Lightweight Information Hiding in H.264/AVC Video Stream
暂无分享,去创建一个
[1] Shiguo Lian,et al. Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[2] Wojciech Mazurczyk,et al. Hiding Information in Retransmissions , 2009, ArXiv.
[3] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[4] Itu-T and Iso Iec Jtc. Advanced video coding for generic audiovisual services , 2010 .
[5] Zhang Chun. Digital multimedia watermarking techniques , 2000 .
[6] Reginald L. Lagendijk,et al. Real-Time Labeling of MPEG-2 Compressed Video , 1998, J. Vis. Commun. Image Represent..
[7] Iain E. G. Richardson,et al. H.264 and MPEG-4 Video Compression: Video Coding for Next-Generation Multimedia , 2003 .
[8] Sun De-hui. Bi-watermarking algorithm for H.264/AVC low bit-rate video stream , 2007 .
[9] Dong-Wook Kim,et al. Low-Complexity Watermarking Based on Entropy Coding in H.264/AVC , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[10] Jing Zhang,et al. Robust digital image-in-video watermarking for the emerging H.264/AVC standard , 2005, IEEE Workshop on Signal Processing Systems Design and Implementation, 2005..
[11] Yasuhiro Takishima,et al. H.264 native video watermarking method , 2006, 2006 IEEE International Symposium on Circuits and Systems.
[12] Sung-Min Kim,et al. Data Hiding on H.264/AVC Compressed Video , 2007, ICIAR.
[13] Reginald L. Lagendijk,et al. Optimal differential energy watermarking of DCT encoded images and video , 2001, IEEE Trans. Image Process..
[14] Bijan G. Mobasseri,et al. Authentication of H.264 streams by direct watermarking of CAVLC blocks , 2007, Electronic Imaging.
[15] Xingming Sun,et al. A Steganography Scheme in P2P Network , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[16] Jeffrey A. Bloom,et al. H.264/AVC stream replacement technique for video watermarking , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[17] Shiguo Lian,et al. Secure Distribution Scheme for Compressed Data Streams , 2006, 2006 International Conference on Image Processing.
[18] KRZYSZTOF SZCZYPIORSKI. HICCUPS : Hidden Communication System for Corrupted Networks , 2003 .
[19] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .