The compositing of two or more people into a single image is a common form of manipulation. We describe how such composites can be detected by estimating a camera’s intrinsic par...
Abstract. Scaling attacks are well-known to be some of the most harmful strategies against quantization-based watermarking methods, as they desynchronize the decoder, completely ru...
In this paper, we propose a print-scan resilient watermarking method which takes advantage of multiple watermarking. The method presented here consists of three separate watermarks...