An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain
暂无分享,去创建一个
[1] Sung-Jea Ko,et al. Content-Adaptive Robust Image Watermarking with Posterior HMM-Based Detector , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[2] Jiwu Huang,et al. A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain , 2005, IWDW.
[3] Andrew B. Watson,et al. DCT quantization matrices visually optimized for individual images , 1993, Electronic Imaging.
[4] Harry L. Van Trees,et al. Detection, Estimation, and Modulation Theory, Part I , 1968 .
[5] M. Barni,et al. Informed watermarking by means of orthogonal and pseudo-random dirty paper coding , 2005 .
[6] Joseph A. O'Sullivan,et al. Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.
[7] Francesco G. B. De Natale,et al. Watermarking Robustness Evaluation Based on Perceptual Quality via Genetic Algorithms , 2009, IEEE Transactions on Information Forensics and Security.
[8] Mitsuo Gen,et al. Genetic algorithms and engineering design , 1997 .
[9] Allen Van Gelder,et al. Computer Algorithms: Introduction to Design and Analysis , 1978 .
[10] Jie Chen,et al. Scalar quantization noise analysis and optimal bit allocation for a wavelet pyramid image coding system , 1992, [Proceedings] Singapore ICCS/ISITA `92.
[11] H. Vincent Poor,et al. An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.
[12] P. Kumsawat,et al. A new approach for optimization in image watermarking by using genetic algorithms , 2005, IEEE Transactions on Signal Processing.
[13] John D. Villasenor,et al. Visibility of wavelet quantization noise , 1997, IEEE Transactions on Image Processing.
[14] G. Wornell,et al. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).
[15] T. Cover,et al. Writing on colored paper , 2001, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252).
[16] Mauro Barni,et al. Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding , 2005, IEEE Transactions on Signal Processing.
[17] Max H. M. Costa,et al. Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.
[18] Pierre Moulin,et al. The role of information theory in watermarking and its application to image watermarking , 2001, Signal Process..
[19] Pierre Moulin,et al. Data-Hiding Codes , 2005, Proceedings of the IEEE.
[20] Robert D. Nowak,et al. Wavelet-based statistical signal processing using hidden Markov models , 1998, IEEE Trans. Signal Process..
[21] Ingemar J. Cox,et al. Applying informed coding and embedding to design a robust high-capacity watermark , 2004, IEEE Transactions on Image Processing.
[22] Fabien A. P. Petitcolas,et al. Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..
[23] Adrian S. Lewis,et al. Image compression using the 2-D wavelet transform , 1992, IEEE Trans. Image Process..
[24] Henrique S. Malvar,et al. Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..
[25] Uri Erez,et al. Achieving 1/2 log (1+SNR) on the AWGN channel with lattice encoding and decoding , 2004, IEEE Transactions on Information Theory.
[26] B. Girod,et al. A blind watermarking scheme based on structured codebooks , 2000 .
[27] Bernd Girod,et al. Estimation of amplitude modifications before SCS watermark detection , 2002, IS&T/SPIE Electronic Imaging.
[28] W. Fischer,et al. Sphere Packings, Lattices and Groups , 1990 .
[29] Amos Lapidoth,et al. The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.
[30] Ying Wang,et al. Capacity and Random-Coding Exponents for Channel Coding With Side Information , 2007, IEEE Transactions on Information Theory.
[31] Thierry Pun,et al. Optimal adaptive diversity watermarking with channel state estimation , 2001, IS&T/SPIE Electronic Imaging.
[32] C. Mosquera,et al. Rational dither modulation: a high-rate data-hiding method invariant to gain attacks , 2005, IEEE Transactions on Signal Processing.
[33] Ingemar J. Cox,et al. Watermarking as communications with side information , 1999, Proc. IEEE.