Cryptanalysis of Barni et al. Watermarking Scheme
暂无分享,去创建一个
[1] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[2] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[3] Darko Kirovski,et al. Replacement Attack on Arbitrary Watermarking Systems , 2002, Digital Rights Management Workshop.
[4] Jean-Paul M. G. Linnartz,et al. Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[5] Ross J. Anderson,et al. Evaluation of copyright marking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[6] Jelena Kovacevic,et al. Wavelets and Subband Coding , 2013, Prentice Hall Signal Processing Series.
[7] Joe Kilian,et al. A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.
[8] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[9] Jacques Stern,et al. Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.
[10] Sviatoslav Voloshynovskiy,et al. Watermark copy attack , 2000, Electronic Imaging.
[11] Julien P. Stern,et al. An Analysis of One of the SDMI Candidates , 2001, Information Hiding.
[12] Adrian S. Lewis,et al. Image compression using the 2-D wavelet transform , 1992, IEEE Trans. Image Process..
[13] Ingrid Daubechies,et al. Ten Lectures on Wavelets , 1992 .
[14] Jean-Paul M. G. Linnartz,et al. Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.
[15] Mauro Barni,et al. Improved wavelet-based watermarking through pixel-wise masking , 2001, IEEE Trans. Image Process..
[16] Bede Liu,et al. An Implementation of, and Attacks on, Zero-Knowledge Watermarking , 2004, Information Hiding.
[17] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[18] Teddy Furon,et al. Watermarking Attack: Security of WSS Techniques , 2004, IWDW.