This site uses cookies to deliver our services and to ensure you get the best experience. By continuing to use this site, you consent to our use of cookies and acknowledge that you have read and understand our Privacy Policy, Cookie Policy, and Terms
In this paper, we propose a print-scan resilient watermarking method which takes advantage of multiple watermarking. The method presented here consists of three separate watermarks...
Aiming at detecting secret information hidden in a given image using steganographic tools, steganalysis has been of interest since the end of 1990’s. In particular, universal ste...
Abstract. Scaling attacks are well-known to be some of the most harmful strategies against quantization-based watermarking methods, as they desynchronize the decoder, completely ru...
The compositing of two or more people into a single image is a common form of manipulation. We describe how such composites can be detected by estimating a camera’s intrinsic par...
Abstract. In this paper, we propose a practical real-time video watermarking scheme for downscaling attack. We embed watermark into an arbitrary size of a host video and extract it...
Kyung-Su Kim, Dong-Hyuck Im, Young-Ho Suh, Heung-K...