… used during embedding and extraction of a watermark, such that … watermarked with different security keys, each watermark can be extracted reliably in turn with the respective key using …
… identification and data capture techniques via the use of hard … based method that embeds a watermark into the high-… image sufficiently good for correct message extraction, the size …