A two-step watermarking attack using long-range correlation image restoration
暂无分享,去创建一个
[1] Mohammad S. Obaidat,et al. Digital watermarking-based DCT and JPEG model , 2003, IEEE Trans. Instrum. Meas..
[2] E. Todeva. Networks , 2007 .
[3] Shi-Jinn Horng,et al. A wavelet-tree-based watermarking method using distance vector of binary cluster , 2009, Expert Syst. Appl..
[4] Narendra Ahuja,et al. A new wavelet-based scheme for watermarking images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[5] Atsuyuki Okabe,et al. Spatial Tessellations: Concepts and Applications of Voronoi Diagrams , 1992, Wiley Series in Probability and Mathematical Statistics.
[6] P. Kumsawat,et al. A new approach for optimization in image watermarking by using genetic algorithms , 2005, IEEE Transactions on Signal Processing.
[7] Yi Pan,et al. A blind watermarking method using maximum wavelet coefficient quantization , 2009, Expert Syst. Appl..
[8] Pingzhi Fan,et al. An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization , 2008, IEEE Transactions on Multimedia.
[9] Thierry Pun,et al. Second Generation Benchmarking and Application Oriented Evaluation , 2001, Information Hiding.
[10] Fabien A. P. Petitcolas,et al. Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..
[11] Anastasios Tefas,et al. A benchmarking protocol for watermarking methods , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[12] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[13] David Zhang,et al. Image information restoration based on long-range correlation , 2002, IEEE Trans. Circuits Syst. Video Technol..
[14] Amirhossein Taherinia,et al. A robust spread spectrum watermarking method using two levels DCT , 2009, Int. J. Electron. Secur. Digit. Forensics.
[15] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[16] Amirhossein Taherinia,et al. A New Watermarking Attack Using Long-Range Correlation Image Restoration , 2009, 2009 International Conference on Availability, Reliability and Security.
[17] Takao Terano,et al. Image copyright protection with forward error correction , 2009, Expert Syst. Appl..