Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes
暂无分享,去创建一个
[1] Ingemar J. Cox,et al. Trellis coded modulation to improve dirty paper trellis watermarking , 2007, Electronic Imaging.
[2] A. Viterbi. CDMA: Principles of Spread Spectrum Communication , 1995 .
[3] Ingemar J. Cox,et al. Toward a Better Understanding of Dirty Paper Trellis Codes , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[4] Ingemar J. Cox,et al. Applying informed coding and embedding to design a robust high-capacity watermark , 2004, IEEE Transactions on Image Processing.
[5] Ton Kalker,et al. Considerations on watermarking security , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).
[6] C. Fontaine,et al. Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.
[7] Gwenaël J. Doërr,et al. Practical Security Analysis of Dirty Paper Trellis Watermarking , 2007, Information Hiding.
[8] Sviatoslav Voloshynovskiy,et al. Watermark copy attack , 2000, Electronic Imaging.
[9] J. MacQueen. Some methods for classification and analysis of multivariate observations , 1967 .
[10] Fernando Pérez-González,et al. The blind Newton sensitivity attack , 2006, Electronic Imaging.
[11] Ton Kalker,et al. Title: a Security Risk for Publicly Available Watermark Detectors Author: Ton Kalker Conference: Benelux Information Theory Symposium a Security Risk for Publicly Available Watermark Detectors , 1998 .
[12] Fernando Pérez-González,et al. Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis , 2005, Information Hiding.
[13] Teddy Furon,et al. A Constructive and Unifying Framework for Zero-Bit Watermarking , 2006, IEEE Transactions on Information Forensics and Security.
[14] Max H. M. Costa,et al. Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.