@inproceedings{513295b70f144d3aa56e56fff23ea278,
title = "Highly robust image watermarking using complementary modulations",
abstract = "In this paper, a novel image protection scheme using “complementary modulations” is proposed. In order to satisfy the robustness requirement, two watermarks are embedded into a host image to play complementary roles so that at least one watermark survives any attack. Statistical analysis is conducted to derive the lower bound of the worst likelihood that the better watermark (of the two) can be extracted. With this “high” lower bound, it is ensured that a “better” extracted watermark is always obtained. Experimental results demonstrate that our watermarking scheme is remarkably effective in resisting various attacks.",
author = "Lu, {Chun Shien} and Liao, {Hong Yuan Mark} and Shih-Kun Huang and Sze, {Chwen Jye}",
year = "1999",
month = jan,
day = "1",
doi = "10.1007/3-540-47790-X_12",
language = "English",
isbn = "3540666958",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "136--153",
editor = "Masahiro Mambo and Yuliang Zheng",
booktitle = "Information Security - 2nd International Workshop, ISW 1999, Proceedings",
address = "Germany",
note = "2nd International Information Security Workshop, ISW 1999 ; Conference date: 06-11-1999 Through 07-11-1999",
}