A new two-dimensional quantization method for digital image watermarking
暂无分享,去创建一个
[1] R. Zamir,et al. On lattice quantization noise , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[2] Ralf Steinmetz,et al. Robust MPEG video watermarking technologies , 1998, MULTIMEDIA '98.
[3] Victor A. Skormin,et al. SVD-Based Approach to Transparent Embedding Data into Digital Images , 2001, MMM-ACNS.
[4] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[5] Josep Domingo-Ferrer,et al. Invertible spread-spectrum watermarking for image authentication and multilevel access to precision-critical watermarked images , 2002, Proceedings. International Conference on Information Technology: Coding and Computing.
[6] Bernd Girod,et al. Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..
[7] Edward J. Delp,et al. Benchmarking of image watermarking algorithms for digital rights management , 2004, Proceedings of the IEEE.
[8] A. Aydin Alatan,et al. Data hiding using trellis coded quantization , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[9] Pierre Moulin,et al. Data-Hiding Codes , 2005, Proceedings of the IEEE.
[10] Fernando Pérez-González,et al. An accurate analysis of scalar quantization-based data hiding , 2006, IEEE Transactions on Information Forensics and Security.
[11] Fernando Pérez-González,et al. On distortion-compensated dither modulation data-hiding with repetition coding , 2006, IEEE Transactions on Signal Processing.
[12] Soo-Chang Pei,et al. Tamper proofing and attack identification of corrupted image by using semi-fragile multiple-watermarking algorithm , 2006, ASIACCS '06.
[13] Xiaofeng Wang,et al. A new implementation of trellis coded quantization based data hiding , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[14] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[15] Nora Cuppens-Boulahia,et al. Watermarking to Enforce Medical Image Access and Usage Control Policy , 2010, 2010 Sixth International Conference on Signal-Image Technology and Internet Based Systems.
[16] Martin Reisslein,et al. Objective Video Quality Assessment Methods: A Classification, Review, and Performance Comparison , 2011, IEEE Transactions on Broadcasting.
[17] Stefan Katzenbeisser,et al. Detection of Copy-move Forgery in Digital Images Using Radon Transformation and Phase Correlation , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[18] M. Juhola,et al. A new blind adaptive watermarking method based on singular value decomposition , 2013, PROCEEDINGS OF 2013 International Conference on Sensor Network Security Technology and Privacy Communication System.
[19] Martti Juhola,et al. Quantization Based Watermarking Approach with Gain Attack Recovery , 2014, 2014 International Conference on Digital Image Computing: Techniques and Applications (DICTA).
[20] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .