An algorithm by adopting private and public watermark methodology is proposed where the characteristic between the original image and the embedding watermark with visible content is utilized to form a two-stage verification process: secret-open watermarking. Performance analysis shows that the design scheme provides sufficient ownership right verification mechanism and strong robustness under attack.
|Number of pages||4|
|Journal||International Journal of Computer Applications in Technology|
|State||Published - 10 May 2004|
- Digital watermarking