A communication system model for digital image watermarking problems
暂无分享,去创建一个
[1] Mauro Barni,et al. Performance analysis of ST-DM watermarking in presence of nonadditive attacks , 2004, IEEE Transactions on Signal Processing.
[2] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[3] J. R. Martin,et al. Information retrieval in digital watermarking , 2001, IEEE Commun. Mag..
[4] Ingemar J. Cox,et al. Informed embedding: exploiting image and detector information during watermark insertion , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[5] Gordon W. Braudaway,et al. Protecting publicly-available images with an invisible image watermark , 1996, Proceedings of International Conference on Image Processing.
[6] Mauro Barni,et al. Capacity of full frame DCT image watermarks , 2000, IEEE Trans. Image Process..
[7] Ahmed H. Tewfik,et al. Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.
[8] Amos Lapidoth,et al. The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.
[9] Anastasios Tefas,et al. Performance analysis of correlation-based watermarking schemes employing Markov chaotic sequences , 2003, IEEE Trans. Signal Process..
[10] John G. Proakis,et al. Digital Communications , 1983 .
[11] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[12] Deepa Kundur,et al. Statistical invisibility for collusion-resistant digital video watermarking , 2005, IEEE Transactions on Multimedia.
[13] Richard E. Blahut,et al. Principles and practice of information theory , 1987 .
[14] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.