scispace - formally typeset
Journal ArticleDOI

Recent trends in image watermarking techniques for copyright protection: a survey

Reads0
Chats0
TLDR
In this study, contemporary developments of digital image watermarking techniques are appraised so as to identify state-of-the-art practices and their limitations.
Citations
More filters

Fan Beam Transform and LU Decomposition based Blind Watermarking Technique for Color Images

TL;DR: A blind image watermarking technique using fan-beam transform (FBT) and lower–upper (LU) decomposition and the pseudo-random sequence algorithm is employed to choose the embedding blocks for accomplishing better security and robustness.
Journal ArticleDOI

A survey of color image watermarking: State-of-the-art and research directions

TL;DR: A detailed overview of watermarking along with its characteristics, evaluation metrics, and current applications is provided in this article, where a comprehensive survey of different approaches along with their merits and limitations is provided.
Journal ArticleDOI

Robust Image Watermarking in Spatial Domain Utilizing Features Equivalent to SVD Transform

Musrrat Ali
- 16 May 2023 - 
TL;DR: In this article , the authors proposed a robust and blind image watermarking scheme that directly alters the image pixels in the spatial domain to incorporate the watermark by quantizing the block-wise invariant maximum singular value.
Journal ArticleDOI

Robust Blind Medical Image Watermarking Using Quantization and SIFT with Enhanced Security

TL;DR: An efficient blind robust watermarking solution for medical images based on a combination of the Scale Invariant Feature Transform (SIFT) and even-odd quantization that can extract the embedded information without original image by selecting only non-overlapping features in embedding process and exploiting the correlation among all detecting regions.
Journal ArticleDOI

Additional Information Delivery to Image Content via Improved Unseen–Visible Watermarking

TL;DR: A watermark complement strategy for unseen–visible watermarking is proposed, providing a high visual quality of the exhibited watermark and preserving its robustness in terms of readability and imperceptibility against geometric and processing attacks.
References
More filters
Journal ArticleDOI

Robust image watermarking in the spatial domain

TL;DR: A copyright protection method that is based on hiding an ‘invisible’ signal, known as digital watermark, in the image is presented and a variation that generates image dependent watermarks as well as a method to handle geometrical distortions are presented.

A Survey of Digital Watermarking Techniques, Applications and Attacks

TL;DR: This paper incorporate the detail study watermarking definition, concept and the main contributions in this field such as categories of water marking process that tell which watermarked method should be used.
Journal ArticleDOI

A novel CNN based security guaranteed image watermarking generation scenario for smart city applications

TL;DR: A novel algorithm using synergetic neural networks for robustness and security of digital image watermarking is proposed, which obtains an optimal Peak Signal-to-noise ratio (PSNR) and can complete certain image processing operations with improved performance.
Journal ArticleDOI

A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine

TL;DR: The proposed algorithm for multiple watermarking based on discrete wavelet transforms, discrete cosine transform and singular value decomposition has been proposed for healthcare applications and has been found to be giving excellent performance for robustness, imperceptibility, capacity and security simultaneously.
Journal ArticleDOI

A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications

TL;DR: Robustness of the scheme is better than existing scheme for similar set of medical images in terms of normalized correlation coefficient (NCC) and bit-error-rate (BER) and performance comparison of proposed scheme with existing schemes shows proposed scheme has better robustness against different types of attacks.
Related Papers (5)