An algorithm by adopting private and public watermark methodology is proposed where the characteristic between the original image and the embedding watermark with visible content is utilized to form a two-stage verification process: Secret-open watermarking. Performance analysis shows that the design scheme provides sufficient ownership right verification mechanism and strong robustness under attack.
|頁（從 - 到）||39-42|
|期刊||International Journal of Computer Applications in Technology|
|出版狀態||Published - 1 一月 2004|