Digital Image Watermarking for Malicious Attack.
Wei-Hung LinYuh-Rau WangShi-Jinn HorngTzong-Wann KaoPublished in: ICA3PP (2009)
Keyphrases
- digital image watermarking
- digital watermark
- malicious users
- malicious attacks
- detecting malicious
- malicious activities
- normal traffic
- geometric attacks
- digital watermarking
- malicious nodes
- image processing operations
- watermarking algorithm
- jpeg compression
- image compression
- video sequences
- copyright protection
- noisy images