Security analysis of radial-based 3D watermarking systems
暂无分享,去创建一个
[1] Ton Kalker,et al. Considerations on watermarking security , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).
[2] Benoit M. Macq,et al. Constrained optimisation of 3D polygonal mesh watermarking by quadratic programming , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[3] 2014 IEEE International Workshop on Information Forensics and Security, WIFS 2014, Atlanta, GA, USA, December 3-5, 2014 , 2014, WIFS.
[4] Teddy Furon,et al. A New Measure of Watermarking Security: The Effective Key Length , 2013, IEEE Transactions on Information Forensics and Security.
[5] Atilla Baskurt,et al. Robust and blind mesh watermarking based on volume moments , 2011, Comput. Graph..
[6] Anindya Sarkar,et al. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.
[7] Adrian G. Bors,et al. Optimized 3D Watermarking for Minimal Surface Distortion , 2013, IEEE Transactions on Image Processing.
[8] C. Fontaine,et al. Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.
[9] Rémy Prost,et al. An Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms , 2007, IEEE Transactions on Signal Processing.
[10] Ingemar J. Cox,et al. Watermarking Is Not Cryptography , 2006, IWDW.
[11] Touradj Ebrahimi,et al. Perceptually driven 3D distance metrics with application to watermarking , 2006, SPIE Optics + Photonics.
[12] Pierre Alliez,et al. Spread transform and roughness-based shaping to improve 3D watermarking based on quadratic programming , 2014, 2014 IEEE International Conference on Image Processing (ICIP).