Watermarking Scheme Capable of Resisting Sensitivity Attack
暂无分享,去创建一个
[1] Fernando Pérez-González,et al. The Return of the Sensitivity Attack , 2005, IWDW.
[2] Ilaria Venturini. Oracle Attacks and Covert Channels , 2005, IWDW.
[3] Adrian S. Lewis,et al. Image compression using the 2-D wavelet transform , 1992, IEEE Trans. Image Process..
[4] Jean-Paul M. G. Linnartz,et al. Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[5] Mohamed F. Mansour,et al. LMS-based attack on watermark public detectors , 2002, Proceedings. International Conference on Image Processing.
[6] S. Pereira,et al. Attacks on digital watermarks: classification, estimation based attacks, and benchmarks , 2001, IEEE Communications Magazine.
[7] Jean-Paul M. G. Linnartz,et al. Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.
[8] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[9] Jean-Paul M. G. Linnartz,et al. Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..