New watermark-removal method based on Eigen-image energy
暂无分享,去创建一个
[1] Thierry Pun,et al. Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..
[2] Soontorn Oraintara,et al. Multichannel SVD-based image de-noising , 2005, 2005 IEEE International Symposium on Circuits and Systems.
[3] Konstantinos Konstantinides,et al. Statistical analysis of effective singular values in matrix rank determination , 1988, IEEE Trans. Acoust. Speech Signal Process..
[4] Paul C. H. Lee. Performance analysis of an MPEG-II audio/video player , 1999, IEEE Trans. Consumer Electron..
[5] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[6] Yi Shi,et al. Embedding image watermarks in dc components , 2000, IEEE Trans. Circuits Syst. Video Technol..
[7] Andreas Westfeld. A regression-based restoration technique for automated watermark removal , 2008, MM&Sec '08.
[8] Wei Liu,et al. Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking , 2007, IEEE Trans. Inf. Forensics Secur..
[9] Z.L. Shi,et al. SVD-Based Image De-Nosing with the Minimum Engergy Model , 2006, 2006 World Automation Congress.
[10] Thierry Pun,et al. A Stochastic Approach to Content Adaptive Digital Image Watermarking , 1999, Information Hiding.
[11] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[12] Wenjun Zeng,et al. Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking , 2007, IEEE Transactions on Information Forensics and Security.
[13] Wenkai Lu,et al. Adaptive noise attenuation of seismic image using singular value decomposition and texture direction detection , 2002, Proceedings. International Conference on Image Processing.
[14] Thierry Pun,et al. Generalized watermarking attack based on watermark estimation and perceptual remodulation , 2000, Electronic Imaging.
[15] Haifeng Zhang,et al. SVD-Based Image De-nosing with the Minimum Energy Model , 2008, 2008 Congress on Image and Signal Processing.
[16] Chun-Hsien Chou,et al. A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[17] Qiang Li,et al. Adaptive DWT-SVD Domain Image Watermarking Using Human Visual Model , 2007, The 9th International Conference on Advanced Communication Technology.
[18] Sviatoslav Voloshynovskiy,et al. Watermark copy attack , 2000, Electronic Imaging.
[19] Mohammed J. Islam,et al. An Adaptive Digital Image Watermarking Technique for Copyright Protection , 2007 .
[20] Oscar C. Au,et al. A capacity estimation technique for JPEG-to-JPEG image watermarking , 2003, IEEE Trans. Circuits Syst. Video Technol..
[21] Teddy Furon,et al. Broken Arrows , 2008, EURASIP J. Inf. Secur..
[22] Anastasios Tefas,et al. A benchmarking protocol for watermarking methods , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[23] S.P. Maity,et al. Robust image watermarking using multiresolution analysis , 2004, Proceedings of the IEEE INDICON 2004. First India Annual Conference, 2004..