Attack characterization for effective watermarking | IEEE Conference Publication | IEEE Xplore