Introduction au tatouage d’images
暂无分享,去创建一个
[1] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[2] Stefan Winkler,et al. A perceptual distortion metric for digital color images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[3] Mauro Barni,et al. Mask building for perceptually hiding frequency embedded watermarks , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[4] Deepa Kundur,et al. Digital watermarking using multiresolution wavelet decomposition , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[5] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[6] C.-C. Jay Kuo,et al. Image protection via watermarking on perceptually significant wavelet coefficients , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[7] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[8] Bernd Girod,et al. Digital watermarking of MPEG-2 coded video in the bitstream domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[9] Mauro Barni,et al. Capacity of the watermark channel: how many bits can be hidden within a digital image? , 1999, Electronic Imaging.
[10] Arnaud E. Jacquin,et al. Image coding based on a fractal theory of iterated contractive image transformations , 1992, IEEE Trans. Image Process..
[11] Minerva M. Yeung,et al. An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.
[12] P. Yip,et al. Discrete Cosine Transform: Algorithms, Advantages, Applications , 1990 .
[13] Joan L. Mitchell,et al. JPEG: Still Image Data Compression Standard , 1992 .
[14] J. Bibb Cain,et al. Error-Correction Coding for Digital Communications , 1981 .
[15] Fabien A. P. Petitcolas,et al. Weaknesses of copyright marking systems , 1998 .
[16] Jelena Kovacevic,et al. Wavelets and Subband Coding , 2013, Prentice Hall Signal Processing Series.
[17] Jean-Francois Delaigle,et al. A Block Based Watermarking Technique for MPEG2 Signals: Optimization and Validation on Real Digital TV Distribution Links , 1998, ECMAST.
[18] E. Polidori. Zooming using iterated function systems , 1997 .
[19] M. Yeung,et al. Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.
[20] Ahmed H. Tewfik,et al. Multiresolution scene-based video watermarking using perceptual models , 1998, IEEE J. Sel. Areas Commun..
[21] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[22] Martin Kutter,et al. Watermarking resistance to translation, rotation, and scaling , 1999, Other Conferences.
[23] J. O'Ruanaidh,et al. Rotation, Translation and Scale Invariant Digital Image Watermarking , 1997 .
[24] Christophe De Vleeschouwer,et al. Watermarking algorithm based on a human visual model , 1998, Signal Process..
[25] Jean-Luc Dugelay,et al. Multi-resolution access control algorithm based on fractal coding , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[26] Christophe De Vleeschouwer,et al. Psychovisual approach to digital picture watermarking , 1998, J. Electronic Imaging.
[27] Fabien A. P. Petitcolas,et al. Fair benchmark for image watermarking systems , 1999, Electronic Imaging.
[28] Ahmed H. Tewfik,et al. Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.
[29] Jean-Paul M. G. Linnartz,et al. Improved watermark detection reliability using filtering before correlation , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[30] Fernando Pérez-González,et al. The impact of channel coding on the performance of spatial watermarking for copyright protection , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[31] X G Xia,et al. Wavelet transform based watermark for digital images. , 1998, Optics express.
[32] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998 .
[33] Sushil Jajodia,et al. Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.
[34] Joshua R. Smith,et al. Modulation and Information Hiding in Images , 1996, Information Hiding.
[35] Bernd Girod,et al. Digital watermarking of raw and compressed video , 1996, Other Conferences.
[36] Bernd Girod,et al. Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.
[37] Reginald L. Lagendijk,et al. Robust labeling methods for copy protection of images , 1997, Electronic Imaging.
[38] Minerva M. Yeung,et al. Effective and ineffective digital watermarks , 1997, Proceedings of International Conference on Image Processing.
[39] Frank Bossen,et al. Digital signature of color images using amplitude modulation , 1997, Electronic Imaging.
[40] M. Kutter. Watermaking resisting to translation, rotation, and scaling , 1998 .
[41] Jean-Paul M. G. Linnartz,et al. Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.
[42] L. B. Milstein,et al. Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.
[43] Ingemar J. Cox,et al. Copy protection for DVD video , 1999, Proc. IEEE.