Abstract
An algorithm by adopting private and public watermark methodology is proposed where the characteristic between the original image and the embedding watermark with visible content is utilized to form a two-stage verification process: secret-open watermarking. Performance analysis shows that the design scheme provides sufficient ownership right verification mechanism and strong robustness under attack.
Original language | English |
---|---|
Pages (from-to) | 203-206 |
Number of pages | 4 |
Journal | International Journal of Computer Applications in Technology |
Volume | 20 |
Issue number | 4 |
DOIs | |
State | Published - 10 May 2004 |
Keywords
- Authentication
- Digital watermarking
- Verification