Login / Signup
Image authentication and tamper detection using two complementary watermarks.
Xiaojun Qi
Xing Xin
Ran Chang
Published in:
ICIP (2009)
Keyphrases
</>
image authentication
tamper detection
watermarking scheme
public key
semi fragile watermarking
digital watermarking
jpeg compression
copyright protection
image content
watermarking algorithm
digital images
authentication scheme
lossy compression