Speech and Music (5)
Attacks (5)
Video Techniques (9)
Embedding (7)
Applications (5)
Watermarking protocols for authentication and ownership protection based on timestamps and holograms