Watermarking protocols for authentication and ownership protection based on timestamps and holograms.
Jana DittmannMartin SteinebachLucilla Croce FerriPublished in: Security and Watermarking of Multimedia Contents (2002)
Keyphrases
- fragile watermarking
- image authentication
- digital watermarking
- authentication protocol
- computer generated
- key distribution
- digital content
- copyright protection
- authentication scheme
- watermarking scheme
- security services
- trusted third party
- digital images
- key agreement protocol
- user authentication
- integrity verification
- security protocols
- biometric template
- information security
- fragile watermarking scheme
- image watermarking
- watermarking algorithm
- smart card
- spread spectrum
- news articles
- privacy protection
- biometric authentication
- jpeg compression
- cryptographic protocols
- public key
- watermarking method
- security mechanisms
- digital watermark
- mutual authentication
- hash functions
- discrete wavelet transform
- watermarking technique