A general framework for robust watermarking security
暂无分享,去创建一个
[1] Jean-Paul M. G. Linnartz,et al. Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..
[2] Pierre Duhamel,et al. An asymmetric watermarking method , 2003, IEEE Trans. Signal Process..
[3] Matt L. Miller. Is asymmetric watermarking necessary or sufficient? , 2002, 2002 11th European Signal Processing Conference.
[4] Ingemar J. Cox,et al. Copy protection for DVD video : Identification and protection of multimedia information , 1999 .
[5] Fabien A. P. Petitcolas,et al. Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..
[6] Bernd Girod,et al. Informed Watermarking , 2002 .
[7] Simon Singh,et al. The Code Book , 1999 .
[8] Ingemar J. Cox,et al. Copy protection for DVD video , 1999, Proc. IEEE.
[9] Helga Seguin. Introduction of Optical Broad-Band Networks in France , 1986, IEEE J. Sel. Areas Commun..
[10] P. Laguna,et al. Signal Processing , 2002, Yearbook of Medical Informatics.
[11] Julien P. Stern,et al. Automatic Detection of a Watermarked Document Using a Private Key , 2001, Information Hiding.
[12] Julien P. Stern,et al. Lessons learned from SDMI , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).
[13] Thierry Pun,et al. A Stochastic Approach to Content Adaptive Digital Image Watermarking , 1999, Information Hiding.
[14] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[15] Ton Kalker,et al. Title: a Security Risk for Publicly Available Watermark Detectors Author: Ton Kalker Conference: Benelux Information Theory Symposium a Security Risk for Publicly Available Watermark Detectors , 1998 .
[16] Christine Guillemot,et al. Perceptual watermarking of non i.i.d. signals based on wide spread spectrum using side information , 2002, Proceedings. International Conference on Image Processing.
[17] Thierry Pun,et al. Robust template matching for affine resistant image watermarks , 2000, IEEE Trans. Image Process..
[18] Benoit M. Macq,et al. JANIS: Just Another n-order Side-Informed Watermarking Scheme , 2002, Proceedings. International Conference on Image Processing.
[19] Ingemar J. Cox,et al. Watermarking as communications with side information , 1999, Proc. IEEE.
[20] Jörg Schwenk,et al. Combining digital watermarks and collusion-secure fingerprints for digital images , 1999, Electronic Imaging.
[21] Ton Kalker,et al. Digital watermarking for DVD video copy protection , 2000 .
[22] Reginald L. Lagendijk,et al. Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[23] Pierre Duhamel,et al. Unified approach of asymmetric watermarking schemes , 2001, IS&T/SPIE Electronic Imaging.
[24] Ton Kalker,et al. Considerations on watermarking security , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).
[25] Thierry Pun,et al. Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..
[26] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[27] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[28] Bernd Girod,et al. Analysis of digital watermarks subjected to optimum linear filtering and additive noise , 2001, Signal Process..
[29] Sviatoslav Voloshynovskiy,et al. Watermark template attack , 2001, IS&T/SPIE Electronic Imaging.
[30] Min Wu,et al. Joint coding and embedding for collusion-resistant fingerprinting , 2002, 2002 11th European Signal Processing Conference.
[31] Benoit M. Macq,et al. A new video-object watermarking scheme robust to object manipulation , 2001, ICIP.
[32] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[33] Thierry Pun,et al. Fast Robust Template Matching for Affine Resistant Image Watermarks , 1999, Information Hiding.
[34] Jessica J. Fridrich,et al. Security of fragile authentication watermarks with localization , 2002, IS&T/SPIE Electronic Imaging.
[35] Gabriela Csurka,et al. Toward generic image dewatermarking? , 2002, Proceedings. International Conference on Image Processing.
[36] Thierry Pun,et al. Second Generation Benchmarking and Application Oriented Evaluation , 2001, Information Hiding.
[37] Thomas Mittelholzer,et al. An Information-Theoretic Approach to Steganography and Watermarking , 1999, Information Hiding.
[38] Ton Kalker,et al. Secret key watermarking with changing keys , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[39] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[40] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[41] Darko Kirovski,et al. Blind pattern matching attack on audio watermarking systems , 2002 .
[42] Stefan Katzenbeisser,et al. Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure , 2002, 2002 11th European Signal Processing Conference.
[43] Mohamed F. Mansour,et al. Secure detection of public watermarks with fractal decision boundaries , 2002, 2002 11th European Signal Processing Conference.
[44] Anastasios Tefas,et al. A benchmarking protocol for watermarking methods , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).