A secure code for recipient watermarking against conspiracy attacks by all users.
Hajime WatanabeTadao KasamiPublished in: ICICS (1997)
Keyphrases
- watermarking scheme
- information leakage
- unauthorized access
- watermarking algorithm
- watermarking technique
- digital image watermarking
- secure routing
- image watermarking
- cryptographic protocols
- user interface
- digital images
- personal information
- chosen plaintext
- watermark embedding
- copyright protection
- security protocols
- access control
- source code
- spread spectrum
- image authentication
- watermarking method
- security requirements
- end users