Exploiting self-similarities to defeat digital watermarking systems: a case study on still images
暂无分享,去创建一个
[1] Y. Fisher. Fractal image compression: theory and application , 1995 .
[2] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[3] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[4] M. Kutter. Watermaking resisting to translation, rotation, and scaling , 1998 .
[5] Thierry Pun,et al. Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..
[6] Darko Kirovski,et al. The blind pattern matching attack on watermark systems , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[7] Bernd Girod,et al. Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.
[8] Ingemar J. Cox,et al. Preprocessing media to facilitate later insertion of a watermark , 2002, 2002 14th International Conference on Digital Signal Processing Proceedings. DSP 2002 (Cat. No.02TH8628).
[9] Darko Kirovski,et al. Blind pattern matching attack on watermarking systems , 2003, IEEE Trans. Signal Process..
[10] Fabien A. P. Petitcolas,et al. Fair benchmark for image watermarking systems , 1999, Electronic Imaging.
[11] Thierry Pun,et al. Generalized watermarking attack based on watermark estimation and perceptual remodulation , 2000, Electronic Imaging.
[12] Thierry Pun,et al. Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..
[13] Bernd Girod,et al. Power-spectrum condition for energy-efficient watermarking , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[14] Darko Kirovski,et al. Replacement Attack on Arbitrary Watermarking Systems , 2002, Digital Rights Management Workshop.
[15] Jean-Luc Dugelay,et al. Secure background watermarking based on video mosaicing , 2004, IS&T/SPIE Electronic Imaging.
[16] Gabriela Csurka,et al. Toward generic image dewatermarking? , 2002, Proceedings. International Conference on Image Processing.
[17] Min Wu,et al. Attacks on digital watermarks , 1999, Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers (Cat. No.CH37020).
[18] Christian Rey,et al. Tatouage d'images : gain en robustesse et intégrité des images , 2003 .
[19] Jean-Luc Dugelay,et al. Security pitfalls of frame-by-frame approaches to video watermarking , 2004, IEEE Transactions on Signal Processing.
[20] Thierry Pun,et al. Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.
[21] Jean-Luc Dugelay,et al. New intra-video collusion attack using mosaicing , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[22] Minerva M. Yeung,et al. Robust frame-dependent video watermarking , 2000, Electronic Imaging.
[23] Henri Cohen,et al. A course in computational algebraic number theory , 1993, Graduate texts in mathematics.
[24] Thomas S. Huang,et al. A fractal-based image block-coding algorithm , 1993, 1993 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[25] Arnaud E. Jacquin,et al. A novel fractal block-coding technique for digital images , 1990, International Conference on Acoustics, Speech, and Signal Processing.
[26] Martin Kutter,et al. Watermarking resistance to translation, rotation, and scaling , 1999, Other Conferences.
[27] Reginald L. Lagendijk,et al. Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[28] Lorrie Faith Cranor,et al. Analysis of security vulnerabilities in the movie production and distribution process , 2003, DRM '03.
[29] Martin F. H. Schuurmans,et al. Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.
[30] Darko Kirovski,et al. Robust Covert Communication over a Public Audio Channel Using Spread Spectrum , 2001, Information Hiding.
[31] Sviatoslav Voloshynovskiy,et al. Watermark template attack , 2001, IS&T/SPIE Electronic Imaging.
[32] Tor A. Ramstad,et al. An inner product space approach to image coding by contractive transformations , 1991, [Proceedings] ICASSP 91: 1991 International Conference on Acoustics, Speech, and Signal Processing.