Alomoush et al., 2023 - Google Patents
Digital image watermarking using discrete cosine transformation based linear modulationAlomoush et al., 2023
View HTML- Document ID
- 6322023348670679988
- Author
- Alomoush W
- Khashan O
- Alrosan A
- Attar H
- Almomani A
- Alhosban F
- Makhadmeh S
- Publication year
- Publication venue
- Journal of Cloud Computing
External Links
Snippet
The proportion of multimedia traffic in data networks has grown substantially as a result of advancements in IT. As a result, it's become necessary to address the following challenges in protecting multimedia data: prevention of unauthorized disclosure of sensitive data, in …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0061—Embedding of the watermark in each block of the image, e.g. segmented watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0083—Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0052—Embedding of the watermark in the frequency domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0051—Embedding of the watermark in the spatial domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
- H04N1/3217—Transform domain methods using wavelet transforms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0722—Content
- G06F2221/0737—Traceability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/3232—Robust embedding or watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T5/00—Image enhancement or restoration, e.g. from bit-mapped to bit-mapped creating a similar image
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/46—Embedding additional information in the video signal during the compression process
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wan et al. | A comprehensive survey on robust image watermarking | |
Hamidi et al. | Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform | |
Mahto et al. | A survey of color image watermarking: State-of-the-art and research directions | |
Alomoush et al. | Digital image watermarking using discrete cosine transformation based linear modulation | |
Subhedar et al. | Current status and key issues in image steganography: A survey | |
Zhaofeng et al. | A new blockchain-based trusted DRM scheme for built-in content protection | |
Haghighi et al. | TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with optimized quality using LWT and GA | |
Singh et al. | Reversible data hiding based on Shamir’s secret sharing for color images over cloud | |
Nguyen et al. | A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain | |
Singh et al. | SVD-DCT based medical image watermarking in NSCT domain | |
Malik et al. | An AMBTC compression based data hiding scheme using pixel value adjusting strategy | |
Cao et al. | A secure video watermarking technique based on hyperchaotic Lorentz system | |
Luo et al. | Adaptive and blind watermarking scheme based on optimal SVD blocks selection | |
El-Shafai et al. | Robust and efficient multi-level security framework for color medical images in telehealthcare services | |
Singh et al. | From classical to soft computing based watermarking techniques: A comprehensive review | |
Sharma et al. | Artificial bee colony based perceptually tuned blind color image watermarking in hybrid LWT-DCT domain | |
Liu et al. | Robust blind image watermarking based on chaotic mixtures | |
PVSSR | Adaptive, robust and blind digital watermarking using Bhattacharyya distance and bit manipulation | |
Parah et al. | A robust and computationally efficient digital watermarking technique using inter block pixel differencing | |
Hosny et al. | Robust color image watermarking using multiple fractional-order moments and chaotic map | |
Tiwari et al. | Image watermarking techniques based on Schur decomposition and various image invariant moments: a review | |
Mahto et al. | Fusiw: fusion-based secure rgb image watermarking using hashing | |
Parah et al. | StegNmark: a joint Stego-watermark approach for early tamper detection | |
Mahto et al. | Firefly optimization-based dual watermarking for colour images with improved capacity | |
Hadmi et al. | A robust and secure perceptual hashing system based on a quantization step analysis |