Watermark Synchronization: Perspectives and a New Paradigm
暂无分享,去创建一个
[1] Benoit M. Macq,et al. Geometrically invariant watermarking using feature points , 2002, IEEE Trans. Image Process..
[2] Iwan Setyawan,et al. Exhaustive geometrical search and the false positive watermark detection probability , 2003, IS&T/SPIE Electronic Imaging.
[3] A. Murat Tekalp,et al. Local image registration: an adaptive filtering framework , 2005, IS&T/SPIE Electronic Imaging.
[4] David J. Fleet,et al. Embedding invisible information in color images , 1997, Proceedings of International Conference on Image Processing.
[5] Mauro Barni,et al. Effectiveness of exhaustive search and template matching against watermark desynchronization , 2005, IEEE Signal Processing Letters.
[6] A. Murat Tekalp,et al. Analysis of feature-based geometry-invariant watermarking , 2001, IS&T/SPIE Electronic Imaging.
[7] Sviatoslav Voloshynovskiy,et al. Watermark template attack , 2001, IS&T/SPIE Electronic Imaging.
[8] Sushil K. Bhattacharjee,et al. Towards second generation watermarking schemes , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[9] Martin Kutter,et al. Watermarking resistance to translation, rotation, and scaling , 1999, Other Conferences.
[10] Thierry Pun,et al. Robust template matching for affine resistant image watermarks , 2000, IEEE Trans. Image Process..
[11] Mauro Barni,et al. Geometric-invariant robust watermarking through constellation matching in the frequency domain , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[12] Gaurav Sharma,et al. Watermark Synchronization for Feature-Based Embedding: Application to Speech , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[13] Neri Merhav,et al. An Information – Theoretic View of Watermark Embedding – Detection and Geometric Attacks , 2005 .
[14] Ahmed H. Tewfik,et al. Image watermarking by moment invariants , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[15] David J. C. MacKay,et al. Reliable communication over channels with insertions, deletions, and substitutions , 2001, IEEE Trans. Inf. Theory.
[16] A. Murat Tekalp,et al. Pitch and duration modification for speech watermarking , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[17] Thierry Pun,et al. Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..
[18] Fernando Pérez-González,et al. Analysis of pilot-based synchronization algorithms for watermarking of still images , 2002, Signal Process. Image Commun..
[19] Gaurav Sharma,et al. Insertion, Deletion Codes With Feature-Based Embedding: A New Paradigm for Watermark Synchronization With Applications to Speech Watermarking , 2008, IEEE Transactions on Information Forensics and Security.
[20] M. Kutter. Watermaking resisting to translation, rotation, and scaling , 1998 .
[21] Eric Moulines,et al. Pitch-synchronous waveform processing techniques for text-to-speech synthesis using diphones , 1989, Speech Commun..
[22] A. Murat Tekalp,et al. Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..
[23] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[24] Ingemar J. Cox,et al. Rotation, scale, and translation resilient watermarking for images , 2001, IEEE Trans. Image Process..
[25] Fernando Pérez-González,et al. The effect of the random jitter attack on the bit error rate performance of spatial domain image watermarking , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[26] Nick G. Kingsbury,et al. Motion-estimation-based registration of geometrically distorted images for watermark recovery , 2001, IS&T/SPIE Electronic Imaging.
[27] Gabriela Csurka,et al. Template based recovery of Fourier-based watermarks using log-polar and log-log maps , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[28] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.