Performance analysis of ST-DM watermarking in presence of nonadditive attacks
暂无分享,去创建一个
[1] Max H. M. Costa,et al. Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.
[2] Gregory W. Wornell,et al. Achievable performance of digital watermarking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[3] Ingemar J. Cox,et al. Watermarking as communications with side information , 1999, Proc. IEEE.
[4] Kannan Ramchandran,et al. Watermarking based on duality with distributed source coding and robust optimization principles , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[5] Pierre Moulin,et al. The role of information theory in watermarking and its application to image watermarking , 2001, Signal Process..
[6] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[7] Amos Lapidoth,et al. The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.
[8] Kannan Ramchandran,et al. Robust turbo-based data hiding for image and video sources , 2002, Proceedings. International Conference on Image Processing.
[9] Fernando Pérez-González,et al. Performance analysis of existing and new methods for data hiding with known-host information in additive channels , 2003, IEEE Trans. Signal Process..
[10] Ingemar J. Cox,et al. Applying informed coding and embedding to design a robust high-capacity watermark , 2004, IEEE Transactions on Image Processing.