Methodology of Spread-Spectrum Image Steganography
暂无分享,去创建一个
[1] Edward J. Delp,et al. A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[2] Jong-Sen Lee,et al. Digital Image Enhancement and Noise Filtering by Use of Local Statistics , 1980, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[3] Anil K. Jain. Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.
[4] Ingemar J. Cox,et al. Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[5] Martin Bossert,et al. Hard- and soft-decision decoding beyond the half minimum distance---An algorithm for linear codes , 1986, IEEE Trans. Inf. Theory.
[6] D. Kahn. The codebreakers : the story of secret writing , 1968 .
[7] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[8] Alexander A. Sawchuk,et al. Adaptive Noise Smoothing Filter for Images with Signal-Dependent Noise , 1985, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[9] Bin Zhu,et al. Robust data hiding for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.
[10] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[11] C. T. Retter. Decoding binary expansions of low-rate Reed-Solomon codes far beyond the BCH bound , 1995, Proceedings of 1995 IEEE International Symposium on Information Theory.
[12] Jorge Herbert de Lira,et al. Two-Dimensional Signal and Image Processing , 1989 .
[13] Joshua R. Smith,et al. Modulation and Information Hiding in Images , 1996, Information Hiding.
[14] Bernd Girod,et al. Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.
[15] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[16] K. Tanaka,et al. Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.
[17] Ahmed H. Tewfik,et al. Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.