Robust Watermarking
- Design to survive various system processing and malicious attacks
- Primary application: copyright protection
- Design to detect any modifications (unintentional and malicious attacks) to the watermarked images
- Primary application: content authentication
- Design to survive system processes (such as JPEG and Wavelet compression) and detect malicious attacks (such as cut and paste) in watermarked image
- Primary application: selective content authentication
Robust Watermarking
- Conventional Transforms
- Feature Extraction for Watermark Embedding and Retrieval
- Image-in-Image Watermarking
- Character-in-Image Watermarking
- Benchmarking – Stirmark and Checkmark
No comments:
Post a Comment