On the Need for Signal-Coherent Watermarks
暂无分享,去创建一个
[1] Henri Nicolas,et al. Motion and Illumination Variation Estimation Using a Hierarchy of Models: Application to Image Sequence Coding , 1995, J. Vis. Commun. Image Represent..
[2] Jean-Luc Dugelay,et al. Exploiting self-similarities to defeat digital watermarking systems: a case study on still images , 2004, MM&Sec '04.
[3] Alan V. Oppenheim,et al. Discrete-Time Signal Pro-cessing , 1989 .
[4] Jean-Luc Dugelay,et al. Security pitfalls of frame-by-frame approaches to video watermarking , 2004, IEEE Transactions on Signal Processing.
[5] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[6] Darko Kirovski,et al. Robust Covert Communication over a Public Audio Channel Using Spread Spectrum , 2001, Information Hiding.
[7] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[8] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[9] Ton Kalker,et al. Video watermarking system for broadcast monitoring , 1999, Electronic Imaging.
[10] Bernd Girod,et al. Watermarking of uncompressed and compressed video , 1998, Signal Process..
[11] Reginald L. Lagendijk,et al. Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[12] Henrique S. Malvar. A modulated complex lapped transform and its applications to audio processing , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).
[13] J. R. Stuart,et al. Coding High Quality Digital Audio , 1997 .
[14] Minerva M. Yeung,et al. Robust frame-dependent video watermarking , 2000, Electronic Imaging.
[15] Y. Fisher. Fractal image compression: theory and application , 1995 .
[16] Bernd Girod,et al. Power-spectrum condition for energy-efficient watermarking , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[17] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[18] Darko Kirovski,et al. Replacement Attack on Arbitrary Watermarking Systems , 2002, Digital Rights Management Workshop.
[19] Jean-Luc Dugelay,et al. Secure background watermarking based on video mosaicing , 2004, IS&T/SPIE Electronic Imaging.
[20] Nasir D. Memon,et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..
[21] Gabriela Csurka,et al. Toward generic image dewatermarking? , 2002, Proceedings. International Conference on Image Processing.
[22] Jean-Luc Dugelay,et al. New intra-video collusion attack using mosaicing , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[23] I. Jolliffe. Principal Component Analysis , 2002 .
[24] Fabien A. P. Petitcolas,et al. Fair benchmark for image watermarking systems , 1999, Electronic Imaging.
[25] Thierry Pun,et al. Generalized watermarking attack based on watermark estimation and perceptual remodulation , 2000, Electronic Imaging.