Digital watermarking
暂无分享,去创建一个
[1] Gordon W. Braudaway,et al. If one watermark is good, are more better? , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).
[2] G.W. Wornell,et al. An information-theoretic approach to the design of robust digital watermarking systems , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).
[3] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[4] Deepa Kundur,et al. Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.
[5] David Bull,et al. SPIE - Security and Watermarking of Multimedia Contents IV, San Jose, CA, USA , 2002 .
[6] Zixiang Xiong,et al. Multiresolution watermarking for images and video , 1999, IEEE Trans. Circuits Syst. Video Technol..
[7] Paul Jessop. The business case for audio watermarking , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).
[8] Bernd Girod,et al. Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.
[9] Jörg Schwenk,et al. Combining digital watermarks and collusion secure fingerprints for digital images , 2000, J. Electronic Imaging.
[10] Chris Honsinger. Data Embedding Using Phase Dispersion , 2000, PICS.
[11] Ioannis Pitas,et al. Robust image watermarking in the spatial domain , 1998, Signal Process..
[12] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[13] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[14] Ali N. Akansu,et al. Information theoretic bounds for data hiding in compressed images , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[15] Gregory W. Wornell,et al. Achievable performance of digital watermarking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[16] Mahalingam Ramkumar,et al. Theoretical capacity measures for data hiding in compressed images , 1999, Other Conferences.
[17] Ja-Ling Wu,et al. A blind watermarking algorithm with semantic meaningful watermarks , 2000, Conference Record of the Thirty-Fourth Asilomar Conference on Signals, Systems and Computers (Cat. No.00CH37154).
[18] Andrew G. Glen,et al. APPL , 2001 .
[19] Hal Berghel,et al. Digital watermarking makes its mark , 1998, NTWK.
[20] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[21] Rajarathnam Chandramouli. Data hiding capacity in the presence of an imperfectly known channel , 2001, IS&T/SPIE Electronic Imaging.
[22] Edward J. Delp,et al. Perceptual watermarks for digital images and video , 1999, Electronic Imaging.
[23] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[24] Ja-Ling Wu,et al. Multiresolution watermarking for digital images , 1998 .
[25] Sushil K. Bhattacharjee,et al. Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[26] Ioannis Pitas,et al. Image watermarking using DCT domain constraints , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[27] Gregory W. Wornell,et al. Digital watermarking and information embedding using dither modulation , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[28] Ingemar J. Cox,et al. Watermarking as communications with side information , 1999, Proc. IEEE.
[29] Joshua R. Smith,et al. Modulation and Information Hiding in Images , 1996, Information Hiding.
[30] Christian S. Collberg,et al. Software watermarking: models and dynamic embeddings , 1999, POPL '99.
[31] Ja-Ling Wu,et al. Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..
[32] Pierre Moulin,et al. The Data-Hiding Capacity of Image Sources , 2000 .
[33] Regunathan Radhakrishnan,et al. On the security of the SARI image authentication system , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[34] Er-Hsien Fu. Literature Survey on Digital Image Watermarking , 2022 .
[35] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[36] Jiri Fridrich,et al. Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[37] Ahmed H. Tewfik,et al. Multiresolution video watermarking using perceptual models and scene segmentation , 1997, Proceedings of International Conference on Image Processing.
[38] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[39] F. Segal,et al. A CHARACTERIZATION OF FIBRANT SEGAL CATEGORIES , 2006, math/0603400.
[40] Amos Lapidoth,et al. The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.
[41] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[42] Jessica J. Fridrich,et al. Comparing robustness of watermarking techniques , 1999, Electronic Imaging.
[43] Fabien A. P. Petitcolas,et al. Fair benchmark for image watermarking systems , 1999, Electronic Imaging.
[44] Ahmed H. Tewfik,et al. Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.
[45] Rajarathnam Chandramouli. Watermarking capacity in the presence of multiple watermarks and a partially known channel , 2001, SPIE ITCom.
[46] Ja-Ling Wu,et al. Gradient Original Image After JPEG compression or image processing Gradient magnitude Mean of gradient magnitude Determine amount of hidden watermark bits Intensity image Mean of gradient magnitude , 2002 .