Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding
暂无分享,去创建一个
[1] H. Kuhn. The Hungarian method for the assignment problem , 1955 .
[2] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[3] Henrique S. Malvar,et al. Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..
[4] Ton Kalker,et al. Considerations on watermarking security , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).
[5] Fernando Pérez-González,et al. Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis , 2005, Information Hiding.
[6] Ece Dept,et al. A STOCHASTIC QIM ALGORITHM FOR ROBUST, UNDETECTABLE IMAGE WATERMARKING , 2004 .
[7] I. D. Hill,et al. Remark on algorithm 299 , 1985, TOMS.
[8] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[9] C. Fontaine,et al. Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.
[10] François Cayre,et al. Practical performance analysis of secure modulations for woa spread-spectrum based image watermarking , 2007, MM&Sec.
[11] Sviatoslav Voloshynovskiy,et al. Watermark copy attack , 2000, Electronic Imaging.
[12] François Cayre,et al. Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding , 2008, IEEE Transactions on Information Forensics and Security.
[13] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..