Modelling attacks on self-authentication watermarking.
Hussain NyeemWageeh W. BolesColin BoydPublished in: Multim. Tools Appl. (2016)
Keyphrases
- digital watermarking
- watermarking scheme
- image authentication
- semi fragile watermarking
- fragile watermarking
- watermarking algorithm
- watermarking technique
- watermarking method
- image watermarking
- copyright protection
- digital images
- watermark embedding
- digital watermark
- security mechanisms
- jpeg compression
- spread spectrum
- digital image watermarking
- blind watermarking
- countermeasures
- watermark detection
- watermark extraction
- error correction
- geometric attacks
- image watermarking scheme
- video watermarking
- user authentication
- information hiding
- data hiding
- wavelet domain
- elliptic curve cryptography
- data encryption
- biometric authentication
- discrete wavelet transform