Data Hiding I
Data Hiding II
Visit My Account to manage your email alerts.
Low-bit-rate video watermarking using temporally extended differential energy watermarking (DEW) algorithm
Application of invisible image watermarks to produce remotely printed, duplication-resistant, and demonstrably authentic documents
Review on attacks, problems, and weaknesses of digital watermarking and the pixel reallocation attack
Comparative performance of watermarking schemes using M-ary modulation with binary schemes employing error correction coding