Concealed attack for robust watermarking based on generative model and perceptual loss
Q Li, X Wang, B Ma, X Wang, C Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
While existing watermarking attack methods can disturb the correct extraction of watermark
information, the visual quality of watermarked images will be greatly damaged. Therefore, a …
information, the visual quality of watermarked images will be greatly damaged. Therefore, a …
A recent survey on image watermarking using scaling factor techniques for copyright protection
F Ernawan, D Ariatmanto - Multimedia Tools and Applications, 2023 - Springer
This survey presented a discussion of the existing scaling factor and adaptive scaling factor
in image watermarking schemes. The discussion included several issues: robustness …
in image watermarking schemes. The discussion included several issues: robustness …
Quaternion discrete fractional Krawtchouk transform and its application in color image encryption and watermarking
This paper extends the traditional discrete fractional Krawtchouk transform (DFrKT) with
quaternion theory to quaternion discrete fractional Krawtchouk transform (QDFrKT) for the …
quaternion theory to quaternion discrete fractional Krawtchouk transform (QDFrKT) for the …
Robust and optimum color image watermarking method based on a combination of DWT and DCT
RY Abadi, P Moallem - Optik, 2022 - Elsevier
A hybrid and robust digital image watermarking is suggested by using advantages of both
frequency domain and wavelet domain. In this method, the most suitable color component of …
frequency domain and wavelet domain. In this method, the most suitable color component of …
Recent advances in transform and hybrid domain digital watermarking techniques—a survey
M Sajeer, A Mishra, PS Sathidevi - Soft Computing for Security …, 2022 - Springer
In the older days, watermarking has been extensively used in different forms in diverse
fields, mainly to recognize an entity's ownership. At the early stages, its analog rendition has …
fields, mainly to recognize an entity's ownership. At the early stages, its analog rendition has …
[PDF][PDF] Attacking image watermarking and steganography-a survey
O Hosam - International Journal of Information Technology and …, 2019 - mecs-press.net
Image hiding techniques include steganography and watermarking. Steganography
procedures are directed to keep the secure information from eavesdropping and …
procedures are directed to keep the secure information from eavesdropping and …
DICOM imaging watermarking for hiding medical reports
M Boussif, N Aloui, A Cherif - Medical & Biological Engineering & …, 2020 - Springer
Medical confidentiality is an essential duty in the medical profession. In this paper, we
introduce a novel robust blind watermarking method for securing the medical report in a …
introduce a novel robust blind watermarking method for securing the medical report in a …
Highly robust hybrid image watermarking approach using Tchebichef transform with secured PCA and CAT encryption
In the modern era of technology, watermarking plays an important role in embedding of the
copyright information in order to provide authenticity in imperceptible and robust manner. In …
copyright information in order to provide authenticity in imperceptible and robust manner. In …
A robust image watermarking algorithm based on content authentication and intelligent optimization
YL Bei, XR Zhu, Q Zhang, S Qiao - … of the 5th International Conference on …, 2022 - dl.acm.org
Aiming at some shortcomings of current digital watermarking algorithms, a color image
double watermarking algorithm based on content authentication and machine learning is …
double watermarking algorithm based on content authentication and machine learning is …
FFT-ETM based distortion less and high payload image steganography
A Khan, A Sarfaraz - Multimedia Tools and Applications, 2019 - Springer
This paper is presenting a novel high capacity based imperceptible and robust image
steganography technique for obscured communication. A considerable literature studied on …
steganography technique for obscured communication. A considerable literature studied on …