Optimal Watermark Embedding and Detection Strategies Under General Worst Case Attacks
暂无分享,去创建一个
[1] Ingemar J. Cox,et al. Watermarking as communications with side information , 1999, Proc. IEEE.
[2] Neri Merhav,et al. Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources , 2008, IEEE Transactions on Information Theory.
[3] Harry L. Van Trees,et al. Detection, Estimation, and Modulation Theory, Part I , 1968 .
[4] Neri Merhav,et al. On the error exponent and capacity games of private watermarking systems , 2003, IEEE Trans. Inf. Theory.
[5] Neri Merhav. Universal detection of messages via finite-state channels , 2000, IEEE Trans. Inf. Theory.
[6] Edward J. Delp,et al. Digital watermarking: algorithms and applications , 2001, IEEE Signal Process. Mag..
[7] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[8] Jean-Paul M. G. Linnartz,et al. Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks , 1998, Information Hiding.
[9] Teddy Furon,et al. A Constructive and Unifying Framework for Zero-Bit Watermarking , 2006, IEEE Transactions on Information Forensics and Security.
[10] Neri Merhav,et al. An Information – Theoretic View of Watermark Embedding – Detection and Geometric Attacks , 2005 .
[11] Jeffrey A. Bloom,et al. Computing the Probability of False Watermark Detection , 1999, Information Hiding.
[12] Henrique S. Malvar,et al. Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..
[13] Ingemar J. Cox,et al. Informed embedding: exploiting image and detector information during watermark insertion , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[14] Bernd Girod,et al. Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.