scispace - formally typeset
Journal ArticleDOI

Recent trends in image watermarking techniques for copyright protection: a survey

Reads0
Chats0
TLDR
In this study, contemporary developments of digital image watermarking techniques are appraised so as to identify state-of-the-art practices and their limitations.
Citations
More filters
Journal ArticleDOI

Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview

TL;DR: The paper highlights the potential to apply the modified watermark algorithms to secure IoT networks and provides the motivations, objectives and applications of the recent secure watermarking techniques in IoT.
Journal ArticleDOI

AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking

TL;DR: In this article , the authors proposed color image authentication based on blind fragile image watermarking for tamper detection and self-recovery named AuSR1, which divides each channel of the cover image into non-overlapping blocks with the size of 2 × 2 pixels.
Journal ArticleDOI

Three Layer Authentications with a Spiral Block Mapping to Prove Authenticity in Medical Images

TL;DR: A self-embedding watermark using a spiral block mapping for tamper detection and restoration of digital medical image has a potential to be manipulated by unauthorized persons due to advanced communication technology.
Journal ArticleDOI

Robust color image watermarking using multiple fractional-order moments and chaotic map

TL;DR: In this article , a robust color image-watermarking algorithm based on new multiple fractional multi-channel orthogonal moments, fractional-order exponent moments (MFrEMs), fractionalorder polar harmonic transforms (MFRPHTs), and fractional order radial harmonic Fourier moments (RHFMs) was proposed.
Journal ArticleDOI

A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaos

TL;DR: Wang et al. as discussed by the authors designed a Tent-Henon-Map double chaos watermarking encryption method and designed a medical image encryption based on ridgelet-DCT transform.
References
More filters
Book ChapterDOI

A Robust and Secure DWT-SVD Digital Image Watermarking Using Encrypted Watermark for Copyright Protection of Cheque Image

TL;DR: Digital Watermarking Technique is used to provide ownership & copyright protection for cheque image and private key encryption & decryption technique used for security of bank watermark.
Journal ArticleDOI

An Efficient Robust Blind Watermarking Method Based on Convolution Neural Networks in Wavelet Transform Domain

TL;DR: A novel scheme of digital image blind watermarking based on the combination of the discrete wavelet transform (DWT) and the convolutional neural network (CNN) is proposed, which has superior performance against common attacks of JPEG compression, mean and median filtering, salt and pepper noise, Gaussian noise, speckle noise, brightness modification, scaling, cropping, rotation, and shearing operations.
Journal ArticleDOI

Image Watermarking Using Two Level Encryption Method Based on Chaotic Logistic Mapping and Rivest Shamir Adleman Algorithm

TL;DR: The experimental outcome shows that the proposed approach delivers a high secure network with low computational complexity by means of entropy value and Peak Signal-to-Noise Ratio (PSNR).
Journal ArticleDOI

A Robust Color Image Watermarking Algorithm Based on APDCBT and SSVD

Xiaoyan Yu, +2 more
- 02 Oct 2019 - 
TL;DR: A robust color image watermarking algorithm based on all phase discrete cosine biorthogonal transform and shuffled singular value decomposition and SSVD and Fibonacci transform is proposed, which has better performance in robustness and imperceptibility.
Book ChapterDOI

Digital Image Watermarking Scheme Based on Visual Cryptography and SVD

TL;DR: Experimental results show that the proposed watermarking scheme to balance the tradeoff between security and imperceptibility by using visual cryptography and singular value decomposition is imperceptible, secure and robust to the common image processing and other attacks.
Related Papers (5)