Second Generation Benchmarking and Application Oriented Evaluation
暂无分享,去创建一个
Thierry Pun | Stéphane Marchand-Maillet | Shelby Pereira | Sviatoslav Voloshynovskiy | Maribel Madueño | T. Pun | S. Marchand-Maillet | S. Voloshynovskiy | S. Pereira | M. Madueño | Maribel Madueño
[1] Jean-Paul M. G. Linnartz,et al. Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..
[2] Sviatoslav Voloshynovskiy,et al. Watermark copy attack , 2000, Electronic Imaging.
[3] Thierry Pun,et al. Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking , 2001, Information Hiding.
[4] Wenjun Zeng,et al. Perceptual watermarking of still images , 1997, Proceedings of First Signal Processing Society Workshop on Multimedia Signal Processing.
[5] Olivier Faugeras,et al. Three-Dimensional Computer Vision , 1993 .
[6] Mauro Barni,et al. A new decoder for the optimum recovery of nonadditive watermarks , 2001, IEEE Trans. Image Process..
[7] Thierry Pun,et al. Fast Robust Template Matching for Affine Resistant Image Watermarks , 1999, Information Hiding.
[8] Thierry Pun,et al. A framework for optimal adaptive DCT watermarks , 2000, 2000 10th European Signal Processing Conference.
[9] Thierry Pun,et al. Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..
[10] Gabriela Csurka,et al. Template based recovery of Fourier-based watermarks using log-polar and log-log maps , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[11] Adrian Perrig,et al. A Copyright Protection Environment for Digital Images , 1997, Verläßliche IT-Systeme.
[12] Thierry Pun,et al. Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..
[13] Thierry Pun,et al. Generalized watermarking attack based on watermark estimation and perceptual remodulation , 2000, Electronic Imaging.
[14] Andrew B. Watson,et al. DCT quantization matrices visually optimized for individual images , 1993, Electronic Imaging.
[15] Ross J. Anderson,et al. Evaluation of copyright marking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[16] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[17] Ingemar J. Cox,et al. Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[18] Thierry Pun,et al. Effective channel coding for DCT watermarks , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[19] O. Faugeras. Three-dimensional computer vision: a geometric viewpoint , 1993 .
[20] M. Yeung,et al. Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.