摘要 |
Examples of encoding and decoding a watermark for a digital image and to using the watermark for authenticating the digital image are disclosed. The examples may include embedding a chaotic watermark in a digital image and using parameters associated with source and capture information for the digital image to both generate the chaotic watermark and to authenticate the digital image.
|