A Comparison of Buyer-Seller Watermarking Protocol (BSWP) Based on Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT)
暂无分享,去创建一个
[1] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[2] Chin-Laung Lei,et al. An efficient and anonymous buyer-seller watermarking protocol , 2004, IEEE Transactions on Image Processing.
[3] Yogesh Chaba,et al. Computer Networks and Information Technologies , 2011 .
[4] Y. Rangsanseri,et al. Genetic Watermarking with Block-Based DCT Clustering , 2008, 2008 International Symposium on Communications and Information Technologies.
[5] Naim Dahnoun,et al. Studies in Computational Intelligence , 2013 .
[6] Adeel Mumtaz,et al. Digital Image Watermarking in the Wavelet Transform Domain , 2008 .
[7] Bart Preneel,et al. Anonymous Buyer-Seller Watermarking Protocol wth Additive Homomorphism , 2008, SIGMAP.
[8] Karbhari V. Kale. Advances in Computer Vision and Information Technology , 2008 .
[9] Ashwani Kumar,et al. A New Buyer-Seller Watermarking Protocol with Discrete Cosine Transform , 2011 .
[10] Sushil K. Bhattacharjee,et al. Towards second generation watermarking schemes , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[11] Jelena Kovacevic,et al. Wavelets and Subband Coding , 2013, Prentice Hall Signal Processing Series.
[12] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[13] Lakhmi C. Jain,et al. Information Hiding and Applications , 2009 .
[14] Kouichi Sakurai,et al. Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party , 2003, ACNS.
[15] Jun Zhang,et al. Secure buyer-seller watermarking protocol , 2006 .
[16] Frank Y. Shih,et al. Information Hiding by Digital Watermarking , 2009 .
[17] Jeng-Shyang Pan,et al. Genetic watermarking based on transform-domain techniques , 2004, Pattern Recognit..
[18] Gordon W. Braudaway,et al. If one watermark is good, are more better? , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).
[19] Chae Hoon Lim,et al. Information Security and Cryptology — ICISC 2002 , 2003, Lecture Notes in Computer Science.
[20] Dong Hoon Lee,et al. An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control , 2002, ICISC.
[21] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[22] Bart Preneel,et al. On Secure and Anonymous Buyer-Seller Watermarking Protocol , 2008, 2008 Third International Conference on Internet and Web Applications and Services.
[23] Ashwani Kumar,et al. A Practical BuyerSeller Watermarking Protocol based on Discrete Wavelet Transform , 2011 .
[24] Klara Nahrstedt,et al. Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights , 1998, J. Vis. Commun. Image Represent..
[25] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[26] Nasir D. Memon,et al. A buyer-seller watermarking protocol , 2001, IEEE Trans. Image Process..