Digital image watermarking techniques: a review

M Begum, MS Uddin - Information, 2020 - mdpi.com
Digital image authentication is an extremely significant concern for the digital revolution, as it
is easy to tamper with any image. In the last few decades, it has been an urgent concern for …

[HTML][HTML] Secure watermarking schemes and their approaches in the IoT technology: an overview

R Wazirali, R Ahmad, A Al-Amayreh, M Al-Madi… - Electronics, 2021 - mdpi.com
Information security is considered one of the most important issues in various infrastructures
related to the field of data communication where most of the modern studies focus on finding …

Tree-rings watermarks: Invisible fingerprints for diffusion images

Y Wen, J Kirchenbauer, J Gei**… - Advances in Neural …, 2023 - proceedings.neurips.cc
Watermarking the outputs of generative models is a crucial technique for tracing copyright
and preventing potential harm from AI-generated content. In this paper, we introduce a novel …

Tree-ring watermarks: Fingerprints for diffusion images that are invisible and robust

Y Wen, J Kirchenbauer, J Gei**… - arxiv preprint arxiv …, 2023 - arxiv.org
Watermarking the outputs of generative models is a crucial technique for tracing copyright
and preventing potential harm from AI-generated content. In this paper, we introduce a novel …

[HTML][HTML] A Hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition

M Begum, J Ferdush, MS Uddin - … of King Saud University-Computer and …, 2022 - Elsevier
Digital data sharing is increased day by day due to the rapid access of the Internet by mass
people. Multimedia, for example text, image, video, and audio can be easily accessed by …

A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine

A Zear, AK Singh, P Kumar - Multimedia tools and applications, 2018 - Springer
In this paper, an algorithm for multiple watermarking based on discrete wavelet transforms
(DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) has been …

Survey of robust and imperceptible watermarking

N Agarwal, AK Singh, PK Singh - Multimedia Tools and Applications, 2019 - Springer
Robustness, imperceptibility and embedding capacity are the preliminary requirements of
any watermarking technique. However, research concluded that these requirements are …

Robust and blind image watermarking in DCT domain using inter-block coefficient correlation

HJ Ko, CT Huang, G Horng, W Shiuh-Jeng - Information Sciences, 2020 - Elsevier
This study presents a robust and transparent watermarking method that exploits block-based
discrete cosine transform (DCT) coefficient modification. The difference in the DCT …

[KNIHA][B] Digital watermarking and steganography: fundamentals and techniques

FY Shih - 2017 - taylorfrancis.com
This book intends to provide a comprehensive overview on different aspects of mechanisms
and techniques for information security. It is written for students, researchers, and …

Block‐based discrete wavelet transform‐singular value decomposition image watermarking scheme using human visual system characteristics

NM Makbol, BE Khoo, TH Rassem - IET Image processing, 2016 - Wiley Online Library
Digital watermarking has been suggested as a way to achieve digital protection. The aim of
digital watermarking is to insert the secret data into the image without significantly affecting …