Attacks on digital watermarks
暂无分享,去创建一个
[1] Thierry Pun,et al. Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..
[2] Wenjun Zeng,et al. Perceptual watermarking of still images , 1997, Proceedings of First Signal Processing Society Workshop on Multimedia Signal Processing.
[3] Ahmed H. Tewfik,et al. Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[4] Deepa Kundur,et al. Towards a telltale watermarking technique for tamper-proofing , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[5] Min Wu,et al. Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[6] Wenjun Zeng,et al. Geometric-structure-based directional filtering for error concealment in image/video transmission , 1995, Other Conferences.
[7] Lucas Pereira,et al. Image replacement through texture synthesis , 1997, Proceedings of International Conference on Image Processing.
[8] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[9] Bin Zhu,et al. Robust data hiding for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.
[10] Min Wu,et al. Multi-level data hiding for digital image and video , 1999, Optics East.
[11] Nasir D. Memon,et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..
[12] B. Liu,et al. On resolving rightful ownerships of digital images by invisible watermarks , 1997, Proceedings of International Conference on Image Processing.
[13] Minerva M. Yeung,et al. An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.
[14] Francis M. Boland,et al. Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[15] Norishige Morimoto. Techniques for data hiding in audio files , 1995 .
[16] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[17] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[18] J. O'Ruanaidh,et al. Rotation, Translation and Scale Invariant Digital Image Watermarking , 1997 .
[19] Jean-Paul M. G. Linnartz,et al. Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..
[20] Eckhard Koch,et al. Towards Robust and Hidden Image Copyright Labeling , 1995 .
[21] Choong-Woong Lee,et al. Error concealment technique using projection data for block-based image coding , 1994, Other Conferences.
[22] M. Yeung,et al. Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.