Analysis of the “Wavelet Tree Quantization” watermarking strategy and a modified robust scheme
暂无分享,去创建一个
[1] 김인택. [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .
[2] Reginald L. Lagendijk,et al. Optimal differential energy watermarking of DCT encoded images and video , 2001, IEEE Trans. Image Process..
[3] Deepa Kundur. Improved Digital Watermarking Through Diversity and Attack Characterization , 1999 .
[4] Sushil Jajodia,et al. Recovery of Watermarks from Distorted Images , 1999, Information Hiding.
[5] Thierry Pun,et al. Cryptographic Copyright Protection for Digital Images Based on Watermarking Techniques , 1999, Theor. Comput. Sci..
[6] C.-C. Jay Kuo,et al. Watermark design for embedded wavelet image codec , 1998, Optics & Photonics.
[7] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[8] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.
[9] Subhamoy Maitra,et al. Cryptanalysis of correlation-based watermarking schemes using single watermarked copy , 2004, IEEE Signal Processing Letters.
[10] Julien P. Stern,et al. An Analysis of One of the SDMI Candidates , 2001, Information Hiding.
[11] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[12] Ramarathnam Venkatesan,et al. Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks , 2002, Information Hiding.
[13] Stéphane Mallat,et al. A Theory for Multiresolution Signal Decomposition: The Wavelet Representation , 1989, IEEE Trans. Pattern Anal. Mach. Intell..
[14] Yuan-Pei Lin,et al. Wavelet tree quantization for copyright protection watermarking , 2004, IEEE Trans. Image Process..
[15] Andreas Uhl,et al. Watermark security via wavelet filter parametrization , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[16] Joe Kilian,et al. A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.
[17] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.
[18] Darko Kirovski,et al. Replacement Attack on Arbitrary Watermarking Systems , 2002, Digital Rights Management Workshop.
[19] Jean-Paul M. G. Linnartz,et al. Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[20] Ross J. Anderson,et al. Evaluation of copyright marking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[21] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[22] Darko Kirovski,et al. Embedding and detecting spread-spectrum watermarks under estimation attacks , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[23] Subhamoy Maitra,et al. Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme , 2005, IEEE Transactions on Signal Processing.
[24] G.. A Theory for Multiresolution Signal Decomposition : The Wavelet Representation , 2004 .
[25] Teddy Furon,et al. Watermarking security part one: Theory , 2005, IS&T/SPIE Electronic Imaging.
[26] Jiri Fridrich,et al. Robust Digital Watermarking Based on Key-Dependent Basis Functions , 1998, Information Hiding.
[27] Yiwei Wang,et al. A wavelet-based watermarking algorithm for ownership verification of digital images , 2002, IEEE Trans. Image Process..