scispace - formally typeset
Journal ArticleDOI

Recent trends in image watermarking techniques for copyright protection: a survey

Reads0
Chats0
TLDR
In this study, contemporary developments of digital image watermarking techniques are appraised so as to identify state-of-the-art practices and their limitations.
Citations
More filters
Journal ArticleDOI

Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview

TL;DR: The paper highlights the potential to apply the modified watermark algorithms to secure IoT networks and provides the motivations, objectives and applications of the recent secure watermarking techniques in IoT.
Journal ArticleDOI

AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking

TL;DR: In this article , the authors proposed color image authentication based on blind fragile image watermarking for tamper detection and self-recovery named AuSR1, which divides each channel of the cover image into non-overlapping blocks with the size of 2 × 2 pixels.
Journal ArticleDOI

Three Layer Authentications with a Spiral Block Mapping to Prove Authenticity in Medical Images

TL;DR: A self-embedding watermark using a spiral block mapping for tamper detection and restoration of digital medical image has a potential to be manipulated by unauthorized persons due to advanced communication technology.
Journal ArticleDOI

Robust color image watermarking using multiple fractional-order moments and chaotic map

TL;DR: In this article , a robust color image-watermarking algorithm based on new multiple fractional multi-channel orthogonal moments, fractional-order exponent moments (MFrEMs), fractionalorder polar harmonic transforms (MFRPHTs), and fractional order radial harmonic Fourier moments (RHFMs) was proposed.
Journal ArticleDOI

A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaos

TL;DR: Wang et al. as discussed by the authors designed a Tent-Henon-Map double chaos watermarking encryption method and designed a medical image encryption based on ridgelet-DCT transform.
References
More filters
Journal ArticleDOI

Robust and secure zero-watermarking algorithm for color images based on majority voting pattern and hyper-chaotic encryption

TL;DR: Experimental results indicate that in addition to the high-level security, the proposed zero-watermarking algorithm also has a stronger robustness against common geometric and non-geometric attacks, including rotation, scaling, filtering, JPEG compression and noise addition, compared with some existing typical zero-Watermarking and traditional watermarking methods.
Journal ArticleDOI

Online Sequential Extreme Learning Machine for watermarking in DWT domain

TL;DR: Experimental results demonstrate that the proposed watermarking scheme is imperceptible/transparent and robust against image processing and attacks such as blurring, cropping, JPEG, noise addition, rotation, scaling, scaling-cropping, and sharpening.
Journal ArticleDOI

A new facet in robust digital watermarking framework

TL;DR: The core idea of the proposed technique is to first scale up the size of host image equal to thesize of watermark using chaotic map and Hessenberg decomposition followed by the redundant wavelet transform.
Journal ArticleDOI

Histogram shifting-based blind watermarking scheme for copyright protection in 5G

TL;DR: The novelty of the proposed image watermarking scheme is that a new histogram shifting procedure has been introduced on the non-overlapping circular regions around the selected stable keypoints on the image to find the closeness between two watermark bit sequences even when they have different sizes.
Journal ArticleDOI

A highly robust and secure image watermarking based on classification and visual cryptography

TL;DR: By skipping blocks which are not robust against attacks, the robustness of the proposed watermarking method is significantly improved and the method is completely imperceptible because the watermark pattern is concealed without modifying the original host image.
Related Papers (5)