Multimedia and security
暂无分享,去创建一个
[1] Jiri Fridrich,et al. Robust bit extraction from images , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[2] Gabriela Csurka,et al. Template based recovery of Fourier-based watermarks using log-polar and log-log maps , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[3] James L. Massey,et al. Linear Complexity of Periodic Sequences: A General Theory , 1996, CRYPTO.
[4] Ahmed H. Tewfik,et al. Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[5] Deepa Kundur,et al. Towards a telltale watermarking technique for tamper-proofing , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[6] Edward J. Delp,et al. Perceptual watermarks for digital images and video , 1999 .
[7] Michael J. Wiener,et al. DES is not a Group , 1992, CRYPTO.
[8] Min Wu,et al. Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[9] G. Tsudik,et al. Authentication of mobile users , 1994, IEEE Network.
[10] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[11] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[12] Mauro Barni,et al. Mask building for perceptually hiding frequency embedded watermarks , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[13] Ahmed H. Tewfik,et al. Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).
[14] S. Mallat. A wavelet tour of signal processing , 1998 .
[15] Minerva M. Yeung,et al. An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.
[16] Mauro Barni,et al. Copyright protection of digital images by means of frequency domain watermarking , 1998, Optics & Photonics.
[17] Minerva M. Yeung,et al. Effective and ineffective digital watermarks , 1997, Proceedings of International Conference on Image Processing.
[18] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[19] Jessica J. Fridrich,et al. Comparing robustness of watermarking techniques , 1999, Electronic Imaging.
[20] Andrew B. Watson,et al. DCT quantization matrices visually optimized for individual images , 1993, Electronic Imaging.
[21] Mauro Barni,et al. Optimum Decoding of Non-additive Full Frame DFT Watermarks , 1999, Information Hiding.
[22] Colin Boyd,et al. Cryptography and Coding , 1995, Lecture Notes in Computer Science.
[23] Minerva M. Yeung,et al. Invisible watermarking for image verification , 1998, J. Electronic Imaging.
[24] Mauro Barni,et al. A DCT-domain system for robust image watermarking , 1998, Signal Process..
[25] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[26] Jiri Fridrich,et al. Images with self-correcting capabilities , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[27] John D. Villasenor,et al. Visibility of wavelet quantization noise , 1997, IEEE Transactions on Image Processing.
[28] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[29] Gonzalo R. Arce,et al. Joint wavelet compression and authentication watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[30] Andrew B. Watson,et al. Image quality and entropy masking , 1997, Electronic Imaging.
[31] N. Asokan,et al. Anonymity in a Mobile Computing Environment , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.
[32] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[33] M. Schroeder. Number Theory in Science and Communication , 1984 .
[34] Jack K. Wolf,et al. On the Synthesis of Two-Dimensional Arrays with Desirable Correlation Properties , 1967, Inf. Control..
[35] Charles Cresson Wood,et al. Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50 , 1985, Computers & security.
[36] Ping Wah Wong,et al. A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[37] A. Tirkel,et al. Electronic water mark , 1993 .
[38] N. Asokan,et al. Untraceability in mobile networks , 1995, MobiCom '95.
[39] Ping Wah Wong,et al. A Watermark for Image Integrity and Ownership Verification , 1998, PICS.
[40] Ross J. Anderson,et al. Evaluation of copyright marking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[41] Edward J. Delp,et al. A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[42] Andrew Z. Tirkel,et al. Image and watermark registration , 1998, Signal Process..
[43] Edward J. Delp,et al. Fragile watermarking using the VW2D watermark , 1999, Electronic Imaging.