Informed Embedding for Multi-bit Watermarks
暂无分享,去创建一个
[1] G.W. Wornell,et al. An information-theoretic approach to the design of robust digital watermarking systems , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).
[2] Prakash Narayan,et al. Reliable Communication Under Channel Uncertainty , 1998, IEEE Trans. Inf. Theory.
[3] Ingemar J. Cox,et al. Watermarking as communications with side information , 1999, Proc. IEEE.
[4] Ingemar J. Cox,et al. 8 – Robust Watermarking , 2002 .
[5] Kannan Ramchandran,et al. Robust turbo-based data hiding for image and video sources , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.
[6] J. Chou,et al. On the duality between distributed source coding and data hiding , 1999, Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers (Cat. No.CH37020).
[7] Neri Merhav. On random coding error exponents of watermarking systems , 2000, IEEE Trans. Inf. Theory.
[8] Pierre Moulin,et al. The zero-rate spread-spectrum watermarking game , 2003, IEEE Trans. Signal Process..
[9] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[10] G. W. Wornell,et al. On authentication with distortion constraints , 2001, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252).
[11] Shlomo Shamai,et al. Nested linear/Lattice codes for structured multiterminal binning , 2002, IEEE Trans. Inf. Theory.
[12] Max H. M. Costa,et al. Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.
[13] A. Viterbi. CDMA: Principles of Spread Spectrum Communication , 1995 .
[14] Pierre Moulin,et al. The Fisher information game for optimal design of synchronization patterns in blind watermarking , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[15] Neri Merhav,et al. On the capacity game of public watermarking systems , 2004, IEEE Transactions on Information Theory.
[16] Joseph A. O'Sullivan,et al. Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.
[17] Neri Merhav,et al. Identification in the presence of side information with application to watermarking , 2001, IEEE Trans. Inf. Theory.
[18] Pierre Moulin,et al. A framework for evaluating the data-hiding capacity of image sources , 2002, IEEE Trans. Image Process..
[19] B. Girod,et al. A blind watermarking scheme based on structured codebooks , 2000 .
[20] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[21] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[22] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[23] Claude E. Shannon,et al. Channels with Side Information at the Transmitter , 1958, IBM J. Res. Dev..
[24] Amos Lapidoth,et al. The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.
[25] Ingemar J. Cox,et al. Informed embedding: exploiting image and detector information during watermark insertion , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[26] T. Cover,et al. Writing on colored paper , 2001, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252).
[27] Kannan Ramchandran,et al. Robust optimization solution to the data hiding problem using distributed source coding principles , 2000, Electronic Imaging.
[28] Mahalingam Ramkumar. Data hiding in multimedia - theory and applications , 1999 .