Adaptive watermark mechanism for rightful ownership protection
Citations
207 citations
177 citations
126 citations
123 citations
Cites background from "Adaptive watermark mechanism for ri..."
...I f M D a A R R A A K R I H G M 1 i P t m g o ( t 2 s r e s p 2 t w i m e i 0 d The Journal of Systems and Software 85 (2012) 883– 894 Contents lists available at SciVerse ScienceDirect The Journal of Systems and Software jo u rn al hom epage: www.elsev ier .com/ locate / j ss ntelligent reversible watermarking in integer wavelet domain or medical images uhammad Arsalan, Sana Ambreen Malik, Asifullah Khan ∗ epartment of Computer Science, Pakistan Institute of Engineering and Applied Sciences, Nilore-45650, Islamabad, Pakistan r t i c l e i n f o rticle history: eceived 30 September 2010 eceived in revised form 28 October 2011 ccepted 1 November 2011 vailable online 7 November 2011 a b s t r a c t The prime requirement of reversible watermarking scheme is that the system should be able to restore the cover work to its original state after extracting the hidden information....
[...]
...Therefore, security of digital content has ained much more importance and researchers have been develping approaches for protecting and authenticating digital content Chang and Lin, 2008)....
[...]
...…in integer wavelet domain or medical images uhammad Arsalan, Sana Ambreen Malik, Asifullah Khan ∗ epartment of Computer Science, Pakistan Institute of Engineering and Applied Sciences, Nilore-45650, Islamabad, Pakistan r t i c l e i n f o rticle history: eceived 30 September 2010 eceived…...
[...]
103 citations
References
14,659 citations
"Adaptive watermark mechanism for ri..." refers background in this paper
...Hence, how to protect the integrity, validity, and ownership of digital multimedia is an important issue (Rivest et al., 1978; Katzenbeisser and Petitcolas, 2000; Chang et al., 2004; Nikolaidis and Pitas, 2004)....
[...]
7,935 citations
"Adaptive watermark mechanism for ri..." refers methods in this paper
...(a) Divide ‘Lena’ into non-overlapping blocks with 4 · 4 pixels; (b) Train a codebook containing 256 codewords by LBG algorithm (Linde et al., 1980); (c) Match the minimum distortion codeword to replace the original blocks....
[...]
6,194 citations
"Adaptive watermark mechanism for ri..." refers methods in this paper
...Before embedding a robust watermark into images, engineers usually apply two techniques, discrete cosine transformation (DCT) (Chang et al., 2002a,b; Cox et al., 1997) and wavelet transformation (DWT) (Kim et al....
[...]
...Before embedding a robust watermark into images, engineers usually apply two techniques, discrete cosine transformation (DCT) (Chang et al., 2002a,b; Cox et al., 1997) and wavelet transformation (DWT) (Kim et al., 1999; Barni et al., 2001; Chen et al., 2005), to transform pixels of the host image into its corresponding frequency domain....
[...]
...Namely, our scheme does not apply DCT and DWT mechanisms to the signing procedure....
[...]
...In this article, we propose an adaptive copyright protection scheme without the use of discrete cosine transformation (DCT) and discrete wavelet transformation (DWT)....
[...]
...Before embedding a robust watermark into images, engineers usually apply two techniques, discrete cosine transformation (DCT) (Chang et al., 2002a,b; Cox et al., 1997) and wavelet transformation (DWT) (Kim et al., 1999; Barni et al., 2001; Chen et al., 2005), to transform pixels of the host image…...
[...]
1,732 citations
979 citations