Unified approach of asymmetric watermarking schemes
暂无分享,去创建一个
[1] Bernd Girod,et al. Asymmetric Watermarking Schemes , 2000 .
[2] Thomas Mittelholzer,et al. An Information-Theoretic Approach to Steganography and Watermarking , 1999, Information Hiding.
[3] Imants D. Svalbe,et al. Key independent watermark detection , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[4] Jiri Fridrich,et al. Robust Digital Watermarking Based on Key-Dependent Basis Functions , 1998, Information Hiding.
[5] Mauro Barni,et al. Optimum Decoding of Non-additive Full Frame DFT Watermarks , 1999, Information Hiding.
[6] Ingemar J. Cox,et al. Watermarking as communications with side information , 1999, Proc. IEEE.
[7] Ingemar J. Cox,et al. Informed embedding: exploiting image and detector information during watermark insertion , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[8] David G. Long,et al. The probability density of spectral estimates based on modified periodogram averages , 1999, IEEE Trans. Signal Process..
[9] Nicolas Moreau,et al. Cyclostationarity-Based Audio Watermarking with Private and Public Hidden Data , 2000 .
[10] Joshua R. Smith,et al. Developments in Steganography , 1999, Information Hiding.
[11] Pierre Duhamel,et al. An Asymmetric Public Detection Watermarking Technique , 1999, Information Hiding.
[12] Bernd Girod,et al. Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.