Self-noise suppression schemes in blind image steganography
暂无分享,去创建一个
[1] Min Wu,et al. Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[2] H J Wang,et al. Wavelet-based digital image watermarking. , 1998, Optics express.
[3] Ioannis Pitas,et al. Image watermarking using DCT domain constraints , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[4] Gregory W. Wornell,et al. Digital watermarking and information embedding using dither modulation , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[5] Ali N. Akansu,et al. Information theoretic bounds for data hiding in compressed images , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[6] B. Liu,et al. On resolving rightful ownerships of digital images by invisible watermarks , 1997, Proceedings of International Conference on Image Processing.
[7] Germano Caronni. Assuring Ownership Rights for Digital Images , 1995, VIS.
[8] R. Haddad,et al. Multiresolution Signal Decomposition: Transforms, Subbands, and Wavelets , 1992 .
[9] Ali N. Akansu,et al. Robust scheme for oblivious detection of watermarks/data hiding in still images , 1999, Other Conferences.
[10] Ali N. Akansu,et al. On the choice of transforms for data hiding in compressed video , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).
[11] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[12] Ali N. Akansu,et al. Capacity estimates for data hiding in compressed images , 2001, IEEE Trans. Image Process..