Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources
暂无分享,去创建一个
[1] Shlomo Shamai,et al. On information rates for mismatched decoders , 1994, IEEE Trans. Inf. Theory.
[2] Pierre Moulin,et al. Error exponents for watermarking game with squared-error constraints , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[3] Mauro Barni,et al. Effectiveness of exhaustive search and template matching against watermark desynchronization , 2005, IEEE Signal Processing Letters.
[4] Neri Merhav,et al. On the estimation of the order of a Markov chain and universal data compression , 1989, IEEE Trans. Inf. Theory.
[5] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[6] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[7] Neri Merhav,et al. Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources , 2008, IEEE Trans. Inf. Theory.
[8] Mauro Barni,et al. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .
[9] Teddy Furon,et al. A Constructive and Unifying Framework for Zero-Bit Watermarking , 2006, IEEE Transactions on Information Forensics and Security.
[10] A. D. Wyner. A Bound on the Number of Distinguishable Functions which are Time-Limited and Approximately Band-Limited , 1973 .
[11] Jean-Paul M. G. Linnartz,et al. Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks , 1998, Information Hiding.
[12] Ingemar J. Cox,et al. Watermarking as communications with side information , 1999, Proc. IEEE.
[13] Ingemar J. Cox,et al. Informed embedding: exploiting image and detector information during watermark insertion , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[14] Michael Gutman,et al. Asymptotically optimal classification for multiple tests with empirically observed statistics , 1989, IEEE Trans. Inf. Theory.
[15] Neri Merhav. Universal detection of messages via finite-state channels , 2000, IEEE Trans. Inf. Theory.
[16] Neri Merhav,et al. Optimal Watermark Embedding and Detection Strategies Under General Worst Case Attacks , 2007, 2007 IEEE International Symposium on Information Theory.
[17] Edward J. Delp,et al. Digital watermarking: algorithms and applications , 2001, IEEE Signal Process. Mag..
[18] Jeffrey A. Bloom,et al. Computing the Probability of False Watermark Detection , 1999, Information Hiding.
[19] Henrique S. Malvar,et al. Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..
[20] Neri Merhav,et al. The estimation of the model order in exponential families , 1989, IEEE Trans. Inf. Theory.
[21] Neri Merhav,et al. An Information – Theoretic View of Watermark Embedding – Detection and Geometric Attacks , 2005 .
[22] Neri Merhav,et al. Estimating the number of states of a finite-state source , 1992, IEEE Trans. Inf. Theory.
[23] N. D. Bruijn. Asymptotic methods in analysis , 1958 .
[24] Juan R. Hern,et al. Statistical Analysis of Watermarking Schemes for Copyright Protection of Images , 1999 .
[25] Pierre Moulin,et al. Error exponents for one-bit watermarking , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[26] Neri Merhav. Universal decoding for memoryless Gaussian channels with a deterministic interference , 1993, IEEE Trans. Inf. Theory.
[27] A. Gualtierotti. H. L. Van Trees, Detection, Estimation, and Modulation Theory, , 1976 .
[28] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[29] H. V. Trees. Detection, Estimation, And Modulation Theory , 2001 .
[30] Bernd Girod,et al. Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.
[31] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[32] Neri Merhav,et al. On the capacity game of public watermarking systems , 2004, IEEE Transactions on Information Theory.
[33] Joseph A. O'Sullivan,et al. Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.
[34] S. Orszag,et al. Advanced Mathematical Methods For Scientists And Engineers , 1979 .
[35] Neri Merhav,et al. On the error exponent and capacity games of private watermarking systems , 2003, IEEE Trans. Inf. Theory.