An asymmetric watermarking method
暂无分享,去创建一个
[1] Brian Chen. Digital watermarking, information embedding, and data hiding systems , 2000 .
[2] Max H. M. Costa,et al. Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.
[3] Bernd Girod,et al. Informed Watermarking , 2002 .
[4] Imants D. Svalbe,et al. Key independent watermark detection , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[5] Pierre Duhamel,et al. An Asymmetric Public Detection Watermarking Technique , 1999, Information Hiding.
[6] J.E. Mazo,et al. Digital communications , 1985, Proceedings of the IEEE.
[7] Jean-Paul M. G. Linnartz,et al. Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..
[8] Julien P. Stern,et al. Automatic Detection of a Watermarked Document Using a Private Key , 2001, Information Hiding.
[9] Richard A. Davis,et al. Time Series: Theory and Methods , 2013 .
[10] Ingemar J. Cox,et al. Copy protection for DVD video , 1999, Proc. IEEE.
[11] Joshua R. Smith,et al. Developments in Steganography , 1999, Information Hiding.
[12] Kannan Ramchandran,et al. A robust blind watermarking scheme based on distributed source coding principles , 2000, ACM Multimedia.
[13] Bernd Girod,et al. Public key watermarking by eigenvectors of linear transforms , 2000, 2000 10th European Signal Processing Conference.
[14] E. Lehmann,et al. Testing Statistical Hypothesis. , 1960 .
[15] Pierre Duhamel,et al. Audio asymmetric watermarking technique , 2000 .
[16] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[17] Nicolas Moreau,et al. Cyclostationarity-Based Audio Watermarking with Private and Public Hidden Data , 2000 .
[18] Justin Picard,et al. Neural Networks Functions for Public Key Watermarking , 2001, Information Hiding.
[19] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[20] Mauro Barni,et al. A new decoder for the optimum recovery of nonadditive watermarks , 2001, IEEE Trans. Image Process..
[21] Pierre Duhamel,et al. Audio public key watermarking technique , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).
[22] Pierre Duhamel,et al. Robustness of an asymmetric technique , 2003 .
[23] Pierre Duhamel,et al. Unified approach of asymmetric watermarking schemes , 2001, IS&T/SPIE Electronic Imaging.
[24] Mohamed F. Mansour,et al. Secure detection of public watermarks with fractal decision boundaries , 2002, 2002 11th European Signal Processing Conference.
[25] Sviatoslav Voloshynovskiy,et al. Watermark copy attack , 2000, Electronic Imaging.
[26] K. Ramchandran,et al. Turbo coded trellis-based constructions for data embedding: channel coding with side information , 2001, Conference Record of Thirty-Fifth Asilomar Conference on Signals, Systems and Computers (Cat.No.01CH37256).
[27] Julien P. Stern,et al. Lessons learned from SDMI , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).
[28] Neil J. Hurley,et al. Informed audio watermarking scheme using digital chaotic signals , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[29] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[30] K. Dzhaparidze. Parameter estimation and hypothesis testing in spectral analysis of stationary time series , 1986 .
[31] Ingemar J. Cox,et al. Watermarking as communications with side information , 1999, Proc. IEEE.
[32] Bernd Girod,et al. Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.
[33] Joachim J. Eggers,et al. Information embedding and digital watermarking as communication with side information , 2001 .
[34] Ahmed H. Tewfik,et al. Robust audio watermarking using perceptual masking , 1998, Signal Process..
[35] Ton Kalker,et al. Title: a Security Risk for Publicly Available Watermark Detectors Author: Ton Kalker Conference: Benelux Information Theory Symposium a Security Risk for Publicly Available Watermark Detectors , 1998 .
[36] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[37] D. Kahn. Cryptology and the origins of spread spectrum: Engineers during World War II developed an unbreakable scrambler to guarantee secure communications between Allied leaders; actress Hedy Lamarr played a role in the technology , 1984, IEEE Spectrum.
[38] Mauro Barni,et al. Optimum Decoding of Non-additive Full Frame DFT Watermarks , 1999, Information Hiding.
[39] Simon Singh,et al. The Code Book , 1999 .
[40] T. Furon,et al. Robustness of asymmetric watermarking technique , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[41] Richard E. Blahut,et al. Principles and practice of information theory , 1987 .