Login / Signup
Image authentication techniques for surveillance applications.
Franco Bartolini
Anastasios Tefas
Mauro Barni
Ioannis Pitas
Published in:
Proc. IEEE (2001)
Keyphrases
</>
image authentication
tamper detection
public key
jpeg compression
watermarking scheme
authentication scheme
semi fragile watermarking
image content
digital watermarking
watermarking algorithm
copyright protection
low cost
wavelet domain