Attacking Multimedia Protection Systems via Blind Pattern Matching
暂无分享,去创建一个
[1] Darko Kirovski,et al. Robust Covert Communication over a Public Audio Channel Using Spread Spectrum , 2001, Information Hiding.
[2] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[3] Darko Kirovski,et al. Replacement Attack on Arbitrary Watermarking Systems , 2002, Digital Rights Management Workshop.
[4] Jean-Paul M. G. Linnartz,et al. Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[5] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[6] Kai Uwe Barthel,et al. A new image coding technique unifying fractal and transform coding , 1994, Proceedings of 1st International Conference on Image Processing.
[7] Frank Bossen,et al. Digital signature of color images using amplitude modulation , 1997, Electronic Imaging.
[8] Darko Kirovski,et al. Spread-spectrum watermarking of audio signals , 2003, IEEE Trans. Signal Process..
[9] Pierre Moulin,et al. Detection-theoretic analysis of warping attacks in spread-spectrum watermarking , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[10] Henrique S. Malvar. A modulated complex lapped transform and its applications to audio processing , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).
[11] Darko Kirovski,et al. Blind pattern matching attack on watermarking systems , 2003, IEEE Trans. Signal Process..
[12] Jean-Paul M. G. Linnartz,et al. Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.
[13] Ingemar J. Cox,et al. A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.
[14] Fabien A. P. Petitcolas,et al. Fair benchmark for image watermarking systems , 1999, Electronic Imaging.
[15] Thierry Pun,et al. Generalized watermarking attack based on watermark estimation and perceptual remodulation , 2000, Electronic Imaging.
[16] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[17] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[18] Darko Kirovski,et al. Blind pattern matching attack on audio watermarking systems , 2002 .
[19] Frank Bossen,et al. Digital watermarking of color images using amplitude modulation , 1998, J. Electronic Imaging.
[20] Darko Kirovski,et al. Randomizing the replacement attack , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[21] Sviatoslav Voloshynovskiy,et al. Watermark copy attack , 2000, Electronic Imaging.