A novel copyright marking approach using steganography and robust RSA asymmetric-key cryptographic technique in audio files
暂无分享,去创建一个
Kathiravan Srinivasan | T. Gowthaman | J. Kanakaraj | Kathiravan Srinivasan | J. Kanakaraj | T. Gowthaman
[1] Chia-Hung Yeh,et al. Digital watermarking through quasi m-arrays , 1999, 1999 IEEE Workshop on Signal Processing Systems. SiPS 99. Design and Implementation (Cat. No.99TH8461).
[2] Behrouz A. Forouzan,et al. Data Communications and Networking , 2000 .
[3] Sajad Shirali-Shahreza,et al. Real-time and MPEG-1 layer III compression resistant steganography in speech , 2010, IET Inf. Secur..
[4] Tio M. M. Cedric,et al. Data concealment in audio using a nonlinear frequency distribution of PRBS coded data and frequency-domain LSB insertion , 2000, 2000 TENCON Proceedings. Intelligent Systems and Technologies for the New Millennium (Cat. No.00CH37119).
[5] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[6] Ahmed H. Tewfik,et al. Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.
[7] Kathiravan Srinivasan,et al. Robust RGB-D Hand Tracking Using Deep Learning Priors , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[8] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[9] Motoi Iwata,et al. A Digital Image Watermarking Scheme Withstanding Malicious Attacks , 2000 .
[10] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[11] J. D. Johnston,et al. Estimation of perceptual entropy using noise masking criteria , 1988, ICASSP-88., International Conference on Acoustics, Speech, and Signal Processing.
[12] J C Judge,et al. Steganography: Past, Present, Future , 2001 .
[13] Nedeljko Cvejic,et al. ALGORITHMS FOR AUDIO WATERMARKING AND STEGANOGRAPHY , 2004 .
[14] Kathiravan Srinivasan,et al. A hybrid NSCT domain image watermarking scheme , 2017, EURASIP J. Image Video Process..