Scale estimation in two-band filter attacks on QIM watermarks.
Jinshen WangIvo D. ShterevReginald L. LagendijkPublished in: Security, Steganography, and Watermarking of Multimedia Contents (2006)
Keyphrases
- watermarking algorithm
- watermarking scheme
- watermarking technique
- signal processing
- jpeg compression
- digital images
- watermarking method
- data hiding
- image watermarking
- semi fragile watermarking
- digital watermarking
- frequency response
- iir filters
- spread spectrum
- copyright protection
- lossy compression
- information hiding
- wavelet domain
- digital watermark
- error correction
- countermeasures
- dct coefficients
- spam filters
- high pass
- wavelet transform