Watermarks encrypted in a concealogram and deciphered by a modified joint-transform correlator.
暂无分享,去创建一个
Joseph Rosen | Ofir Montal | David Abookasis | Ohad Abramson | D. Abookasis | Joseph Rosen | Ofir Montal | Ohad Abramson
[1] A. B. Vander Lugt,et al. Signal detection by complex spatial filtering , 1964, IEEE Trans. Inf. Theory.
[2] O. Bryngdahl,et al. VI - Digital Halftoning: Synthesis of Binary Images , 1994 .
[3] Iwan Setyawan,et al. Watermarking digital image and video data. A state-of-the-art overview , 2000 .
[4] Derrick Grover. Data Watermarking: Steganography and Watermarking of Digital Data , 2001, Comput. Law Secur. Rev..
[5] J. Goodman,et al. A technique for optically convolving two functions. , 1966, Applied optics.
[6] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[7] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.
[8] A W Lohmann,et al. Binary fraunhofer holograms, generated by computer. , 1967, Applied optics.
[9] Bahram Javidi,et al. Concealogram: an image within an image , 2002, SPIE Optics + Photonics.
[10] G. C. Langelaar,et al. Watermarking digital image and video data , 2000 .
[11] Bahram Javidi,et al. Security optical systems based on a joint transform correlator with significant output images , 2001, Optical Engineering.
[12] Bahram Javidi,et al. 3D object watermarking by a 3D hidden object. , 2003, Optics express.
[13] J Rosen,et al. Hidden images in halftone pictures. , 2001, Applied optics.
[14] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.