Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications.
Scott CraverNasir D. MemonBoon-Lock YeoMinerva M. YeungPublished in: IEEE J. Sel. Areas Commun. (1998)
Keyphrases
- watermarking technique
- copyright protection
- digital watermarking
- digital watermark
- digital images
- watermarking scheme
- watermarking algorithm
- data hiding
- image watermarking
- digital image watermarking
- compressed domain
- digital content
- geometric distortions
- watermarking method
- watermark detection
- robust watermarking
- image authentication
- lossy compression
- jpeg compression
- spread spectrum
- secret information
- multimedia content
- information hiding
- image processing
- watermark extraction
- video watermarking