Steganography and steganalysis
Key words: steganalysis, theoretical limits, moments, stegowall
Steganography and steganalysis
Key words: steganalysis, theoretical limits, moments, stegowall
Robust watermarking for copyright protection
Robust watermarking, Stirmark score, random banding attack, benchmarking
Content authentication and tamper proofing based data hiding
Watermarking attacks and benchmarking
Text watermarking
Key words: text shape modulation, vector graphics, position modulation
Content fingerprinting
Key words: information-theoretic limits, performance, random projections, reliable bits, fast decoding
Active Content Fingerprinting
Privacy preserving search and authentication
Visual scrambling robust to distortions