Show simple item record

dc.contributor.authorMareen, Hannes
dc.contributor.authorDe Praeter, Johan
dc.contributor.authorVan Wallendael, Glenn
dc.contributor.authorLambert, Peter
dc.date.accessioned2021-10-25T22:57:41Z
dc.date.available2021-10-25T22:57:41Z
dc.date.issued2018-01
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/31286
dc.sourceIIOimport
dc.titleTraitor tracing after visible watermark removal
dc.typeProceedings paper
dc.contributor.imecauthorMareen, Hannes
dc.contributor.imecauthorDe Praeter, Johan
dc.contributor.imecauthorVan Wallendael, Glenn
dc.contributor.imecauthorLambert, Peter
dc.contributor.orcidimecMareen, Hannes::0000-0002-0660-3190
dc.contributor.orcidimecVan Wallendael, Glenn::0000-0001-9530-3466
dc.contributor.orcidimecLambert, Peter::0000-0001-5313-4158
dc.date.embargo9999-12-31
dc.source.peerreviewyes
dc.source.beginpage110
dc.source.endpage123
dc.source.conferenceDigital Forensics and Watermarking, Proceedings of IWDW 2018.
dc.source.conferencedate20/10/2018
dc.source.conferencelocationJeju Island Korea
dc.identifier.urlhttps://doi.org/10.1007/978-3-030-11389-6_9
imec.availabilityPublished - open access
imec.internalnotesLecture Notes in Computer Science; Vol. LNCS 11378


Files in this item

Thumbnail

This item appears in the following collection(s)

Show simple item record