Vulnerabilities of Multimedia Protection Schemes
暂无分享,去创建一个
[1] Mohamed F. Mansour,et al. Secure detection of public watermarks with fractal decision boundaries , 2002, 2002 11th European Signal Processing Conference.
[2] Pierre Duhamel,et al. Unified approach of asymmetric watermarking schemes , 2001, IS&T/SPIE Electronic Imaging.
[3] Mohamed F. Mansour,et al. Techniques for data embedding in image using wavelet extrema , 2001, IS&T/SPIE Electronic Imaging.
[4] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[5] Mohamed F. Mansour,et al. Robust high capacity data embedding , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[6] T. Furon,et al. Robustness of asymmetric watermarking technique , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[7] Fernando Pérez-González,et al. DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..
[8] Gregory W. Wornell,et al. Dither modulation: a new approach to digital watermarking and information embedding , 1999, Electronic Imaging.
[9] Jean-Paul M. G. Linnartz,et al. Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[10] Jean-Paul M. G. Linnartz,et al. Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.
[11] Ahmed H. Tewfik,et al. Data hiding for video-in-video , 1997, Proceedings of International Conference on Image Processing.
[12] Jean-Paul M. G. Linnartz,et al. Public watermarks and resistance to tampering , 1997, Proceedings of International Conference on Image Processing.