Combatting Ambiguity Attacks via Selective Detection of Embedded Watermarks
暂无分享,去创建一个
[1] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[2] Stefan Katzenbeisser,et al. On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving , 2003, IWDW.
[3] Edward J. Delp,et al. A WATERMARKING TECHNIQUE FOR DIGITAL IMAGERY: FURTHER STUDIES , 2001 .
[4] Klara Nahrstedt,et al. Watermarking methods for MPEG encoded video: towards resolving rightful ownership , 1998, Proceedings. IEEE International Conference on Multimedia Computing and Systems (Cat. No.98TB100241).
[5] Stefan Katzenbeisser,et al. Securing symmetric watermarking schemes against protocol attacks , 2002, IS&T/SPIE Electronic Imaging.
[6] M. Yeung,et al. Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.
[7] S. Pereira,et al. Attacks on digital watermarks: classification, estimation based attacks, and benchmarks , 2001, IEEE Communications Magazine.
[8] Anastasios Tefas,et al. A survey on watermarking application scenarios and related attacks , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[9] Pierre Moulin,et al. Data-Hiding Codes , 2005, Proceedings of the IEEE.
[10] Ahmad-Reza Sadeghi,et al. Proving Ownership of Digital Content , 1999, Information Hiding.
[11] Wei Tsang Ooi,et al. Hierarchical, non-uniform locality sensitive hashing and its application to video identification , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[12] Ahmad-Reza Sadeghi,et al. Advanced techniques for dispute resolving and authorship proofs on digital works , 2003, IS&T/SPIE Electronic Imaging.
[13] Nasir D. Memon,et al. Spatio–Temporal Transform Based Video Hashing , 2006, IEEE Transactions on Multimedia.
[14] Vishal Monga,et al. Robust Image Hashing Via Non-Negative Matrix Factorizations , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[15] Stefan Katzenbeisser,et al. Watermarking schemes provably secure against copy and ambiguity attacks , 2003, DRM '03.
[16] N. Memon,et al. Confusion/Diffusion Capabilities of Some Robust Hash Functions , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[17] B. Liu,et al. On resolving rightful ownerships of digital images by invisible watermarks , 1997, Proceedings of International Conference on Image Processing.
[18] Ton Kalker,et al. A robust image fingerprinting system using the Radon transform , 2004, Signal Process. Image Commun..
[19] Ali N. Akansu,et al. A robust protocol for proving ownership of multimedia content , 2004, IEEE Transactions on Multimedia.
[20] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..