A theoretical study of watermarking security
暂无分享,去创建一个
[1] Ton Kalker,et al. Considerations on watermarking security , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).
[2] Ingemar J. Cox,et al. Informed embedding: exploiting image and detector information during watermark insertion , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[3] Nasir D. Memon,et al. On the invertibility of invisible watermarking techniques , 1997, Proceedings of International Conference on Image Processing.
[4] Jean-Paul M. G. Linnartz,et al. Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..
[5] Teddy Furon,et al. Watermarking Attack: Security of WSS Techniques , 2004, IWDW.
[6] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[7] Robert F. H. Fischer,et al. Lattice Costa schemes using subspace projection for digital watermarking , 2004, Eur. Trans. Telecommun..
[8] Georgios B. Giannakis,et al. On regularity and identifiability of blind source separation under constant-modulus constraints , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[9] Thomas Mittelholzer,et al. An Information-Theoretic Approach to Steganography and Watermarking , 1999, Information Hiding.
[10] T. Ens,et al. Blind signal separation : statistical principles , 1998 .
[11] Fabrice Gamboa,et al. Source separation when the input sources are discrete or have constant modulus , 1997, IEEE Trans. Signal Process..
[12] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[13] Pierre Duhamel,et al. An asymmetric watermarking method , 2003, IEEE Trans. Signal Process..
[14] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[15] Mauro Barni,et al. A general framework for robust watermarking security , 2003, Signal Process..
[16] Alle-Jan van der Veen,et al. Blind separation of BPSK sources with residual carriers , 1999, Signal Process..
[17] Eckhard Koch,et al. Copyright labeling of digitized image data , 1998 .
[18] Henrique S. Malvar,et al. Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..
[19] B. C. Ng,et al. On the Cramer-Rao bound under parametric constraints , 1998, IEEE Signal Processing Letters.
[20] Jean-Paul M. G. Linnartz,et al. Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.
[21] Pierre Moulin,et al. The role of information theory in watermarking and its application to image watermarking , 2001, Signal Process..
[22] Gaëtan Le Guelvouit,et al. Practical watermarking scheme based on wide spread spectrum and game theory , 2003, Signal Process. Image Commun..
[23] Shun-ichi Amari,et al. Blind source separation-semiparametric statistical approach , 1997, IEEE Trans. Signal Process..
[24] Dinh-Tuan Pham,et al. Blind separation of instantaneous mixtures of nonstationary sources , 2001, IEEE Trans. Signal Process..
[25] C. Fontaine,et al. Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.
[26] Sviatoslav Voloshynovskiy,et al. Watermark copy attack , 2000, Electronic Imaging.
[27] Ali N. Akansu,et al. Guest editorial special issue on signal processing for data hiding in digital media and secure content delivery , 2003, IEEE Trans. Signal Process..
[28] Bernd Girod,et al. Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..