Survey on Different Level of Audio Watermarking Techniques
暂无分享,去创建一个
[1] Thierry Pun,et al. Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..
[2] Subhash C. Kak,et al. WATERMARKING USING DECIMAL SEQUENCES , 2005, Cryptologia.
[3] Ingemar J. Cox,et al. Copy protection for DVD video , 1999, Proc. IEEE.
[4] Fabien A. P. Petitcolas,et al. Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..
[5] Stephen D. Wolthusen,et al. Techniques and Applications of Digital Watermarking and Content Protection , 2003, Artech House computer security series.
[6] 김인택. [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .
[7] Ioannis Pitas,et al. Applications of toral automorphisms in image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[8] Ingemar J. Cox,et al. Dirty-paper trellis codes for watermarking , 2002, Proceedings. International Conference on Image Processing.
[9] Mark Goresky,et al. Fibonacci and Galois representations of feedback-with-carry shift registers , 2002, IEEE Trans. Inf. Theory.
[10] Paul Douglas,et al. International Conference on Information Technology : Coding and Computing , 2003 .
[11] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[12] Min Wu,et al. Nonlinear collusion attacks on independent fingerprints for multimedia , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[13] Fernando Pérez-González,et al. Improving the performance of spatial watermarking of images using channel coding , 2000, Signal Process..
[14] Nazim Fatès,et al. StirMark benchmark: audio watermarking attacks , 2001, Proceedings International Conference on Information Technology: Coding and Computing.
[15] Gilbert Strang,et al. The Discrete Cosine Transform , 1999, SIAM Rev..