no code implementations • 10 Mar 2022 • Sulong Ge, Zhihua Xia, Yao Tong, Jian Weng, Jianan Liu
By applying this scheme, when the watermarked image is displayed on the screen and captured by a camera, the watermark can be still extracted from the captured photographs.
no code implementations • 26 Feb 2022 • Sulong Ge, Zhihua Xia, Jianwei Fei, Xingming Sun, Jian Weng
Then the identity can be extracted to prove the copyright from the watermarked carrier even after suffering various attacks.