Table 2 Summary of employed methods and respective objectives.
From: Convolutional neural network and wavelet composite against geometric attacks a watermarking approach
Employed schemes | Description |
---|---|
Multiple watermarking | Reduced storage and bandwidth during transmission, which enhances the security and computational complexity |
Transform domain (DWT + SVD) | Better robustness than the spatial domain |
Arithmetic coding + RLC | Compressing the payload, in turn, enhances the imperceptibility. |
Selective encryption | Enhances the security |
CNN | Improves restoration image quality against channel noise |