An algorithm by adopting private and public watermark methodology is proposed where the characteristic between the original image and the embedding watermark with visible content is utilized to form a two-stage verification process: Secret-open watermarking. Performance analysis shows that the design scheme provides sufficient ownership right verification mechanism and strong robustness under attack.
|Number of pages||4|
|Journal||International Journal of Computer Applications in Technology|
|State||Published - 1 Jan 2004|
- Digital watermarking