Improving Robustness of ISS-watermarking against malicious attack.
Yousof ErfaniShahrokh GhaemmaghamiPublished in: International Conference on Computational Intelligence (2004)
Keyphrases
- malicious users
- malicious attacks
- digital image watermarking
- geometric attacks
- digital image watermarking scheme
- detecting malicious
- malicious activities
- copyright protection
- normal traffic
- digital watermark
- digital images
- malicious behavior
- watermark embedding
- spread spectrum
- secret key
- countermeasures
- watermarking scheme
- denial of service attacks
- jpeg compression
- computational efficiency
- wavelet transform