Login / Signup
Image authentication and tamperproofing for noisy channels.
Charles G. Boncelet Jr.
Published in:
ICIP (1) (2005)
Keyphrases
</>
image authentication
public key
jpeg compression
watermarking scheme
authentication scheme
image content
digital watermarking
semi fragile watermarking
watermarking algorithm
copyright protection
discrete wavelet transform
computational complexity
bit rate
error correction