Evaluation of copyright marking systems
暂无分享,去创建一个
[1] Raymond N. J. Veldhuis. Restoration of lost samples in digital signals , 1992 .
[2] Gabriela Csurka,et al. Template based recovery of Fourier-based watermarks using log-polar and log-log maps , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[3] Gordon W. Braudaway,et al. Results of attacks on a claimed robust digital image watermark , 1998, Electronic Imaging.
[4] Bernd Girod,et al. Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.
[5] Reginald L. Lagendijk,et al. Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[6] Martin Kutter,et al. Watermarking resistance to translation, rotation, and scaling , 1999, Other Conferences.
[7] M. Kutter. Watermaking resisting to translation, rotation, and scaling , 1998 .
[8] Ralf Steinmetz,et al. Multimedia and Security Workshop at ACM Multimedia , 1998 .
[9] Raymond N. J. Veldhuis,et al. Adaptive interpolation of discrete-time signals that can be modeled as autoregressive processes , 1986, IEEE Trans. Acoust. Speech Signal Process..
[10] Jean-Paul M. G. Linnartz,et al. Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.
[11] Thierry Pun,et al. Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..
[12] L Rudolf,et al. Optical Security and Counterfeit Deterrence Techniques III , 1996 .
[13] D. E. Pearson,et al. Frequency mode LR attack operator for digitally watermarked images , 1998 .
[14] Neil A. Dodgson,et al. Quadratic interpolation for image resampling , 1997, IEEE Trans. Image Process..
[15] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[16] Maurice Maes,et al. Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks , 1998, Information Hiding.