Semi-Fragile Watermarking with Applying Game-Theoretic Cournot Model
碩士 === 國立清華大學 === 資訊系統與應用研究所 === 98 === In the rapidly development of the internet, the image content will be more easily be copied or tampered while delivering trough the net. The paper chooses the Semi-fragile watermarking technique. Semi-fragile watermarking can resist legal manipulations such as...
Main Authors: | Huang, Ling-Hsuan, 黃齡萱 |
---|---|
Other Authors: | Chang, Long-Wen |
Format: | Others |
Language: | en_US |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/49402813046411608761 |
Similar Items
-
Game-theoretic Analysis of Semi-fragile Watermarking for Image Authentication and Tamper Localization
by: Tang, Yu-Rou, et al.
Published: (2010) -
The Test on Semi-Fragile Watermarking for Authenticating Images
by: Tzu-Ya Huang, et al.
Published: (2006) -
Semi-fragile digital audio watermarking
by: Tu, Ronghui
Published: (2013) -
The Study on Semi-Fragile Watermarking for Authenticating Compressed Image Data
by: Chien-Hua Huang, et al.
Published: (2004) -
Research On The Recovery of Semi-Fragile Watermarked Image
by: Ming-Hong Sun, et al.
Published: (2006)