Information Hiding Codes and Their Applications to Images and Audio
暂无分享,去创建一个
[1] G.W. Wornell,et al. An information-theoretic approach to the design of robust digital watermarking systems , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).
[2] Prakash Narayan,et al. Reliable Communication Under Channel Uncertainty , 1998, IEEE Trans. Inf. Theory.
[3] Brendan J. Frey,et al. Factor graphs and the sum-product algorithm , 2001, IEEE Trans. Inf. Theory.
[4] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[5] Robert M. Gray,et al. On the asymptotic eigenvalue distribution of Toeplitz matrices , 1972, IEEE Trans. Inf. Theory.
[6] Anil K. Jain. Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.
[7] Claude E. Shannon,et al. The Mathematical Theory of Communication , 1950 .
[8] Henrique S. Malvar. A modulated complex lapped transform and its applications to audio processing , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).
[9] Ingrid Daubechies,et al. Ten Lectures on Wavelets , 1992 .
[10] Kannan Ramchandran,et al. Capacity issues in digital image watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[11] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[12] Michael W. Marcellin,et al. Comparison of different methods of classification in subband coding of images , 1997, IEEE Trans. Image Process..
[13] J.A. O'Sullivan,et al. Information theoretic analysis of steganography , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[14] Michael T. Orchard,et al. Image coding based on mixture modeling of wavelet coefficients and a fast estimation-quantization framework , 1997, Proceedings DCC '97. Data Compression Conference.
[15] Pierre Moulin,et al. A framework for evaluating the data-hiding capacity of image sources , 2002, IEEE Trans. Image Process..
[16] Ton Kalker,et al. Efficient detection of a spatial spread-spectrum watermark in MPEG video streams , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[17] Robert M. Gray,et al. Dithered quantizers , 1993, IEEE Trans. Inf. Theory.
[18] N. Kingsbury. Complex Wavelets for Shift Invariant Analysis and Filtering of Signals , 2001 .
[19] Seymour Shlien,et al. The modulated lapped transform, its time-varying forms, and its applications to audio coding standards , 1997, IEEE Trans. Speech Audio Process..
[20] Max H. M. Costa,et al. Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.
[21] Bernd Girod,et al. Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..
[22] Lawrence G. Roberts,et al. Picture coding using pseudo-random noise , 1962, IRE Trans. Inf. Theory.
[23] Ahmed H. Tewfik,et al. Object-based transparent video watermarking , 1997, Proceedings of First Signal Processing Society Workshop on Multimedia Signal Processing.
[24] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[25] Joan L. Mitchell,et al. JPEG: Still Image Data Compression Standard , 1992 .
[26] Mauro Barni,et al. Capacity of the watermark channel: how many bits can be hidden within a digital image? , 1999, Electronic Imaging.
[27] Ross J. Anderson,et al. Evaluation of copyright marking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[28] Martin Vetterli,et al. Rate-distortion analysis of spike processes , 1999, Proceedings DCC'99 Data Compression Conference (Cat. No. PR00096).
[29] S. Shamai,et al. Nested linear/lattice codes for Wyner-Ziv encoding , 1998, 1998 Information Theory Workshop (Cat. No.98EX131).
[30] Neri Merhav. On random coding error exponents of watermarking systems , 2000, IEEE Trans. Inf. Theory.
[31] Robert J. Safranek,et al. Signal compression based on models of human perception , 1993, Proc. IEEE.
[32] Joseph A. O'Sullivan,et al. Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.
[33] Edward J. Delp,et al. Perceptual watermarks for digital images and video , 1999 .
[34] Ingemar J. Cox,et al. Watermarking applications and their properties , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[35] David G. Luenberger,et al. Linear and nonlinear programming , 1984 .
[36] Kannan Ramchandran,et al. Low-complexity image denoising based on statistical modeling of wavelet coefficients , 1999, IEEE Signal Processing Letters.
[37] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[38] Antonio Ortega,et al. Rate-distortion methods for image and video compression , 1998, IEEE Signal Process. Mag..
[39] Amos Lapidoth,et al. The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.
[40] Gregory W. Wornell,et al. The duality between information embedding and source coding with side information and some applications , 2003, IEEE Trans. Inf. Theory.
[41] R. Blahut. Theory and practice of error control codes , 1983 .
[42] Henrique S. Malvar,et al. Signal processing with lapped transforms , 1992 .
[43] Ingemar J. Cox,et al. A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.
[44] N. Jayant,et al. Digital Coding of Waveforms: Principles and Applications to Speech and Video , 1990 .
[45] U. Grenander,et al. Toeplitz Forms And Their Applications , 1958 .
[46] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[47] Ali N. Akansu,et al. Information theoretic bounds for data hiding in compressed images , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[48] Gregory W. Wornell,et al. Preprocessed and postprocessed quantization index modulation methods for digital watermarking , 2000, Electronic Imaging.
[49] Jean-Paul M. G. Linnartz,et al. Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.
[50] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[51] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[52] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[53] Tamer Basar,et al. With the Capacity 0.461(bits) and the Optimal Opd Being 'q = , 1998 .
[54] E. Aiyoshi,et al. Necessary conditions for min-max problems and algorithms by a relaxation procedure , 1980 .
[55] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[56] N. J. A. Sloane,et al. Sphere Packings, Lattices and Groups , 1987, Grundlehren der mathematischen Wissenschaften.
[57] Ralf Steinmetz,et al. Robust MPEG video watermarking technologies , 1998, MULTIMEDIA '98.