K Ratakonda, R Dugad, N Ahuja - … Processing, ICIP. Part 2 (of 3), 1998 - experts.illinois.edu
In recent literature many strategies for attacking and subverting a watermark have been
presented. Such attacks suggest that the ability to embed non-erasable watermarks does not …