scispace - formally typeset
Journal ArticleDOI

Recent trends in image watermarking techniques for copyright protection: a survey

Reads0
Chats0
TLDR
In this study, contemporary developments of digital image watermarking techniques are appraised so as to identify state-of-the-art practices and their limitations.
Citations
More filters
Journal ArticleDOI

Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview

TL;DR: The paper highlights the potential to apply the modified watermark algorithms to secure IoT networks and provides the motivations, objectives and applications of the recent secure watermarking techniques in IoT.
Journal ArticleDOI

AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking

TL;DR: In this article , the authors proposed color image authentication based on blind fragile image watermarking for tamper detection and self-recovery named AuSR1, which divides each channel of the cover image into non-overlapping blocks with the size of 2 × 2 pixels.
Journal ArticleDOI

Three Layer Authentications with a Spiral Block Mapping to Prove Authenticity in Medical Images

TL;DR: A self-embedding watermark using a spiral block mapping for tamper detection and restoration of digital medical image has a potential to be manipulated by unauthorized persons due to advanced communication technology.
Journal ArticleDOI

Robust color image watermarking using multiple fractional-order moments and chaotic map

TL;DR: In this article , a robust color image-watermarking algorithm based on new multiple fractional multi-channel orthogonal moments, fractional-order exponent moments (MFrEMs), fractionalorder polar harmonic transforms (MFRPHTs), and fractional order radial harmonic Fourier moments (RHFMs) was proposed.
Journal ArticleDOI

A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaos

TL;DR: Wang et al. as discussed by the authors designed a Tent-Henon-Map double chaos watermarking encryption method and designed a medical image encryption based on ridgelet-DCT transform.
References
More filters
Journal ArticleDOI

Adaptive Digital Watermarking for Copyright Protection of Digital Images in Wavelet Domain

TL;DR: The proposed adaptive invisible watermarking scheme is adaptive in the sense that the scaling and embedding factors are calculated using Bhattacharyya distance and the fourth cumulant moment - kurtosis to preserve the ownership rights and in addition for piracy of digital data prevention.
Journal ArticleDOI

Cloud image watermarking: high quality data hiding and blind decoding scheme based on block truncation coding

TL;DR: This study presents a novel data hiding method based on the block truncation coding (BTC) image compression technique and proposes a block classification scheme for determining smooth blocks, complex_1 blocks, and complex_2 blocks in an image to improve the quality of images without damaging the secret data.
Journal ArticleDOI

An efficient and robust watermarking approach based on single value decompression, multi-level DWT, and wavelet fusion with scrambled medical images

TL;DR: The proposed approach achieved not only precise acceptable perceptual quality with admired Peak Signal-to-Noise Ratio (PSNR) values but similarly high Correlation Coefficient (Cr) and SSIM values in the existence of severe attacks.
Book ChapterDOI

Digital Image Watermarking Through Encryption and DWT for Copyright Protection

TL;DR: This study has proposed digital image watermarking technique based on discrete wavelet transform (DWT) and encryption and results in PSNR greater than 50 dB and is resistance to noise, geometric, and compression attack.
Journal ArticleDOI

A robust digital image watermarking scheme based on bat algorithm optimization and SURF detector in SWT domain

TL;DR: An optimized robust digital image watermarking scheme based on Stationary Wavelet Transform (SWT) using Bat optimization Algorithm (BA) and Speed-Up Robust Feature (SURF) to optimize watermark strength factors in the embedding process, considering relevant attacks.
Related Papers (5)