Digital image watermarking: its formal model, fundamental properties and possible attacks
暂无分享,去创建一个
[1] Ingemar J. Cox,et al. Watermarking as communications with side information , 1999, Proc. IEEE.
[2] Ton Kalker,et al. Capacity bounds and constructions for reversible data-hiding , 2003, IS&T/SPIE Electronic Imaging.
[3] Jeho Nam,et al. Reversible Watermarking Algorithm Using Sorting and Prediction , 2009, IEEE Transactions on Circuits and Systems for Video Technology.
[4] Jessica J. Fridrich,et al. Security of fragile authentication watermarks with localization , 2002, IS&T/SPIE Electronic Imaging.
[5] A. Murat Tekalp,et al. Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.
[6] Nasir D. Memon,et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..
[7] Tieyong Zeng,et al. Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection , 2011, IEEE Transactions on Image Processing.
[8] Thierry Pun,et al. Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..
[9] Jeho Nam,et al. A Novel Difference Expansion Transform for Reversible Data Embedding , 2008, IEEE Transactions on Information Forensics and Security.
[10] Jessica J. Fridrich,et al. Comparing robustness of watermarking techniques , 1999, Electronic Imaging.
[11] Jean-Yves Chouinard,et al. Security of ownership watermarking of digital images based on singular value decomposition , 2010, J. Electronic Imaging.
[12] C. Roux,et al. Mixed Reversible and RONI Watermarking for Medical Image Reliability Protection , 2007, 2007 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[13] Pierre Moulin,et al. A framework for evaluating the data-hiding capacity of image sources , 2002, IEEE Trans. Image Process..
[14] Stefan Katzenbeisser,et al. Watermarking schemes provably secure against copy and ambiguity attacks , 2003, DRM '03.
[15] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[16] Stefan Katzenbeisser,et al. Security analysis of public key watermarking schemes , 2001, SPIE Optics + Photonics.
[17] Jiri Fridrich,et al. Robust Digital Watermarking Based on Key-Dependent Basis Functions , 1998, Information Hiding.
[18] Mauro Barni,et al. Capacity of full frame DCT image watermarks , 2000, IEEE Trans. Image Process..
[19] Colin Boyd,et al. Developing a Digital Image Watermarking Model , 2011, 2011 International Conference on Digital Image Computing: Techniques and Applications.
[20] Husrev T. Sencar,et al. Security issues in watermarking applications - a deeper look , 2006, MCPS '06.
[21] Shiguo Lian,et al. Security Analysis of Content-Based Watermarking Authentication Framework , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[22] William A. Pearlman,et al. Capacity of Steganographic Channels , 2005, IEEE Transactions on Information Theory.
[23] Zi Lin,et al. A Multipurpose Public-Key Cryptosystem Based Image Watermarking , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[24] Christian Roux,et al. Reversible Watermarking for Knowledge Digest Embedding and Reliability Control in Medical Images , 2009, IEEE Transactions on Information Technology in Biomedicine.
[25] Jian Zhao,et al. A generic digital watermarking model , 1998, Comput. Graph..
[26] Mauro Barni,et al. A general framework for robust watermarking security , 2003, Signal Process..
[27] Colin Boyd,et al. A Review of Medical Image Watermarking Requirements for Teleradiology , 2013, Journal of Digital Imaging.
[28] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[29] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[30] G. Coatrieux,et al. An additive and lossless watermarking method based on invariant image approximation and Haar wavelet transform , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.
[31] Xiaojun Qi,et al. A robust content-based digital image watermarking scheme , 2007, Signal Process..
[32] C. Fontaine,et al. Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.
[33] H. Y. Kim,et al. Toward a secure public-key blockwise fragile authentication watermarking , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[34] Thomas Mittelholzer,et al. An Information-Theoretic Approach to Steganography and Watermarking , 1999, Information Hiding.
[35] Adnan M. Alattar,et al. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .
[36] Anastasios Tefas,et al. Image Watermarking: Techniques and Applications , 2009 .
[37] Christophe De Vleeschouwer,et al. Circular interpretation of bijective transformations in lossless watermarking for media asset management , 2003, IEEE Trans. Multim..
[38] Xiao Zeng,et al. Reversible Image Watermarking Using Interpolation Technique , 2010, IEEE Transactions on Information Forensics and Security.
[39] Frank Y. Shih,et al. Robust watermarking and compression for medical images based on genetic algorithms , 2005, Inf. Sci..
[40] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[41] Stefan Katzenbeisser,et al. A Computational Model for Watermark Robustness , 2006, Information Hiding.
[42] Yu-Chen Hu,et al. Reversible image hiding scheme using predictive coding and histogram shifting , 2009, Signal Process..
[43] Yongjian Hu,et al. DE-Based Reversible Data Hiding With Improved Overflow Location Map , 2009, IEEE Transactions on Circuits and Systems for Video Technology.
[44] Ton Kalker,et al. Considerations on watermarking security , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).
[45] Yu Nenghai,et al. Practical analysis of watermarking capacity , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..
[46] Jianguo Zhang,et al. Evaluation of security algorithms used for security processing on DICOM images , 2005, SPIE Medical Imaging.
[47] Nasir D. Memon,et al. Practical Security of Non-Invertiblewatermarking Schemes , 2007, 2007 IEEE International Conference on Image Processing.
[48] Jeng-Shyang Pan,et al. Reversible data hiding based on multilevel histogram modification and sequential recovery , 2011 .
[49] Colin Boyd,et al. Counterfeiting attacks on block-wise dependent fragile watermarking schemes , 2013, SIN.
[50] Tian-ge Zhuang,et al. A Region-Based Lossless Watermarking Scheme for Enhancing Security of Medical Data , 2009, Journal of Digital Imaging.
[51] Oscar C. Au,et al. A capacity estimation technique for JPEG-to-JPEG image watermarking , 2003, IEEE Trans. Circuits Syst. Video Technol..
[52] Hui Li,et al. Reversible data hiding based on block median preservation , 2011, Inf. Sci..
[53] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[54] Dinu Coltuc,et al. Capacity control of reversible watermarking by two-thresholds embedding , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[55] Rémy Boyer,et al. Security evaluation of informed watermarking schemes , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[56] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[57] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[58] Ingemar J. Cox,et al. Rotation, scale, and translation resilient watermarking for images , 2001, IEEE Trans. Image Process..
[59] Pierre Moulin,et al. An information-theoretic model for image watermarking and data hiding , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[60] Jessica J. Fridrich,et al. Lossless Data Embedding—New Paradigm in Digital Watermarking , 2002, EURASIP J. Adv. Signal Process..
[61] Chin-Chen Chang,et al. Multilevel reversible data hiding based on histogram modification of difference images , 2008, Pattern Recognit..
[62] Colin Boyd,et al. Utilizing Least Significant Bit-Planes of RONI Pixels for Medical Image Watermarking , 2013, 2013 International Conference on Digital Image Computing: Techniques and Applications (DICTA).
[63] Jeffrey J. Rodríguez,et al. Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.
[64] Hae-Yeoun Lee,et al. Reversible data hiding exploiting spatial correlation between sub-sampled images , 2009, Pattern Recognit..
[65] Mauro Barni,et al. Improved wavelet-based watermarking through pixel-wise masking , 2001, IEEE Trans. Image Process..
[66] Henk J. A. M. Heijmans,et al. Reversible data embedding into images using wavelet techniques and sorting , 2005, IEEE Transactions on Image Processing.
[67] Dinu Coltuc,et al. Fragile and robust watermarking by histogram specification , 2002, IS&T/SPIE Electronic Imaging.
[68] Jean-Luc Dugelay,et al. Blind detection of malicious alterations on still images using robust watermarks , 2000 .
[69] Reihaneh Safavi-Naini,et al. How to Compare Image Watermarking Algorithms , 2009, Trans. Data Hiding Multim. Secur..
[70] Benoit M. Macq,et al. Geometrically invariant watermarking using feature points , 2002, IEEE Trans. Image Process..
[71] Jun Tian,et al. Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..
[72] Ton Kalker,et al. Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform , 2007, IEEE Transactions on Information Forensics and Security.
[73] Ingemar J. Cox,et al. The First 50 Years of Electronic Watermarking , 2002, EURASIP J. Adv. Signal Process..
[74] Amos Lapidoth,et al. The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.
[75] J.A. O'Sullivan,et al. Information theoretic analysis of steganography , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[76] Ioannis Pitas,et al. Robust image watermarking in the spatial domain , 1998, Signal Process..
[77] H. Nyeem,et al. On the robustness and security of digital image watermarking , 2012, 2012 International Conference on Informatics, Electronics & Vision (ICIEV).
[78] Xuelong Li,et al. A local Tchebichef moments-based robust image watermarking , 2009, Signal Process..
[79] H. K. Dai,et al. Content-Based Image Watermarking Via Public-Key Cryptosystems , 2007, ICCSA.
[80] Zhang Hongbin,et al. Digital watermarking capacity analysis in wavelet domain , 2004, Proceedings 7th International Conference on Signal Processing, 2004. Proceedings. ICSP '04. 2004..
[81] Joseph A. O'Sullivan,et al. Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.
[82] A. Murat Tekalp,et al. Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.