How to Combat Block Replacement Attacks?
暂无分享,去创建一个
[1] Mauro Barni,et al. A new decoder for the optimum recovery of nonadditive watermarks , 2001, IEEE Trans. Image Process..
[2] Jean-Luc Dugelay,et al. Collusion issue in video watermarking , 2005, IS&T/SPIE Electronic Imaging.
[3] Darko Kirovski,et al. The blind pattern matching attack on watermark systems , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[4] Bernd Girod,et al. Informed Watermarking , 2002 .
[5] Marian Stewart Bartlett,et al. Classifying Facial Actions , 1999, IEEE Trans. Pattern Anal. Mach. Intell..
[6] Thomas S. Huang,et al. Robust optimum detection of transform domain multiplicative watermarks , 2003, IEEE Trans. Signal Process..
[7] John Daugman. Relaxation Neural Network For Complete Discrete 2-D Gabor Transforms , 1988, Other Conferences.
[8] Y. Fisher. Fractal image compression: theory and application , 1995 .
[9] M. A. Repucci,et al. Spatial Structure and Symmetry of Simple-Cell Receptive Fields in Macaque Primary Visual Cortex , 2002 .
[10] William E. Higgins,et al. Texture Segmentation using 2-D Gabor Elementary Functions , 1994, IEEE Trans. Pattern Anal. Mach. Intell..
[11] Jean-Luc Dugelay,et al. Security pitfalls of frame-by-frame approaches to video watermarking , 2004, IEEE Transactions on Signal Processing.
[12] J. M. Foley,et al. Contrast masking in human vision. , 1980, Journal of the Optical Society of America.
[13] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[14] Darko Kirovski,et al. Blind pattern matching attack on watermarking systems , 2003, IEEE Trans. Signal Process..
[15] Stefan Fischer,et al. Face authentication with Gabor information on deformable graphs , 1999, IEEE Trans. Image Process..
[16] Teddy Furon,et al. Watermarking security part one: Theory , 2005, IS&T/SPIE Electronic Imaging.
[17] Deepa Kundur,et al. Novel approach to collusion-resistant video watermarking , 2002, IS&T/SPIE Electronic Imaging.
[18] Teddy Furon,et al. Watermarking security part two: Practice , 2005, IS&T/SPIE Electronic Imaging.
[19] Thierry Pun,et al. A Stochastic Approach to Content Adaptive Digital Image Watermarking , 1999, Information Hiding.
[20] Jean-Luc Dugelay,et al. Exploiting self-similarities to defeat digital watermarking systems: a case study on still images , 2004, MM&Sec '04.
[21] Jorge Herbert de Lira,et al. Two-Dimensional Signal and Image Processing , 1989 .
[22] Darko Kirovski,et al. Replacement Attack on Arbitrary Watermarking Systems , 2002, Digital Rights Management Workshop.
[23] Gabriela Csurka,et al. Toward generic image dewatermarking? , 2002, Proceedings. International Conference on Image Processing.
[24] Jean-Luc Dugelay,et al. A Countermeasur to Resist Block Replacement Attacks , 2005, IEEE International Conference on Image Processing 2005.
[25] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.