Watermark design based on Steiner triple systems
暂无分享,去创建一个
[1] Ivan B. Djordjevic,et al. Quantum LDPC Codes from Balanced Incomplete Block Designs , 2008, IEEE Communications Letters.
[2] Bülent Yener,et al. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, IEEE/ACM Transactions on Networking.
[3] Min Wu,et al. Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..
[4] Pierre Moulin,et al. A Message-Passing Approach to Combating Desynchronization Attacks , 2011, IEEE Transactions on Information Forensics and Security.
[5] Zhi-Fang Yang,et al. Robustness of Structure-Based Watermark by Using Balanced Incomplete Block Designs , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.
[6] Yue Zhang,et al. Affine Legendre Moment Invariants for Image Watermarking Robust to Geometric Distortions , 2011, IEEE Transactions on Image Processing.
[7] Bahram Honary,et al. New constructions of quasi-cyclic LDPC codes based on special classes of BIBD's for the AWGN and binary erasure channels , 2008, IEEE Transactions on Communications.
[8] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[9] Darryn Bryant,et al. A proof of Lindner's conjecture on embeddings of partial Steiner triple systems , 2009 .
[10] Judith L. Gersting. Mathematical structures for computer science , 1982 .
[11] Yau-Hwang Kuo,et al. Joint robustness and security enhancement for feature-based image watermarking using invariant feature regions , 2012, Signal Process..
[12] Jie Yang,et al. A Robust Anti-collusion Coding in Digital Fingerprinting System , 2006, 2006 8th international Conference on Signal Processing.
[13] Douglas R Stinson,et al. Contemporary design theory : a collection of surveys , 1992 .
[14] Jie Yang,et al. The digital fingerprint coding based on LDPC , 2004, Proceedings 7th International Conference on Signal Processing, 2004. Proceedings. ICSP '04. 2004..
[15] Irene Cheng,et al. Balanced incomplete designs for 3D perceptual quality estimation , 2005, IEEE International Conference on Image Processing 2005.
[16] Ashok Patel,et al. Noise Benefits in Quantizer-Array Correlation Detection and Watermark Decoding , 2011, IEEE Transactions on Signal Processing.
[17] C. Colbourn,et al. The CRC handbook of combinatorial designs , edited by Charles J. Colbourn and Jeffrey H. Dinitz. Pp. 784. $89.95. 1996. ISBN 0-8493-8948-8 (CRC). , 1997, The Mathematical Gazette.
[18] Jingshown Wu,et al. Noncoherent Spectral/Spatial OCDMA System Using Two-Dimensional Hybrid Codes , 2010, IEEE/OSA Journal of Optical Communications and Networking.
[20] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[21] Antoine Liutkus,et al. Informed source separation through spectrogram coding and data embedding , 2012, Signal Process..
[22] Heung-Kyu Lee,et al. Averaging attack resilient video fingerprinting , 2005, 2005 IEEE International Symposium on Circuits and Systems.
[23] Zhenxing Qian,et al. Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction , 2011, IEEE Transactions on Information Forensics and Security.
[24] Shiguo Lian,et al. On the hybrid multi-watermarking , 2012, Signal Process..
[25] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[26] Masahiro Okuda,et al. High Dynamic Range Image Watermarking Robust Against Tone-Mapping Operators , 2011, IEEE Transactions on Information Forensics and Security.
[27] Geoffrey Martin,et al. Small embeddings for partial triple systems of odd index , 2012, J. Comb. Theory, Ser. A.
[28] Quan Liu,et al. Hierarchical reversible data hiding based on statistical information: Preventing embedding unbalance , 2012, Signal Process..
[29] Kevin T. Phelps,et al. The Perfect Binary One-Error-Correcting Codes of Length 15: Part II—Properties , 2009, IEEE Transactions on Information Theory.
[30] Jiann-Der Lee,et al. International Conference on Intelligent Information Hiding and Multimedia Signal Processing , 2008 .
[31] Jia-Guu Leu,et al. Enlargement of Balanced-Incomplete-Block-Designs-Based Watermarks , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[32] Peter J. Cameron,et al. A brief introduction to design theory , 1975 .
[33] Hwai-Tsu Hu,et al. A dual cepstrum-based watermarking scheme with self-synchronization , 2012, Signal Process..
[34] F. Solov'eva,et al. On the Steiner quadruple systems of small rank which are embeddable into extended perfect binary codes , 2013 .