Login / Signup
IP Traceback Using Digital Watermark and Honeypot.
Zaiyao Yi
Liuqing Pan
Xinmei Wang
Chen Huang
Benxiong Huang
Published in:
UIC (2008)
Keyphrases
</>
digital watermark
digital watermarking
watermarking scheme
jpeg compression
copyright protection
image processing operations
geometric distortions
image watermarking
metadata
ddos attacks
lossy compression
image data
lossless compression