Login / Signup

The good, the bad, and the ugly: three different approaches to break their watermarking system.

Gaëtan Le GuelvouitTeddy FuronFrançois Cayre
Published in: Security, Steganography, and Watermarking of Multimedia Contents (2007)
Keyphrases
  • strengths and weaknesses
  • digital images
  • image processing
  • data mining techniques