Performance Analysis of Dither Modulation against Composite Attacks.
Xinshan ZhuYanming ChenPublished in: J. Inf. Hiding Multim. Signal Process. (2012)
Keyphrases
- countermeasures
- quantization index modulation
- watermarking method
- watermarking technique
- digital watermarking
- watermark embedding
- watermarking scheme
- data mining
- malicious users
- security protocols
- security risks
- chosen plaintext
- inverse halftoning
- malicious attacks
- traffic analysis
- security threats
- computer security
- data hiding
- watermarking algorithm
- digital images
- wavelet transform