Review on Digital Image Watermarking Based on Singular Value Decomposition
暂无分享,去创建一个
[1] Punam Bedi,et al. Optimized gray-scale image watermarking using DWT-SVD and Firefly Algorithm , 2014, Expert Syst. Appl..
[2] Durgesh Singh,et al. DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection , 2017, Multimedia Tools and Applications.
[3] Redha Benzid,et al. A bind RGB color image watermarking based on singular value decomposition , 2010, ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010.
[4] Safya Belghith,et al. Tamper detection and self-recovery scheme by DWT watermarking , 2015 .
[5] Nasir D. Memon,et al. Secret and public key authentication watermarking schemes that resist vector quantization attack , 2000, Electronic Imaging.
[6] Xiao Zhou,et al. RST Resilient Watermarking Scheme Based on DWT-SVD and Scale-Invariant Feature Transform , 2017, Algorithms.
[7] Millie Pant,et al. SVD based fragile watermarking scheme for tamper localization and self-recovery , 2016, Int. J. Mach. Learn. Cybern..
[8] Jing-Ming Guo,et al. False-positive-free SVD-based image watermarking , 2014, J. Vis. Commun. Image Represent..
[9] Kamel Mohamed Faraoun,et al. Robust and Reversible Image Watermarking Scheme Using Combined DCT-DWT-SVD Transforms , 2015, J. Inf. Process. Syst..
[10] Yanhong Zhang. Blind watermark algorithm based on HVS and RBF neural network in DWT domain , 2009 .
[11] Safya Belghith,et al. Chaotic watermark for blind forgery detection in images , 2015, Multimedia Tools and Applications.
[12] Nasir D. Memon,et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..
[13] Jean-Yves Chouinard,et al. Optimal Image Watermarking Algorithm Based on LWT-SVD via Multi-objective Ant Colony Optimization , 2011, J. Inf. Hiding Multim. Signal Process..
[14] Jing-Ming Guo,et al. Security attacks on the wavelet transform and singular value decomposition image watermarking , 2013, 2013 IEEE International Symposium on Consumer Electronics (ISCE).
[15] Saeid Fazli,et al. A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks , 2016 .
[16] Min Wang,et al. Feature-Based Image Watermarking Algorithm Using SVD and APBT for Copyright Protection , 2017, Future Internet.
[17] Ralf Steinmetz,et al. Content-based digital signature for motion pictures authentication and content-fragile watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[18] F. Liu,et al. Blind Watermarking Scheme based on U matrix Through QSVD Transformation , 2015 .
[19] Chin-Chen Chang,et al. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery , 2008, Pattern Recognit..
[20] Rui Sun,et al. A SVD- and quantization based semi-fragile watermarking technique for image authentication , 2002, 6th International Conference on Signal Processing, 2002..
[21] Neha Narula,et al. Comparative Analysis of DWT and DWT-SVD Watermarking Techniques in RGB Images , 2015 .
[22] Millie Pant,et al. PSO Optimized and Secured Watermarking Scheme Based on DWT and SVD , 2015, SocProS.
[23] Chin-Chen Chang,et al. A Robust and Removable Watermarking Scheme Using Singular Value Decomposition , 2016, KSII Trans. Internet Inf. Syst..
[24] Aboul Ella Hassanien,et al. An effective SVD-based image tampering detection and self-recovery using active watermarking , 2014, Signal Process. Image Commun..
[25] Yugang Niu,et al. A blind dual color images watermarking based on singular value decomposition , 2013, Appl. Math. Comput..
[26] G. C. Langelaar,et al. Watermarking digital image and video data , 2000 .
[27] Wen-Chuan Wu,et al. SVD-based self-embedding image authentication scheme using quick response code features , 2016, J. Vis. Commun. Image Represent..
[28] R. Curto,et al. Weyl's Theorem, a‐Weyl's Theorem, and Local Spectral Theory , 2002, math/0207064.
[29] Hsien-Chu Wu,et al. A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques , 2006, ICCSA.
[30] Tingwei Quan,et al. A robust digital watermarking algorithm based on framelet and SVD , 2015, International Symposium on Multispectral Image Processing and Pattern Recognition.
[31] Taha H. Rassem,et al. Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics , 2016, IET Image Process..
[32] Shing-Tai Pan,et al. An SVD-based watermarking scheme using improved micro-genetic algorithm , 2009, 2009 IEEE International Conference on Fuzzy Systems.
[33] Tieniu Tan,et al. An SVD-based watermarking scheme for protecting rightful ownership , 2002, IEEE Trans. Multim..
[34] Nasir D. Memon,et al. Cryptanalysis of the Yeung - Mintzer fragile watermarking technique , 2002, J. Electronic Imaging.
[35] Millie Pant,et al. Robust and false positive free watermarking in IWT domain using SVD and ABC , 2016, Eng. Appl. Artif. Intell..
[36] Ahmed H. Tewfik,et al. A SVD-Based Fragile Watermarking Scheme for Image Authentication , 2002, IWDW.
[37] Dharmapal Dronacharya Doye,et al. Discrete Wavelet Transform and a Singular Value Decomposition Technique for Watermarking Based on an Adaptive Fuzzy Inference System , 2017, J. Inf. Process. Syst..
[38] Po-Whei Huang,et al. A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..
[39] Xing Xin,et al. A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization , 2015, J. Vis. Commun. Image Represent..
[40] Xiao Zhou,et al. Fragile Watermarking for Image Authentication Using the Characteristic of SVD , 2017, Algorithms.
[41] Zhen Li,et al. A new blind robust image watermarking scheme in SVD-DCT composite domain , 2011, 2011 18th IEEE International Conference on Image Processing.
[42] Der-Chyuan Lou,et al. Fault resilient and compression tolerant digital signature for image authentication , 2000, IEEE Trans. Consumer Electron..
[43] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.