scispace - formally typeset
Journal ArticleDOI

Recent trends in image watermarking techniques for copyright protection: a survey

TLDR
In this study, contemporary developments of digital image watermarking techniques are appraised so as to identify state-of-the-art practices and their limitations.
Citations
More filters
Journal ArticleDOI

Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview

TL;DR: The paper highlights the potential to apply the modified watermark algorithms to secure IoT networks and provides the motivations, objectives and applications of the recent secure watermarking techniques in IoT.
Journal ArticleDOI

AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking

TL;DR: In this article , the authors proposed color image authentication based on blind fragile image watermarking for tamper detection and self-recovery named AuSR1, which divides each channel of the cover image into non-overlapping blocks with the size of 2 × 2 pixels.
Journal ArticleDOI

Three Layer Authentications with a Spiral Block Mapping to Prove Authenticity in Medical Images

TL;DR: A self-embedding watermark using a spiral block mapping for tamper detection and restoration of digital medical image has a potential to be manipulated by unauthorized persons due to advanced communication technology.
Journal ArticleDOI

Robust color image watermarking using multiple fractional-order moments and chaotic map

TL;DR: In this article , a robust color image-watermarking algorithm based on new multiple fractional multi-channel orthogonal moments, fractional-order exponent moments (MFrEMs), fractionalorder polar harmonic transforms (MFRPHTs), and fractional order radial harmonic Fourier moments (RHFMs) was proposed.
Journal ArticleDOI

A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaos

TL;DR: Wang et al. as discussed by the authors designed a Tent-Henon-Map double chaos watermarking encryption method and designed a medical image encryption based on ridgelet-DCT transform.
References
More filters
Journal ArticleDOI

A secure removable visible watermarking for BTC compressed images

TL;DR: The experimental results show that this scheme can achieve a good balance between perceptual transparence and the watermark strength (watermark visibility) and can resist common image processing attacks.
Journal ArticleDOI

Geometric distortion correction based robust watermarking scheme in LWT-SVD domain with digital watermark extraction using SVM

TL;DR: Experimental results suggest that the proposed watermarking scheme provides significant improvement in terms of robustness and security of the watermark, and the subjective analysis suggests that proposed scheme provides improved performance over some of the recent existing techniques.
Journal ArticleDOI

An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm

TL;DR: A time efficient optimization method based on machine learning algorithms to detect the best embedding parameter for image watermarking with both robustness and imperceptibility is proposed and it has been found that the proposed method consumes very less time for the evaluation of optimum solutions.
Journal ArticleDOI

Robust digital image watermarking based on fuzzy inference system and back propagation neural networks using DCT

TL;DR: This paper presents an image watermarking technique which exploits the human visual system (HVS), two artificial intelligence techniques [fuzzy inference system (FIS) and back propagation neural networks (BPNN)], and discrete cosine transform, which results in a hybrid intelligence technique named neuro- fuzzy system.
Journal ArticleDOI

Red-cyan anaglyph image watermarking using DWT, Hadamard transform and singular value decomposition for copyright protection

TL;DR: A unique Red-Cyan Anaglyph image watermarking using DWT, Fast Walsh Hadamard transform and SVD is proposed, which has achieved better outcomes in terms of robustness and imperceptibility than the former existing papers.
Related Papers (5)