Data hiding based quality access control of digital images using adaptive QIM and lifting
暂无分享,去创建一个
[1] Touradj Ebrahimi,et al. The JPEG2000 still image coding system: an overview , 2000, IEEE Trans. Consumer Electron..
[2] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[3] Chang-Tsun Li. Reversible watermarking scheme with image-independent embedding capacity , 2005 .
[4] Rafael C. González,et al. Digital image processing using MATLAB , 2006 .
[5] Te-Ming Tu,et al. Robust spatial watermarking technique for colour images via direct saturation adjustment , 2005 .
[6] Frank Hartung,et al. Watermarking of multimedia content for m-commerce applications , 2000 .
[7] Adrian S. Lewis,et al. Image compression using the 2-D wavelet transform , 1992, IEEE Trans. Image Process..
[8] A. A. Zaidee,et al. Content Access Control for JPEG Images using CRND Zigzag Scanning and QBP , 2006, The Sixth IEEE International Conference on Computer and Information Technology (CIT'06).
[9] Andreas Uhl,et al. Survey of wavelet-domain watermarking algorithms , 2001, IS&T/SPIE Electronic Imaging.
[10] W. Sweldens. The Lifting Scheme: A Custom - Design Construction of Biorthogonal Wavelets "Industrial Mathematics , 1996 .
[11] A. Phadikar,et al. A Cost Effective Scheme for Content Verification and Access Control of Quality of an Image , 2008, 2008 IEEE Region 10 and the Third international Conference on Industrial and Information Systems.
[12] Min Wu,et al. Video access control via multi-level data hiding , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).
[13] Malay Kumar Kundu,et al. Dual purpose FWT domain spread spectrum image watermarking in real time , 2009, Comput. Electr. Eng..
[14] Min Wu,et al. Multimedia Data Hiding , 2003, Springer New York.
[15] Touradj Ebrahimi,et al. Authentication and access control in the JPEG 2000 compressed domain , 2001, Optics + Photonics.
[16] Amit Phadikar,et al. Quality access control of compressed color images using data hiding , 2010 .
[17] Mauro Barni,et al. Improved wavelet-based watermarking through pixel-wise masking , 2001, IEEE Trans. Image Process..
[18] Yong Huang,et al. Texture decomposition by harmonics extraction from higher order statistics , 2004, IEEE Trans. Image Process..
[19] P. Nasiopoulos,et al. A Novel Blind Video Watermarking Scheme for Access Control Using Complex Wavelets , 2007, 2007 Digest of Technical Papers International Conference on Consumer Electronics.
[20] Santi P. Maity,et al. Hidden QIM Watermarking on Compressed Data Using Channel Coding and Lifting , 2009, PReMI.
[21] Zhou Wang,et al. Image Quality Assessment: From Error Measurement to Structural Similarity , 2004 .
[22] Jelena Kovacevic,et al. Wavelet families of increasing order in arbitrary dimensions , 2000, IEEE Trans. Image Process..
[23] Alessandro Neri,et al. Blind Quality Assessment System for Multimedia , 2003 .
[24] Jeng-Shyang Pan,et al. An Introduction to Watermarking Techniques , 2004 .
[25] Jacques Blanc-Talon,et al. Performance Analysis of Scalar DC-QIM Forwatermark Detection , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[26] Mohan S. Kankanhalli,et al. Compressed-domain scrambler/descrambler for digital video , 2002, IEEE Trans. Consumer Electron..
[27] Momcilo Bogdanov,et al. Blind Low Frequency Watermarking Method , 2008 .
[28] Sankar K. Pal,et al. Thresholding for edge detection using human psychovisual phenomena , 1986, Pattern Recognit. Lett..
[29] Thierry Pun,et al. Capacity-security analysis of data hiding technologies , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.
[30] Jianping Fan,et al. A hierarchical access control model for video database systems , 2003, TOIS.
[31] Hsiang-Cheh Huang,et al. Layered Access Control Schemes on Watermarked Scalable Media , 2007, J. VLSI Signal Process..
[32] Max H. M. Costa,et al. Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.
[33] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[34] Rabab Kreidieh Ward,et al. An access control video watermarking method that is robust to geometric distortions , 2007, 2007 2nd International Conference on Digital Information Management.
[35] Dong-Wook Kim,et al. A New VLSI Architecture of Lifting-Based DWT , 2006, ARC.
[36] Wim Sweldens,et al. The lifting scheme: a construction of second generation wavelets , 1998 .
[37] Amit Phadikar,et al. Quantization Based Data Hiding Scheme for Efficient Quality Access Control of Images Using DWT via Lifting , 2008, 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing.
[38] Masaaki Fujiyoshi,et al. Generalized hierarchical encryption of JPEG 2000 codestreams for access control , 2005, IEEE International Conference on Image Processing 2005.
[39] Faouzi Kossentini,et al. Reversible integer-to-integer wavelet transforms for image compression: performance evaluation and analysis , 2000, IEEE Trans. Image Process..
[40] Ci Wang,et al. A DCT-based MPEG-2 transparent scrambling algorithm , 2003, IEEE Trans. Consumer Electron..
[41] Wenjun Zeng,et al. A format-compliant configurable encryption framework for access control of video , 2002, IEEE Trans. Circuits Syst. Video Technol..
[42] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[43] Dirk Roose,et al. Integer wavelet transforms using the lifting scheme , 1999 .