Login / Signup
Watermarking protocols for authentication and ownership protection based on timestamps and holograms.
Jana Dittmann
Martin Steinebach
Lucilla Croce Ferri
Published in:
Security and Watermarking of Multimedia Contents (2002)
Keyphrases
</>
fragile watermarking
image authentication
digital watermarking
authentication protocol
computer generated
key distribution
digital content
copyright protection
authentication scheme
watermarking scheme
security services
trusted third party
digital images
key agreement protocol
user authentication
integrity verification
security protocols
biometric template
information security
fragile watermarking scheme
image watermarking
watermarking algorithm
smart card
spread spectrum
news articles
privacy protection
biometric authentication
jpeg compression
cryptographic protocols
public key
watermarking method
security mechanisms
digital watermark
mutual authentication
hash functions
discrete wavelet transform
watermarking technique