Attacking Multimedia Protection Systems via Blind Pattern Matching
暂无分享,去创建一个
[1] Darko Kirovski,et al. Randomizing the replacement attack , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[2] Pierre Moulin,et al. Detection-theoretic analysis of warping attacks in spread-spectrum watermarking , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[3] Darko Kirovski,et al. Blind pattern matching attack on watermarking systems , 2003, IEEE Trans. Signal Process..
[4] Darko Kirovski,et al. Spread-spectrum watermarking of audio signals , 2003, IEEE Trans. Signal Process..
[5] Darko Kirovski,et al. Replacement Attack on Arbitrary Watermarking Systems , 2002, Digital Rights Management Workshop.
[6] Darko Kirovski,et al. Robust Covert Communication over a Public Audio Channel Using Spread Spectrum , 2001, Information Hiding.
[7] G. Wornell,et al. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).
[8] Sviatoslav Voloshynovskiy,et al. Watermark copy attack , 2000, Electronic Imaging.
[9] Thierry Pun,et al. Generalized watermarking attack based on watermark estimation and perceptual remodulation , 2000, Electronic Imaging.
[10] Fabien A. P. Petitcolas,et al. Fair benchmark for image watermarking systems , 1999, Electronic Imaging.
[11] Henrique S. Malvar. A modulated complex lapped transform and its applications to audio processing , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).
[12] Jean-Paul M. G. Linnartz,et al. Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[13] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[14] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[15] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[16] Jean-Paul M. G. Linnartz,et al. Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.
[17] Frank Bossen,et al. Digital watermarking of color images using amplitude modulation , 1998, J. Electronic Imaging.
[18] Frank Bossen,et al. Digital signature of color images using amplitude modulation , 1997, Electronic Imaging.
[19] Ingemar J. Cox,et al. A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.
[20] Kai Uwe Barthel,et al. A new image coding technique unifying fractal and transform coding , 1994, Proceedings of 1st International Conference on Image Processing.
[21] Darko Kirovski,et al. Blind pattern matching attack on audio watermarking systems , 2002 .