Transactions on Data Hiding and Multimedia Security VII
暂无分享,去创建一个
[1] Pascal Bourdon,et al. A theoretical analysis of spatial/temporal modulation-based systems for prevention of illegal recordings in movie theaters , 2008, Electronic Imaging.
[2] Xudong Jiang,et al. Eigenfeature Regularization and Extraction in Face Recognition , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[3] Practical Optics , 1946, Nature.
[4] Ryuki Tachibana,et al. Watermarked Movie Soundtrack Finds the Position of the Camcorder in a Theater , 2009, IEEE Transactions on Multimedia.
[5] Chang-Tsun Li. Source camera identification using enhanced sensor pattern noise , 2010, IEEE Trans. Inf. Forensics Secur..
[6] Hiroshi Ito,et al. A New Watermark Surviving After Re-shooting the Images Displayed on a Screen , 2005, KES.
[7] Heung-Kyu Lee,et al. Digital Cinema Watermarking for Estimating the Position of the Pirate , 2010, IEEE Transactions on Multimedia.
[8] Gerald C. Holst,et al. CMOS/CCD sensors and camera systems , 2007 .
[9] Hiroshi Ito,et al. A Digital Watermark that Survives after Re-shooting the Images Displayed on a CRT Screen , 2006 .
[10] Rafael C. González,et al. Local Determination of a Moving Contrast Edge , 1985, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[11] Adrian G. Bors,et al. Watermarking mesh-based representations of 3-D objects using local moments , 2006, IEEE Transactions on Image Processing.
[12] U.C. Niranjan,et al. ASIC for digital color image watermarking , 2004, 3rd IEEE Signal Processing Education Workshop. 2004 IEEE 11th Digital Signal Processing Workshop, 2004..
[13] Elizabeth Ezra,et al. Transnational cinema : the film reader , 2006 .
[14] J. Schanda,et al. Colorimetry : understanding the CIE system , 2007 .
[15] W. C. Halstead. A note on the Bartley effect in the estimation of equivalent brightness. , 1941 .
[16] Satoru Tezuka,et al. Real-time video watermark embedding system using software on personal computer , 2005, 2005 IEEE International Conference on Systems, Man and Cybernetics.
[17] Babak Mahdian,et al. A bibliography on blind methods for identifying image forgery , 2010, Signal Process. Image Commun..
[18] Heung-Kyu Lee,et al. Practical, Real-Time, and Robust Watermarking on the Spatial Domain for High-Definition Video Contents , 2008, IEICE Trans. Inf. Syst..
[19] Hiroshi Yoshiura,et al. Development of Real-time Video Watermarking System Using Media Processors , 2004 .
[20] Stephen Mooney,et al. Digital Rights Management: Business and Technology , 2001 .
[21] Jong-Nam Kim,et al. Implementation of Watermark Detection System for Hardware Based Video Watermark Embedder , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.
[22] David G. Stork,et al. Pattern Classification (2nd ed.) , 1999 .
[23] Deepa Kundur,et al. VLSI implementation of a real-time video watermark embedder and detector , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..
[24] Matthew J. Holliman,et al. Media Applications on Hyper-Threading Technology , 2002 .
[25] Jiwu Huang,et al. A Novel Method for Detecting Cropped and Recompressed Image Block , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[26] Ton Kalker,et al. A watermarking scheme for digital cinema , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[27] Ryutarou Ohbuchi,et al. A Frequency‐Domain Approach to Watermarking 3D Shapes , 2002, Comput. Graph. Forum.
[28] Mauro Barni,et al. Identification of cut & paste tampering by means of double-JPEG detection and image segmentation , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.
[29] Hao-Tian Wu,et al. A High-Capacity Data Hiding Method for Polygonal Meshes , 2006, Information Hiding.