Our Activities

(1) Develop criteria for evaluating robust watermarking schemes
(2) Disclose these criteria, and call for schemes that meet them
(3) Evaluate schemes on the basis of the criteria and identify those that meet them
(4) Call for attacks on the identified schemes
(5) Evaluate the effectiveness of the attacks




Technical Group

 Data hiding techniques for images and movies

 Data hiding techniques for audio

   Copyright @ 2011-2019 IHC Committee All Rights Reserved.