Zero Knowledge Watermark Detection
暂无分享,去创建一个
[1] J. Culberson,et al. The Gn,m Phase Transition is Not Hard for the Hamiltonian Cycle Problem , 1998, J. Artif. Intell. Res..
[2] Ross J. Anderson. Stretching the Limits of Steganography , 1996, Information Hiding.
[3] Jennifer Seberry,et al. Public Key Cryptography , 2000, Lecture Notes in Computer Science.
[4] Minerva M. Yeung,et al. An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.
[5] Scott Craver,et al. On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.
[6] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[7] Ping Wah Wong,et al. A Watermark for Image Integrity and Ownership Verification , 1998, PICS.
[8] Bernd Girod,et al. Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.
[9] Ioannis Pitas,et al. A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[10] Maurice Maes,et al. Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks , 1998, Information Hiding.
[11] Boon-Lock Yeo,et al. Technical trials and legal tribulations , 1998, CACM.
[12] Jean-Paul M. G. Linnartz,et al. Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.
[13] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .