IEEE SoutheastCon 2008 2008
DOI: 10.1109/secon.2008.4494361
|View full text |Cite
|
Sign up to set email alerts
|

Watermarking with wavelets: Simplicity leads to robustness

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(14 citation statements)
references
References 9 publications
0
14
0
Order By: Relevance
“…6) Apply inverse DCT transform on each block. [9]. One of the main challenges of the watermarking problem is to achieve a better tradeoff between robustness and perceptivity.…”
Section: Discrete Cosine Transforms (Dct): Dct Like a Fouriermentioning
confidence: 99%
See 1 more Smart Citation
“…6) Apply inverse DCT transform on each block. [9]. One of the main challenges of the watermarking problem is to achieve a better tradeoff between robustness and perceptivity.…”
Section: Discrete Cosine Transforms (Dct): Dct Like a Fouriermentioning
confidence: 99%
“…One of the main challenges of the watermarking problem is to achieve a better tradeoff between robustness and perceptivity. Robustness can be achieved by increasing the strength of the embedded watermark, but the visible distortion would be increased as well [9]. However, DWT is much preferred because it provides both a simultaneous spatial localization and a frequency spread of the watermark within the host image [10].…”
Section: Discrete Cosine Transforms (Dct): Dct Like a Fouriermentioning
confidence: 99%
“…Besides sharing, the approaches using data hiding [17][18][19] or watermarking [20][21][22][23][24] have also offered other kinds of protection. In general, a hiding method can embed a secret file in a host image.…”
Section: Introductionmentioning
confidence: 99%
“…In the design of watermarking methods, the researchers usually pay more attention to the work of resisting attacks such as copy attack, tampering, and cropping. Nowadays, the study of watermarks has covered not only software [21,24] but also hardware [22,23]. Notably, a sharing method often has a post-processing which utilizes data hiding or some kinds of authentication tool.…”
Section: Introductionmentioning
confidence: 99%
“…They deduced that db6 provides the best performance among the filter banks examined with respect to the quality of watermarked image and robustness of the watermark. In [2], authors tested eight families of wavelets, both orthogonal and biorthogonal wavelets have been compared, and they deduced that the Haar wavelet outperforms the other wavelet families.…”
Section: Introductionmentioning
confidence: 99%