022
DOI: 10.1016/j.image.2021.116523
|View full text |Cite
|
Sign up to set email alerts
|

Watermarking schemes for digital images: Robustness overview

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 44 publications
(19 citation statements)
references
References 57 publications
0
19
0
Order By: Relevance
“…[4] [26] [29] The watermark is spread across a wide range of frequencies, making it more difficult to remove or distort. [5] In this paper, fingerprint biometric data is considered as the first authentication factor to identify the registered user.…”
Section: Fig 1 Process Of Two-factor Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…[4] [26] [29] The watermark is spread across a wide range of frequencies, making it more difficult to remove or distort. [5] In this paper, fingerprint biometric data is considered as the first authentication factor to identify the registered user.…”
Section: Fig 1 Process Of Two-factor Authenticationmentioning
confidence: 99%
“…• If the length of unique data is less than the key, each digit of the key is assigned to a position in the command, starting with the digit corresponding to the length of the command. For example, if the command is "A1B2C" and the key is "12345678", the key distribution would be [4,5,6,7,8].…”
Section: Crypto-code Generationmentioning
confidence: 99%
“…A semi-blind watermark requires a secret key and a watermarked image to extract the watermark. If only the secret key is required to extract the watermark, the https://doi.org/10.31436/iiumej.v24i1.2597 approach is known as blind watermarking [10]. Based on the application, watermarking techniques can be classified as either robust or fragile [1,5].…”
Section: Introductionmentioning
confidence: 99%
“…In general, there is a conflicting relationship between these properties and it is difficult to obtain improvements at the same time, but it is an important goal to improve these properties through continuous research to make watermarking algorithms better for copyright protection. Watermarking algorithms can be divided into spatial-domain watermarking [5][6][7][8] and frequency-domain watermarking [9][10][11][12][13][14][15][16][17][18] depending on the embedding domain. The former modifies the spatial-domain pixel values to embed watermark information, which is computationally simple and efficient, but its robustness is mediocre because the image attack will distort the pixels directly.…”
Section: Introductionmentioning
confidence: 99%