Robust copyright marking using Weibull distribution
暂无分享,去创建一个
Suresh Rai | Anand Mohan | Harsh Vikram Singh | Surya Pal Singh | S. Rai | A. Mohan | H. Singh | Surya Pal Singh
[1] Jerry D. Gibson,et al. Distributions of the Two-Dimensional DCT Coefficients for Images , 1983, IEEE Trans. Commun..
[2] Yong-Huai Huang,et al. Hiding digital watermarks using multiresolution wavelet transform , 2001, IEEE Trans. Ind. Electron..
[3] John Langford,et al. Provably Secure Steganography , 2002, IEEE Transactions on Computers.
[4] Motoi Iwata,et al. A Digital Image Watermarking Scheme Withstanding Malicious Attacks , 2000 .
[5] Yong Liang Guan,et al. An objective comparison between spatial and DCT watermarking schemes for MPEG video , 2001, Proceedings International Conference on Information Technology: Coding and Computing.
[6] Edward J. Delp,et al. A WATERMARKING TECHNIQUE FOR DIGITAL IMAGERY: FURTHER STUDIES , 2001 .
[7] Fernando Pérez-González,et al. DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..
[8] Ronitt Rubinfeld,et al. Testing that distributions are close , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[9] Xiangyang Wang,et al. A robust digital audio watermarking based on statistics characteristics , 2009, Pattern Recognit..
[10] K A Birney,et al. On the modeling of DCT and subband image data for compression , 1995, IEEE Trans. Image Process..
[11] Ning Liu,et al. Statistically Secure Digital Image Data Hiding , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.
[12] B. M. Hill,et al. A Simple General Approach to Inference About the Tail of a Distribution , 1975 .
[13] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[14] H. Singh,et al. Parallelism for the faster implementation of the K-L transform for image compression , 1993, Pattern Recognit. Lett..
[15] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[16] Ingemar J. Cox,et al. Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.
[17] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[18] Mokshay M. Madiman,et al. Generalized Entropy Power Inequalities and Monotonicity Properties of Information , 2006, IEEE Transactions on Information Theory.
[19] Bülent Sankur,et al. Robust Scaling-Based Image Watermarking Using Maximum-Likelihood Decoder With Optimum Strength Factor , 2009, IEEE Transactions on Multimedia.
[20] Jue Wang,et al. A region and data hiding based error concealment scheme for images , 2001, IEEE Trans. Consumer Electron..
[21] Panagiotis Tsakalides,et al. Hidden messages in heavy-tails: DCT-domain watermark detection using alpha-stable models , 2005, IEEE Transactions on Multimedia.
[22] Bin Zhu,et al. Robust data hiding for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.
[23] Meng Joo Er,et al. Illumination compensation and normalization for robust face recognition using discrete cosine transform in logarithm domain , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[24] Nariman Farvardin,et al. Subband image coding using entropy-coded quantization over noisy channels , 1990, International Conference on Acoustics, Speech, and Signal Processing.
[25] Edward J. Delp,et al. A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[26] Frank Y. Shih,et al. Genetic algorithm based methodology for breaking the steganalytic systems , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[27] Daniel P. W. Ellis,et al. Evaluation of Distance Measures Between Gaussian Mixture Models of MFCCs , 2007, ISMIR.
[28] Bo Tao,et al. Adaptive watermarking in the DCT domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.