Login / Signup
A survey on watermarking application scenarios and related attacks.
Athanasios Nikolaidis
Sofia Tsekeridou
Anastasios Tefas
Vassilios Solachidis
Published in:
ICIP (3) (2001)
Keyphrases
</>
application scenarios
watermarking scheme
watermarking algorithm
application domains
digital image watermarking
digital watermarking
image watermarking
real life
digital images
watermarking method
countermeasures
watermarking technique
blind watermarking
data sets
data mining approaches
experimental study
data points
real world