Collusion Attack Resistant Watermarking Scheme for Images using DCT
暂无分享,去创建一个
[1] Ton Kalker,et al. Video watermarking system for broadcast monitoring , 1999, Electronic Imaging.
[2] Ja-Ling Wu,et al. Hidden signatures in images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[3] S. Katzenbeisser,et al. A survey of steganographic techniques , .
[4] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[5] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[6] Jan Biemond,et al. Image and Video Databases: Restoration, Watermarking and Retrieval , 2000 .
[7] Wenjun Zeng,et al. Perceptual watermarking of still images , 1997, Proceedings of First Signal Processing Society Workshop on Multimedia Signal Processing.
[8] Frank Boland,et al. Watermarking digital images for copyright protection , 1995 .
[9] Mauro Barni,et al. DWT-based technique for spatio-frequency masking of digital signatures , 1999, Electronic Imaging.
[10] Bernd Girod,et al. Digital watermarking of raw and compressed video , 1996, Other Conferences.
[11] Edward J. Delp,et al. Perceptual watermarks for digital images and video , 1999, Electronic Imaging.
[12] Andreas Uhl,et al. Survey of wavelet-domain watermarking algorithms , 2001, IS&T/SPIE Electronic Imaging.
[13] Mauro Barni,et al. DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.
[14] Joshua R. Smith,et al. Modulation and Information Hiding in Images , 1996, Information Hiding.
[15] Edward J. Delp,et al. A WATERMARKING TECHNIQUE FOR DIGITAL IMAGERY: FURTHER STUDIES , 2001 .
[16] Edward J. Delp,et al. Fragile watermarking using the VW2D watermark , 1999, Electronic Imaging.
[17] G. C. Langelaar,et al. Watermarking digital image and video data , 2000 .
[18] W. J. Dowling,et al. Watermarking digital images for copyright protection , 1996 .
[19] Ioannis Pitas,et al. A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[20] Edward J. Delp,et al. Overview of image security techniques with applications in multimedia systems , 1998, Other Conferences.
[21] Ingemar J. Cox,et al. Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[22] B. Liu,et al. On resolving rightful ownerships of digital images by invisible watermarks , 1997, Proceedings of International Conference on Image Processing.
[23] Germano Caronni. Assuring Ownership Rights for Digital Images , 1995, VIS.
[24] Jiri Fridrich,et al. Robust bit extraction from images , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[25] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[26] Ingemar J. Cox,et al. A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.
[27] Edward J. Delp,et al. A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[28] Jian Zhao,et al. Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.
[29] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[30] Reginald L. Lagendijk,et al. Robust labeling methods for copy protection of images , 1997, Electronic Imaging.
[31] Stephen D. Wolthusen,et al. Techniques and Applications of Digital Watermarking and Content Protection , 2003, Artech House computer security series.
[32] Paul G. Flikkema,et al. Spread-spectrum techniques for wireless communication , 1997, IEEE Signal Process. Mag..