Digital watermarking techniques for security applications
暂无分享,去创建一个
Harsh Vikram Singh | Sonam Tyagi | Raghav Agarwal | Sandeep Kumar Gangwar | H. Singh | Raghav Agarwal | S. Tyagi | Sonam Tyagi
[1] Borko Furht,et al. Survey of Watermarking Techniques and Applications , 2004 .
[2] Chang-Tsun Li,et al. One-dimensional neighborhood forming strategy for fragile watermarking , 2003, J. Electronic Imaging.
[3] Saeed Mozaffari,et al. Watermarking in binary document images using fractal codes , 2014, Pattern Recognit. Lett..
[4] M. Sharma,et al. Digital watermarking using DWT and DES , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[5] Jiang Xuehua. Digital Watermarking and its Application in Image Copyright Protection , 2010, 2010 International Conference on Intelligent Computation Technology and Automation.
[6] Edward J. Delp,et al. Digital watermarking: algorithms and applications , 2001, IEEE Signal Process. Mag..
[7] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[8] Rajeev Kumar Singh,et al. A Survey: Digital Image Watermarking Techniques , 2014 .
[9] Jaspal Bagga,et al. Performance Comparison of Digital Image Watermarking Techniques: A Survey , 2013 .
[10] A. K. Singh,et al. A novel technique for digital image watermarking in spatial domain , 2012, 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing.
[11] Jagdish W. Bakal,et al. ROBUST DIGITAL WATERMARKING TECHNIQUE BY USING DCT AND SPREAD SPECTRUM , 2013 .