More secure lossless visible watermarking by DCT
暂无分享,去创建一个
[1] Xingming Sun,et al. A Contrast-Sensitive Reversible Visible Image Watermarking Technique , 2009, IEEE Transactions on Circuits and Systems for Video Technology.
[2] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[3] Mohan S. Kankanhalli,et al. A DCT domain visible watermarking technique for images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).
[4] Byeungwoo Jeon,et al. Reversible Visible Watermarking and Lossless Recovery of Original Images , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[5] Shinfeng D. Lin,et al. Improving robustness of visible watermarking schemes for images , 2004, IEEE International Symposium on Consumer Electronics, 2004.
[6] Adnan Gutub,et al. Image Based Steganography Using Truth Table Based and Determinate Array on RGB Indicator , 2010 .
[7] Bo Li,et al. Preestimation-Based Array Interpolation Approach to Coherent Source Localization Using Multiple Sparse Subarrays , 2009, IEEE Signal Processing Letters.
[8] Reuben A. Farrugia. A reversible visible watermarking scheme for compressed images , 2010, Melecon 2010 - 2010 15th IEEE Mediterranean Electrotechnical Conference.
[9] I. Rachel Rupala,et al. A Novice Approach for Lossless Visible Watermarking Approach by Pioneering the Best Block (LVW-PBB) , 2011 .
[10] Pengwei Hao,et al. Matrix factorizations for reversible integer mapping , 2001, IEEE Trans. Signal Process..
[11] Long-Wen Chang,et al. A High Secure Reversible Visible Watermarking Scheme , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[12] Cheng-Hsing Yang,et al. Reversible Watermarking Scheme with Visibility Using Randomize Distance , 2011, 2011 Fifth International Conference on Genetic and Evolutionary Computing.
[13] Wen-Hsiang Tsai,et al. Generic Lossless Visible Watermarking—A New Approach , 2010, IEEE Transactions on Image Processing.
[14] Xingming Sun,et al. Removable visible image watermarking algorithm in the discrete cosine transform domain , 2008, J. Electronic Imaging.
[15] Tieyong Zeng,et al. A Generalization of LSB Matching , 2009, IEEE Signal Processing Letters.
[16] P. Yip,et al. Discrete Cosine Transform: Algorithms, Advantages, Applications , 1990 .
[17] Yih-Kai Lin,et al. High capacity reversible data hiding scheme based upon discrete cosine transformation , 2012, J. Syst. Softw..
[18] Oscar C. Au,et al. Lossless Visible Watermarking , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[19] Nouf A. Al-Otaibi,et al. 2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers , 2014 .