Twin peaks: The histogram attack to fixed depth image watermarks

27Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper we present an attack to fixed depth image watermarks. The attack is based on histogram analysis of a watermarked image. With this attack, the watermark can often be reconstructed from just a few images, without using the detector.

Cite

CITATION STYLE

APA

Maes, M. (1998). Twin peaks: The histogram attack to fixed depth image watermarks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1525, pp. 290–305). Springer Verlag. https://doi.org/10.1007/3-540-49380-8_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free