A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks

S Fazli, M Moeini - Optik, 2016 - Elsevier
… (2) robustness against various image manipulations called attack. The main attacks can be
categorized as: (1) signal processing like JPEG compression, various types of noise, filtering, …

… -SVD based watermarking schemes with their performance enhancement using Jaya and Particle swarm optimization and comparison of results under various attacks

D Awasthi, VK Srivastava - Multimedia Tools and Applications, 2022 - Springer
… and imperceptibility in the face of most attacks, therefore it is a suitable technique for … DWT)
namely DWT-DCT-SVD and lifting wavelet transform (LWT) based scheme namely LWT-DCT

Digital image watermarking based on DWT-DCT: Evaluate for a new embedding algorithm

A Akter, MA Ullah - … on informatics, electronics & vision (ICIEV …, 2014 - ieeexplore.ieee.org
… with Cox’s algorithm, the performances of NEA will compare among other algorithms like
Gaussian sequence, image fusion, nonlinear quantization embedding with various attacking

Combined DWT-DCT based digital image watermarking technique for copyright protection

K Deb, MS Al-Seraj, MM Hoque… - 2012 7th International …, 2012 - ieeexplore.ieee.org
… frequency band of each DCT block of selected DWT sub-band. … similar approach by DCT
based approach and DWT based … quality and robustness under various attacks such as JPEG …

Dwt-dct-svd based watermarking

KA Navas, MC Ajay, M Lekshmi… - … and middleware and …, 2008 - ieeexplore.ieee.org
Various attacks have been modeled on the watermarked image and in all cases, the …
The various attacks which were used are JPEG compression, Gaussian low pass filtering, …

Combined DWTDCT-based video watermarking algorithm using Arnold transform technique

AM Joshi, S Gupta, M Girdhar, P Agarwal… - Proceedings of the …, 2017 - Springer
… (DCT) with the concept of inserting an assorted watermark in the video. The algorithms
were … performance against various noise-based attacks. Agarwal et al. [7] explained DWTDCT-…

[PDF][PDF] A combined dwt and dct watermarking scheme optimized using genetic algorithm

C Mingzhi, L Yan, Z Yajian, L Min - Journal of multimedia, 2013 - Citeseer
Various attacks used to test the robustness of the watermarking scheme proposed in this
paper are JPEG compression (with different quality factors), median filter, Gaussian filter, …

Efficient Hybrid Blind Watermarking in DWTDCT‐SVD with Dual Biometric Features for Images

B Mokashi, VS Bhat, JD Pujari… - Contrast Media & …, 2022 - Wiley Online Library
… against attacks. Here, singular values of watermark1 (fingerprint) and watermark2 (signature)
are obtained by applying DWT-DCT-… resilient to various attacks in the watermarked image. …

A novel synchronization invariant audio watermarking scheme based on DWT and DCT

XY Wang, H Zhao - IEEE Transactions on signal processing, 2006 - ieeexplore.ieee.org
… Tables II–IV summarize the proposed watermark detection results comparing with that of
scheme [12] against various attacks. In addition, the detection results of DCT and DWT are …

An improved image watermarking by modifying selected DWT-DCT coefficients

F Ernawan, D Ariatmanto, A Firdaus - IEEE Access, 2021 - ieeexplore.ieee.org
… mark can be destroyed under various attacks [7]. Image watermarking based on frequency
domain able to achieve high resistance to various attacks [8]. A scheme by Ariatmanto and …