153
Voted
IWDW
15 years 11 months ago
2007 Springer
In this paper, we propose a print-scan resilient watermarking method which takes advantage of multiple watermarking. The method presented here consists of three separate watermarks...
138
click to vote
IWDW
15 years 11 months ago
2007 Springer
Aiming at detecting secret information hidden in a given image using steganographic tools, steganalysis has been of interest since the end of 1990’s. In particular, universal ste...
149
click to vote
IWDW
15 years 11 months ago
2007 Springer
The compositing of two or more people into a single image is a common form of manipulation. We describe how such composites can be detected by estimating a camera’s intrinsic par...
104
Voted
IWDW
15 years 11 months ago
2007 Springer 134
click to vote
IWDW
15 years 11 months ago
2007 Springer
Abstract. In this paper, we propose a practical real-time video watermarking scheme for downscaling attack. We embed watermark into an arbitrary size of a host video and extract it...
|