Robust watermarking against print and scan attack through efficient modeling algorithm
暂无分享,去创建一个
[1] Johan A. K. Suykens,et al. Artificial Neural Networks for Modeling and Control of Non-Linear Systems , 1995 .
[2] S. Han,et al. A survey of digital image watermarking techniques , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..
[3] Rafael C. González,et al. Local Determination of a Moving Contrast Edge , 1985, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[4] B. S. Manjunath,et al. Modeling the print-scan process for resilient data hiding , 2005, IS&T/SPIE Electronic Imaging.
[5] Thierry Pun,et al. Method for the estimation and recovering from general affine transforms in digital watermarking applications , 2002, IS&T/SPIE Electronic Imaging.
[6] Tapio Seppänen,et al. Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding , 2007, IWDW.
[7] Gaurav Sharma,et al. Continuous Phase-Modulated Halftones , 2009, IEEE Transactions on Image Processing.
[8] Tapio Seppänen,et al. Image watermarking with feature point based synchronization robust to print-scan attack , 2012, J. Vis. Commun. Image Represent..
[9] David W. Coit,et al. Multi-objective optimization using genetic algorithms: A tutorial , 2006, Reliab. Eng. Syst. Saf..
[10] Xiamu Niu,et al. Print-and-scan model and the watermarking countermeasure , 2005, Image Vis. Comput..
[11] Yao Zhao,et al. Image Watermarking Robust to Print and Generation Copy , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).
[12] Vishal Monga,et al. Orientation Modulation for Data Hiding in Clustered-Dot Halftone Prints , 2010, IEEE Transactions on Image Processing.
[13] Kalyanmoy Deb,et al. A fast and elitist multiobjective genetic algorithm: NSGA-II , 2002, IEEE Trans. Evol. Comput..
[14] Qibin Sun,et al. A practical print-scan resilient watermarking scheme , 2005, IEEE International Conference on Image Processing 2005.
[15] B. S. Manjunath,et al. `Print and Scan' Resilient Data Hiding in Images , 2006, IEEE Transactions on Information Forensics and Security.
[16] Min-Jen Tsai,et al. DCT and DWT-based image watermarking by using subsampling , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..
[17] M. Jamzad,et al. Computing watermark capacity in images according to their quad tree , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..
[18] Mansour Jamzad,et al. An Algorithm for Modeling Print and Scan Operations Used for Watermarking , 2008, IWDW.
[19] Tapio Seppänen,et al. Wavelet Domain Print-Scan and JPEG Resilient Data Hiding Method , 2006, IWDW.
[20] Soo-Chang Pei,et al. Paired Subimage Matching Watermarking Method on Ordered Dither Images and Its High-Quality Progressive Coding , 2008, IEEE Transactions on Multimedia.
[21] Mohsen Ashourian,et al. Digital watermarking of three-dimensional polygonal models in the spherical coordinate system , 2004 .
[22] Wenjun Zeng,et al. Efficient General Print-Scanning Resilient Data Hiding Based on Uniform Log-Polar Mapping , 2010, IEEE Transactions on Information Forensics and Security.
[23] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[24] Jiann-Der Lee,et al. Oriented Modulation for Watermarking in Direct Binary Search Halftone Images , 2012, IEEE Transactions on Image Processing.
[25] Tapio Seppänen,et al. Image watermarking with a directed periodic pattern to embed multibit messages resilient to print-scan and compound attacks , 2010, J. Syst. Softw..
[26] P. Greenwood,et al. A Guide to Chi-Squared Testing , 1996 .
[27] Chun-Shien Lu,et al. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property , 2004 .
[28] Joachim M. Buhmann,et al. Empirical evaluation of dissimilarity measures for color and texture , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.
[29] Stefan M. Rüger,et al. Evaluation of Texture Features for Content-Based Image Retrieval , 2004, CIVR.
[30] Johan A. K. Suykens,et al. Artificial neural networks for modelling and control of non-linear systems , 1995 .
[31] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..