Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes.
Patrick BasGwenaël J. DoërrPublished in: MM&Sec (2008)
Keyphrases
- digital images
- watermarking scheme
- copyright protection
- digital watermark
- jpeg compression
- robust watermarking scheme
- optimal solution
- fragile watermarking scheme
- forensic analysis
- dynamic programming
- watermarking algorithm
- reverse engineering
- image processing
- low complexity
- digital watermarking
- image authentication
- coding scheme
- multiresolution
- tampering detection