Login / Signup
Is asymmetric watermarking necessary or sufficient?
Matt L. Miller
Published in:
EUSIPCO (2002)
Keyphrases
</>
digital images
spread spectrum
image authentication
watermarking scheme
data hiding
copyright protection
digital watermarking
image watermarking
case study
watermarking algorithm
image fidelity