Computationally Efficient, Robust Watermarking Using Fast Walsh Hadamard Transform
暂无分享,去创建一个
[1] Sayyid Samir Al-Busaidi,et al. Computing and Listing of Number of Possible m-Sequence Generators of Order n , 2013 .
[2] Malay Kumar Kundu,et al. A blind CDMA image watermarking scheme in wavelet domain , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[3] Alekhika Mohanty. Study and Implementation of Watermarking Algorithms , 2006 .
[4] Muhammad Kashif Samee. Robust watermarking and its applications to communication problems , 2012 .
[5] Nidal F. Shilbayeh,et al. Combined DWT-CT Blind Digital Image Watermarking Algorithm , 2013 .
[6] Ali Mohammad Al-Haj,et al. Advanced Techniques in Multimedia Watermarking: Image, Video and Audio Applications , 2010 .
[7] Sayyid Samir Al-Busaidi,et al. Adding Pseudo-Random Test Sequence Generator in the Test Simulator for DFT Approach , 2012 .
[8] Wen-Yuan Chen,et al. Digital Watermarking Using DCT Transformation , 2000 .
[9] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[10] Md. Iqbal Hasan Sarker,et al. An Efficient Image Watermarking Scheme Using BFS Technique Based on Hadamard Transform , 2013, Smart Comput. Rev..
[11] Afaq Ahmad,et al. Design of a Pseudo-Random Binary Code Generator via a Developed Simulation Model , 2012 .
[12] Kusuma Kumari. A Survey of Digital Watermarking Techniques and its Applications , 2013 .
[13] Tariq Jamil,et al. An investigation into the application of linear feedback shift registers for steganography , 2002, Proceedings IEEE SoutheastCon 2002 (Cat. No.02CH37283).
[14] Shanq-Jang Ruan,et al. DS-CDMA-BASED WATERMARKING : A LOW-POWER , HIGH-SECURITY ALGORITHM FOR EMBEDDED SYSTEMS , 2011 .
[15] Franklin Rajkumar. v. Entropy based Robust Watermarking Scheme using Hadamard Transformation Technique , 2011 .
[16] Vishal Shrivastava,et al. A Survey of Digital Watermarking Techniques and its Applications , 2014, ArXiv.
[17] Paresh Rawat,et al. A Robust Watermarking Approach using DCT-DWT , 2012 .
[18] Afaq Ahmad,et al. An efficient method to determine linear feedback connections in shift registers that generate maximal length pseudo-random up and down binary sequences , 1997 .
[19] Afaq Ahmad,et al. Better PN Generators for CDMA Application - A Verilog-HDL Implementation Approach , 2012 .
[20] Vandana,et al. Modified Algorithm for Digital Image Watermarking Using Combined DCT and DWT , 2013 .