Abstract
An algorithm by adopting private and public watermark methodology is proposed where the characteristic between the original image and the embedding watermark with visible content is utilized to form a two-stage verification process: Secret-open watermarking. Performance analysis shows that the design scheme provides sufficient ownership right verification mechanism and strong robustness under attack.
Original language | English |
---|---|
Pages (from-to) | 39-42 |
Number of pages | 4 |
Journal | International Journal of Computer Applications in Technology |
Volume | 19 |
Issue number | 1 |
DOIs | |
Publication status | Published - 2004 |
All Science Journal Classification (ASJC) codes
- Software
- Information Systems
- Computer Science Applications
- Computer Networks and Communications
- Industrial and Manufacturing Engineering
- Electrical and Electronic Engineering