A Survey & Applications of Various Watermarking & Encryption Techniques
暂无分享,去创建一个
[1] Fazidah Othman,et al. Securing cover-file without limitation of hidden data size using computation between cryptography and steganography , 2009 .
[2] S.A.M. Gilani,et al. A Fragile Watermarking Scheme for Color Image Authentication , 2008 .
[3] B. B. Zaidan,et al. Approved Undetectable-Antivirus Steganography for Multimedia Information in PE-File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.
[4] Arup Kumar Pal,et al. A DCT-SVD based robust watermarking scheme for grayscale image , 2012, ICACCI '12.
[5] Vijay Laxmi,et al. Detection attack analysis using partial watermark in DCT domain , 2012, SIN '12.
[6] A. A. Zaidan,et al. New Approach of Hidden Data in the portable Executable File without Change the Size of Carrier File Using Statistical Technique , 2009 .
[7] Anamitra Makur,et al. Watermark based recovery of tampered documents , 2012, ISI-KDD '12.
[8] Suneeta Agarwal,et al. A region specific robust watermarking scheme based on singular value decomposition , 2012, SIN '12.
[9] Omar Zakaria,et al. Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard , 2010, ArXiv.
[10] Anamitra Makur,et al. Tamper-proof image watermarking using self-embedding , 2012, ISI-KDD '12.
[11] Qinyu Zhang,et al. Feature-based watermarking using discrete orthogonal Hahn moment invariants , 2009, FIT.
[12] Mohan S. Kankanhalli,et al. Compressed-encrypted domain JPEG2000 image watermarking , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[13] Ujan Mukhopadhyay,et al. Enhancing the security of digital Video Watermarking using watermark encryption , 2012, CCSEIT '12.
[14] Stephen D. Wolthusen,et al. Techniques and Applications of Digital Watermarking and Content Protection , 2003, Artech House computer security series.
[15] Thomas Stütz,et al. On efficient transparent jpeg2000 encryption , 2007, MM&Sec.
[16] Koichi Harada. Parity enhanced topology based spot area watermarking method for copyright protection of layered 3D triangular mesh data , 2006 .
[17] Stéphane Bounkong. Digital image watermarking , 2004 .
[18] B. B. Zaidan,et al. New System for Secure Cover File of Hidden Data in the Image Page within Executable File Using Statistical Steganography Techniques , 2010, ArXiv.