LMS-based attack on watermark public detectors
暂无分享,去创建一个
[1] Pierre Duhamel,et al. Unified approach of asymmetric watermarking schemes , 2001, IS&T/SPIE Electronic Imaging.
[2] Jean-Paul M. G. Linnartz,et al. Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.
[3] Jean-Paul M. G. Linnartz,et al. Public watermarks and resistance to tampering , 1997, Proceedings of International Conference on Image Processing.
[4] S. Haykin,et al. Adaptive Filter Theory , 1986 .
[5] Mohamed F. Mansour,et al. Secure watermark detection with nonparametric decision boundaries , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[6] Jean-Paul M. G. Linnartz,et al. Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[7] C. Sparrow. The Fractal Geometry of Nature , 1984 .