A survey on watermarking application scenarios and related attacks.
Athanasios NikolaidisSofia TsekeridouAnastasios TefasVassilios SolachidisPublished in: ICIP (3) (2001)
Keyphrases
- application scenarios
- watermarking scheme
- watermarking algorithm
- application domains
- digital image watermarking
- digital watermarking
- image watermarking
- real life
- digital images
- watermarking method
- countermeasures
- watermarking technique
- blind watermarking
- data sets
- data mining approaches
- experimental study
- data points
- real world