{"title":"Evaluation based on invisible watermarking system","authors":"Daoshun Wang, Jinghong Liang, Lei Zhang, Yiqi Dai","doi":"10.1117/12.502349","DOIUrl":null,"url":null,"abstract":"In this paper we introduce steganalysis and present three detection types. By the comparison of several watermark benchmark tools, which are Stirmark, Checkmark and Optimark, we discuss the validity of watermarking system, and propose a basic condition and outline to evaluate the validity of image watermarking system.","PeriodicalId":282161,"journal":{"name":"SPIE ITCom","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"SPIE ITCom","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.502349","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In this paper we introduce steganalysis and present three detection types. By the comparison of several watermark benchmark tools, which are Stirmark, Checkmark and Optimark, we discuss the validity of watermarking system, and propose a basic condition and outline to evaluate the validity of image watermarking system.