PlumX Metrics
Embed PlumX Metrics

FRRW: A feature extraction-based robust and reversible watermarking scheme utilizing zernike moments and histogram shifting

Journal of King Saud University - Computer and Information Sciences, ISSN: 1319-1578, Vol: 35, Issue: 8, Page: 101698
2023
  • 4
    Citations
  • 0
    Usage
  • 12
    Captures
  • 1
    Mentions
  • 0
    Social Media
Metric Options:   Counts1 Year3 Year

Metrics Details

  • Citations
    4
    • Citation Indexes
      4
  • Captures
    12
  • Mentions
    1
    • News Mentions
      1
      • News
        1

Most Recent News

Findings from Macau University of Science and Technology Broaden Understanding of Computer Science (FRRW: A feature extraction-based robust and reversible watermarking scheme utilizing zernike moments and histogram shifting)

2023 AUG 31 (NewsRx) -- By a News Reporter-Staff News Editor at Computer News Today -- Research findings on computer science are discussed in a

Article Description

This paper introduces a feature extraction-based approach to ensure both robustness and reversibility of image. Low-order Zernike moments are utilized to embed a robust binary image as a watermark, which is used for information authentication. A reversible watermark is embedded outside the robust watermark regions and is employed for the purpose of restoring the cover image. It uses the combination of histogram shifting and prediction error, which can improve image restoration quality. Steady feature points are extracted in two ways, the speed-up robust features (SURF) algorithm and the oriented fast and rotated brief (ORB) algorithm. After extracting the feature points, the regions are obtained by extending the final selected feature points to embed the watermark. Consequently, the presented watermarking technique combines robust and reversible watermarking which has the ability to enhance the invisibility of the watermark and the clarity of image restoration. It is possible to extract the watermark even after an attack has been made on the watermarked image. Or we can recover the original image with no attacks. The results from the experiments indicate that the suggested method is resilient to geometric deformations, involving scaling and rotation, along with typical signal manipulation attacks, including noise-based attacks.

Provide Feedback

Have ideas for a new metric? Would you like to see something else here?Let us know