Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes | IEEE Journals & Magazine | IEEE Xplore