Proceedings. Student Conference on Research and Development, 2003. SCORED 2003.
DOI: 10.1109/scored.2003.1459727
|View full text |Cite
|
Sign up to set email alerts
|

A review of image watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…But invisible watermark images are not easy to removable from the covered image. Multiple images in steganography are one of the techniques of embedding two secret images into one cover image (Wan Adnan et al , 2003). This type of technique of embedding images or data is very useful in many applications for security purposes.…”
Section: Introductionmentioning
confidence: 99%
“…But invisible watermark images are not easy to removable from the covered image. Multiple images in steganography are one of the techniques of embedding two secret images into one cover image (Wan Adnan et al , 2003). This type of technique of embedding images or data is very useful in many applications for security purposes.…”
Section: Introductionmentioning
confidence: 99%
“…Conventional cryptographic systems allow only valid key holders to access the encrypted data and therefore provide limited protection against data piracy in environments where publisher is confronted with unauthorized reproduction of information. A digital watermark on the other hand complements cryptographic process [10], [11], [12], [13]. It is permanently embedded in the data and even after any decryption process it remains there.…”
Section: Introductionmentioning
confidence: 99%