Journal ArticleDOI
A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography
Ming-Shi Wang,Wei-Che Chen +1 more
Reads0
Chats0
TLDR
A novel copyright protection scheme that combines the discrete wavelet transform (DWT) and the singular value decomposition (SVD) is proposed and can effectively resist several common attacks.About:
This article is published in Computer Standards & Interfaces.The article was published on 2009-06-01. It has received 71 citations till now. The article focuses on the topics: Visual cryptography & Cluster analysis.read more
Citations
More filters
Journal ArticleDOI
Watermarking Techniques used in Medical Images: a Survey
TL;DR: This paper aims to provide a useful survey on watermarking and offer a clear perspective for interested researchers by analyzing the strengths and weaknesses of different existing methods.
Journal ArticleDOI
A blind watermarking algorithm based on fractional Fourier transform and visual cryptography
TL;DR: A robust copyright protection scheme based on fractional Fourier transform (FrFT) and visual cryptography (VC) and the experimental results show that the proposed scheme is strong enough to resist various signal processing operations.
Journal ArticleDOI
Discrete Fourier transform-based watermarking method with an optimal implementation radius
TL;DR: A watermarking method, which minimizes the impact of the watermark implementation on the overall quality of an image, is developed using a peak signal-to-noise ratio to evaluate quality degradation.
Journal ArticleDOI
Robust copyright protection scheme for digital images using overlapping DCT and SVD
Xiaotian Wu,Wei Sun +1 more
TL;DR: A robust lossless copyright protection scheme, based on overlapping discrete cosine transform (DCT) and singular value decomposition (SVD), is presented, demonstrating the robustness of the proposed scheme against different image-manipulation attacks.
Journal ArticleDOI
Secure data hiding techniques: a survey
TL;DR: This article presents a detailed discussion of different prospects of digital image watermarking and performance comparisons of the discussed techniques are presented in tabular format.
References
More filters
Journal ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Journal ArticleDOI
Reversible data embedding using a difference expansion
TL;DR: The redundancy in digital images is explored to achieve very high embedding capacity, and keep the distortion low, in a novel reversible data-embedding method for digital images.
Visual Cryptography
Moni Naor,Adi Shamir +1 more
TL;DR: In this paper, a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations, is proposed, which is called k-out-of-n secret sharing.
Journal ArticleDOI
The singular value decomposition: Its computation and some applications
TL;DR: This work provides a tutorial introduction to certain numerical computations both in linear algebra and linear systems in the context of bounded arithmetic and the singular value decomposition (SVD).
Proceedings ArticleDOI
A digital watermark
TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Related Papers (5)
An image intellectual property protection scheme for gray-level images using visual secret sharing strategy
Chin-Chen Chang,Jun-Chou Chuang +1 more