Login / Signup
The good, the bad, and the ugly: three different approaches to break their watermarking system.
Gaëtan Le Guelvouit
Teddy Furon
François Cayre
Published in:
Security, Steganography, and Watermarking of Multimedia Contents (2007)
Keyphrases
</>
strengths and weaknesses
digital images
image processing
data mining techniques