How to Compare Image Watermarking Algorithms
DOI10.1007/978-3-642-01757-5_1zbMATH Open1248.68189OpenAlexW1502285655MaRDI QIDQ5325762FDOQ5325762
Authors: Angela Piper, Reihaneh Safavi-Naini
Publication date: 24 July 2009
Published in: Transactions on Data Hiding and Multimedia Security IV (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-01757-5_1
Recommendations
- Attack modelling: towards a second generation watermarking benchmark.
- scientific article; zbMATH DE number 1893224
- A DCT-domain system for robust image watermarking
- A watermarking algorithm for image authentication based on statistical models and directional wavelets
- scientific article; zbMATH DE number 2080676
Problem solving in the context of artificial intelligence (heuristics, search strategies, etc.) (68T20) Data encryption (aspects in computer science) (68P25) Computing methodologies for image processing (68U10)
This page was built for publication: How to Compare Image Watermarking Algorithms
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5325762)