IWDW
15 years 2 months ago
2005 Springer
In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks - a form of web based identity theft. ViWiD is an integrity check m...
IWDW
15 years 2 months ago
2005 Springer
Abstract. In this paper, the security of Dither Modulation Quantization Index Modulation schemes for digital images is analyzed. Both pixel and DCT coefficient quantization schemes...
IWDW
15 years 2 months ago
2005 Springer
In this paper, we propose a robust watermarking method for 3-D triangle surface meshes. Most previous methods based on the wavelet analysis can process only semi-regular meshes. Ou...
IWDW
15 years 2 months ago
2005 Springer
The development of watermarking schemes in the literature is generally guided by a power constraint on the watermark to be embedded into the host. In a steganographic framework the...
IWDW
15 years 2 months ago
2005 Springer
Digital watermarking studies have always been driven by the improvement of robustness. Most of articles of this field deal with this criterion, presenting more and more impressive...
|