Practical performance analysis of secure modulations for woa spread-spectrum based image watermarking
暂无分享,去创建一个
[1] François Cayre,et al. Achieving subspace or key security for WOA using natural or circular watermarking , 2006, MM&Sec '06.
[2] Teddy Furon,et al. Watermarking Attack: Security of WSS Techniques , 2004, IWDW.
[3] Mauro Barni,et al. DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.
[4] Aapo Hyvärinen,et al. A Fast Fixed-Point Algorithm for Independent Component Analysis , 1997, Neural Computation.
[5] Henrique S. Malvar,et al. Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..
[6] François Cayre,et al. Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding , 2008, IEEE Transactions on Information Forensics and Security.
[7] Aapo Hyvärinen,et al. The Fixed-Point Algorithm and Maximum Likelihood Estimation for Independent Component Analysis , 1999, Neural Processing Letters.
[8] François Cayre,et al. Natural Watermarking: A Secure Spread Spectrum Technique for WOA , 2006, Information Hiding.
[9] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[10] Thierry Pun,et al. Method for the estimation and recovering from general affine transforms in digital watermarking applications , 2002, IS&T/SPIE Electronic Imaging.
[11] Aapo Hyvärinen,et al. Fast and robust fixed-point algorithms for independent component analysis , 1999, IEEE Trans. Neural Networks.
[12] C. Fontaine,et al. Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.
[13] Gwenaël J. Doërr,et al. Practical Security Analysis of Dirty Paper Trellis Watermarking , 2007, Information Hiding.