Dual Digital Watermarking for Internet Media Based on Hybrid Strategies
暂无分享,去创建一个
[1] Ming-Shi Wang,et al. A majority-voting based watermarking scheme for color image tamper detection and recovery , 2007, Comput. Stand. Interfaces.
[2] Shanq-Jang Ruan,et al. Low Power Block-Based Watermarking Algorithm , 2006, IEICE Trans. Inf. Syst..
[3] Yongjian Hu,et al. An algorithm for removable visible watermarking , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[4] W. C. Chu,et al. DCT-based image watermarking using subsampling , 2003, IEEE Trans. Multim..
[5] Chin-Chen Chang,et al. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery , 2008, Pattern Recognit..
[6] Chin-Chen Chang,et al. Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes , 2007, IEEE Transactions on Information Forensics and Security.
[7] Ja-Ling Wu,et al. Attacking visible watermarking schemes , 2004, IEEE Transactions on Multimedia.
[8] Chin-Chen Chang,et al. A Reversible Data Hiding Scheme Based on Side Match Vector Quantization , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[9] Korris Fu-Lai Chung,et al. Robust digital image watermarking based on subsampling , 2006, Appl. Math. Comput..
[10] Chin-Chen Chang,et al. A watermarking technique based on one-way hash functions , 1999, IEEE Trans. Consumer Electron..
[11] Mauro Barni,et al. Improved wavelet-based watermarking through pixel-wise masking , 2001, IEEE Trans. Image Process..
[12] Byeungwoo Jeon,et al. Reversible Visible Watermarking and Lossless Recovery of Original Images , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[13] Frank Y. Shih,et al. Combinational image watermarking in the spatial and frequency domains , 2003, Pattern Recognit..
[14] Yen-Ping Chu,et al. Adaptive lossless steganographic scheme with centralized difference expansion , 2008, Pattern Recognit..
[15] Andrew B. Watson,et al. Visually optimal DCT quantization matrices for individual images , 1993, [Proceedings] DCC `93: Data Compression Conference.
[16] Adnan M. Alattar,et al. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .
[17] A. Murat Tekalp,et al. Lossless watermarking for image authentication: a new framework and an implementation , 2006, IEEE Transactions on Image Processing.
[18] Jun Tian,et al. Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..
[19] Yongjian Hu,et al. Using invisible watermarks to protect visibly watermarked images , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[20] Wei Su,et al. Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication , 2008, IEEE Transactions on Circuits and Systems for Video Technology.
[21] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[22] Andrew B. Watson,et al. DCT quantization matrices visually optimized for individual images , 1993, Electronic Imaging.
[23] Soo-Chang Pei,et al. A Novel Image Recovery Algorithm for Visible Watermarked Images , 2006, IEEE Trans. Inf. Forensics Secur..
[24] Mohan S. Kankanhalli,et al. A dual watermarking technique for images , 1999, MULTIMEDIA '99.
[25] Jeffrey J. Rodríguez,et al. Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.
[26] Yi-Ta Wu,et al. Digital watermarking based on chaotic map and reference register , 2007, Pattern Recognit..
[27] Chin-Chen Chang,et al. Adaptive watermark mechanism for rightful ownership protection , 2008, J. Syst. Softw..