An Improved Multiplicative Spread Spectrum Embedding Scheme for Data Hiding
暂无分享,去创建一个
[1] Neri Merhav,et al. Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources , 2008, IEEE Transactions on Information Theory.
[2] Mauro Barni,et al. Optimum decoding and detection of multiplicative watermarks , 2003, IEEE Trans. Signal Process..
[3] M. Barni,et al. Informed watermarking by means of orthogonal and pseudo-random dirty paper coding , 2005 .
[4] Darko Kirovski,et al. Spread-spectrum watermarking of audio signals , 2003, IEEE Trans. Signal Process..
[5] Fernando Pérez-González,et al. Performance analysis of existing and new methods for data hiding with known-host information in additive channels , 2003, IEEE Trans. Signal Process..
[6] Mauro Barni,et al. Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding , 2005, IEEE Transactions on Signal Processing.
[7] Bo Zhang,et al. Statistically Robust Detection of Multiplicative Spread-Spectrum Watermarks , 2007, IEEE Transactions on Information Forensics and Security.
[8] Henrique S. Malvar,et al. Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..
[9] Mohammad Ali Akhaee,et al. Robust Multiplicative Patchwork Method for Audio Watermarking , 2009, IEEE Transactions on Audio, Speech, and Language Processing.
[10] Seyed Mohammad Ahadi,et al. A Logarithmic Quantization Index Modulation for Perceptually Better Data Hiding , 2010, IEEE Transactions on Image Processing.
[11] Pierre Moulin,et al. Design and statistical analysis of a hash-aided image watermarking system , 2004, IEEE Transactions on Image Processing.
[12] Panagiotis Tsakalides,et al. Hidden messages in heavy-tails: DCT-domain watermark detection using alpha-stable models , 2005, IEEE Transactions on Multimedia.
[13] Z. Jane Wang,et al. A Framework of Multiplicative Spread Spectrum Embedding for Data Hiding: Performance, Decoder and Signature Design , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[14] Jidong Zhong,et al. An Enhanced Multiplicative Spread Spectrum Watermarking Scheme , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[15] Fernando Pérez-González,et al. Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack , 2008, IEEE Transactions on Information Forensics and Security.
[16] John G. Proakis,et al. Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..
[17] Z. Jane Wang,et al. Correlation-and-Bit-Aware Spread Spectrum Embedding for Data Hiding , 2011, IEEE Transactions on Information Forensics and Security.
[18] Fernando Pérez-González,et al. Spread-Spectrum Watermarking Security , 2009, IEEE Transactions on Information Forensics and Security.
[19] C. Mosquera,et al. Rational dither modulation: a high-rate data-hiding method invariant to gain attacks , 2005, IEEE Transactions on Signal Processing.
[20] Wenjun Zeng,et al. Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking , 2007, IEEE Transactions on Information Forensics and Security.
[21] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[22] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[23] Fernando Pérez-González,et al. Security of Lattice-Based Data Hiding Against the Known Message Attack , 2006, IEEE Transactions on Information Forensics and Security.
[24] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[25] Pietro Guccione,et al. Hyperbolic RDM for Nonlinear Valumetric Distortions , 2009, IEEE Transactions on Information Forensics and Security.
[26] Farrokh Marvasti,et al. Robust audio and speech watermarking using Gaussian and Laplacian modeling , 2010, Signal Process..
[27] Bruno O. Shubert,et al. Random variables and stochastic processes , 1979 .
[28] Qiang Cheng,et al. Generalized Embedding of Multiplicative Watermarks , 2009, IEEE Transactions on Circuits and Systems for Video Technology.
[29] Thomas S. Huang,et al. Robust optimum detection of transform domain multiplicative watermarks , 2003, IEEE Trans. Signal Process..
[30] Nikolas P. Galatsanos,et al. New Additive Watermark Detectors Based On A Hierarchical Spatially Adaptive Image Model , 2008, IEEE Transactions on Information Forensics and Security.