scispace - formally typeset
Journal ArticleDOI

Perceptually adaptive spread transform image watermarking scheme using Hadamard transform

TLDR
The present paper proposes a digital image watermarking scheme using the characteristics of the human visual system, spread transform technique and statistical information measure, which offers several advantages, such as low loss in image information, greater reliability of watermark detection and higher data hiding capacity at high degree of compression.
About
This article is published in Information Sciences.The article was published on 2011-02-01. It has received 42 citations till now. The article focuses on the topics: Watermark & Digital watermarking.

read more

Citations
More filters
Journal ArticleDOI

Watermarking and authentication of quantum images based on restricted geometric transformations

TL;DR: Simulation-based experimental results involving the classical (i.e. conventional or non-quantum) simulation of the input images, watermark signals, and quantum circuits yielded a 25% improvement in terms of overall watermark-embedding capacity and between 7% and 50.7% in the visible quality of the watermarked images in comparison with select digital watermarking methods for various pairs, thus, demonstrating both the feasibility and capabilities of the proposed WaQI scheme.
Journal ArticleDOI

Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics

TL;DR: This study presents a robust block-based image watermarking scheme based on the singular value decomposition (SVD) and human visual system in the discrete wavelet transform (DWT) domain that outperformed several previous schemes in terms of imperceptibility and robustness.
Journal ArticleDOI

An overview of encryption algorithms in color images

TL;DR: Various existing color (RGB mode) image encryption schemes have been examined comprehensively based on the application domains in addition to summarizing over 50 studies in this field, most of which being published in the last year.
Journal ArticleDOI

Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition

TL;DR: Experimental results show that the proposed color image watermarking is not only invisible but also robust against a wide variety of attacks, especially for color attacks and geometric distortions.
Journal ArticleDOI

A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection

TL;DR: Results of the robustness, imperceptibility, and reliability tests demonstrate that the proposed IWT-SVD-MOACO scheme outperforms several previous schemes and avoids FPP completely.
References
More filters
Journal ArticleDOI

A mathematical theory of communication

TL;DR: This final installment of the paper considers the case where the signals or the messages or both are continuously variable, in contrast with the discrete nature assumed until now.
Journal ArticleDOI

Image quality assessment: from error visibility to structural similarity

TL;DR: In this article, a structural similarity index is proposed for image quality assessment based on the degradation of structural information, which can be applied to both subjective ratings and objective methods on a database of images compressed with JPEG and JPEG2000.
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Book

Communication Systems

Simon Haykin
TL;DR: This best-selling, easy to read book offers the most complete discussion on the theories and principles behind today's most advanced communications systems.
Journal ArticleDOI

Quantization index modulation: a class of provably good methods for digital watermarking and information embedding

TL;DR: It is shown that QIM is "provably good" against arbitrary bounded and fully informed attacks, and achieves provably better rate distortion-robustness tradeoffs than currently popular spread-spectrum and low-bit(s) modulation methods.
Related Papers (5)