106
click to vote
IWDW
15 years 6 months ago
2007 Springer
In this paper, we propose a print-scan resilient watermarking method which takes advantage of multiple watermarking. The method presented here consists of three separate watermarks...
IWDW
15 years 6 months ago
2007 Springer
Aiming at detecting secret information hidden in a given image using steganographic tools, steganalysis has been of interest since the end of 1990’s. In particular, universal ste...
105
click to vote
IWDW
15 years 6 months ago
2007 Springer
The compositing of two or more people into a single image is a common form of manipulation. We describe how such composites can be detected by estimating a camera’s intrinsic par...
IWDW
15 years 6 months ago
2007 Springer IWDW
15 years 6 months ago
2007 Springer
Abstract. In this paper, we propose a practical real-time video watermarking scheme for downscaling attack. We embed watermark into an arbitrary size of a host video and extract it...
|