KA Navas, MC Ajay, M Lekshmi… - … and middleware and …, 2008 - ieeexplore.ieee.org
… Various attacks have been modeled on the watermarked image and in all cases, the …
The various attacks which were used are JPEG compression, Gaussian low pass filtering, …