An image watermarking technique using pyramid transform
暂无分享,去创建一个
[1] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[2] Ali N. Akansu,et al. Robust scheme for oblivious detection of watermarks/data hiding in still images , 1999, Other Conferences.
[3] Juan R. Hern,et al. Statistical Analysis of Watermarking Schemes for Copyright Protection of Images , 1999 .
[4] E. Lehmann,et al. Testing Statistical Hypothesis. , 1960 .
[5] Mauro Barni,et al. Capacity of the watermark channel: how many bits can be hidden within a digital image? , 1999, Electronic Imaging.
[6] Thierry Pun,et al. Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..
[7] Jelena Kovacevic,et al. Wavelets and Subband Coding , 2013, Prentice Hall Signal Processing Series.
[8] Minerva M. Yeung,et al. Invisible watermarking for image verification , 1998, J. Electronic Imaging.
[9] Neri Merhav,et al. Identification in the presence of side information with application to watermarking , 2001, IEEE Trans. Inf. Theory.
[10] Fernando Pérez-González,et al. DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..
[11] Ton Kalker,et al. Exploiting shift invariance to obtain a high payload in digital image watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[12] Edward H. Adelson,et al. Shiftable multiscale transforms , 1992, IEEE Trans. Inf. Theory.
[13] G.W. Wornell,et al. An information-theoretic approach to the design of robust digital watermarking systems , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).
[14] Joseph A. O'Sullivan,et al. Information-theoretic analysis of watermarking , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).
[15] Edward J. Delp,et al. Perceptual watermarks for digital images and video , 1999, Electronic Imaging.
[16] John G. Proakis,et al. Digital Communications , 1983 .
[17] William T. Freeman,et al. Presented at: 2nd Annual IEEE International Conference on Image , 1995 .
[18] Max H. M. Costa,et al. Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.
[19] Ingemar J. Cox,et al. Watermarking as communications with side information , 1999, Proc. IEEE.
[20] Ricardo L. de Queiroz,et al. Nonexpansive pyramid for image coding using a nonlinear filterbank , 1998, IEEE Trans. Image Process..
[21] G. C. Langelaar,et al. Watermarking digital image and video data , 2000 .
[22] Ja-Ling Wu,et al. Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..
[23] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[24] W. J. Langford. Statistical Methods , 1959, Nature.
[25] Thomas S. Huang,et al. Optimum detection of multiplicative watermarks using locally optimum decision rule , 2001, IEEE International Conference on Multimedia and Expo, 2001. ICME 2001..
[26] Mauro Barni,et al. A new decoder for the optimum recovery of nonadditive watermarks , 2001, IEEE Trans. Image Process..
[27] Martin Kutter,et al. Watermarking resistance to translation, rotation, and scaling , 1999, Other Conferences.
[28] Deepa Kundur,et al. A robust digital image watermarking method using wavelet-based fusion , 1997, Proceedings of International Conference on Image Processing.
[29] D. Kundur,et al. A Robust Digital Image Watermarking Scheme Using the Wavelet-Based Fusion , 1997 .