scispace - formally typeset
Journal ArticleDOI

A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography

Ming-Shi Wang, +1 more
- 01 Jun 2009 - 
- Vol. 31, Iss: 4, pp 757-762
Reads0
Chats0
TLDR
A novel copyright protection scheme that combines the discrete wavelet transform (DWT) and the singular value decomposition (SVD) is proposed and can effectively resist several common attacks.
Citations
More filters
Journal ArticleDOI

Watermarking Techniques used in Medical Images: a Survey

TL;DR: This paper aims to provide a useful survey on watermarking and offer a clear perspective for interested researchers by analyzing the strengths and weaknesses of different existing methods.
Journal ArticleDOI

A blind watermarking algorithm based on fractional Fourier transform and visual cryptography

TL;DR: A robust copyright protection scheme based on fractional Fourier transform (FrFT) and visual cryptography (VC) and the experimental results show that the proposed scheme is strong enough to resist various signal processing operations.
Journal ArticleDOI

Discrete Fourier transform-based watermarking method with an optimal implementation radius

TL;DR: A watermarking method, which minimizes the impact of the watermark implementation on the overall quality of an image, is developed using a peak signal-to-noise ratio to evaluate quality degradation.
Journal ArticleDOI

Robust copyright protection scheme for digital images using overlapping DCT and SVD

TL;DR: A robust lossless copyright protection scheme, based on overlapping discrete cosine transform (DCT) and singular value decomposition (SVD), is presented, demonstrating the robustness of the proposed scheme against different image-manipulation attacks.
Journal ArticleDOI

Secure data hiding techniques: a survey

TL;DR: This article presents a detailed discussion of different prospects of digital image watermarking and performance comparisons of the discussed techniques are presented in tabular format.
References
More filters
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Journal ArticleDOI

Reversible data embedding using a difference expansion

TL;DR: The redundancy in digital images is explored to achieve very high embedding capacity, and keep the distortion low, in a novel reversible data-embedding method for digital images.

Visual Cryptography

Moni Naor, +1 more
TL;DR: In this paper, a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations, is proposed, which is called k-out-of-n secret sharing.
Journal ArticleDOI

The singular value decomposition: Its computation and some applications

TL;DR: This work provides a tutorial introduction to certain numerical computations both in linear algebra and linear systems in the context of bounded arithmetic and the singular value decomposition (SVD).
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Related Papers (5)