In this paper we present an attack to fixed depth image watermarks. The attack is based on histogram analysis of a watermarked image. With this attack, the watermark can often be reconstructed from just a few images, without using the detector.
CITATION STYLE
Maes, M. (1998). Twin peaks: The histogram attack to fixed depth image watermarks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1525, pp. 290–305). Springer Verlag. https://doi.org/10.1007/3-540-49380-8_20
Mendeley helps you to discover research relevant for your work.