A copyright protection using watermarking scheme based on nonlinear permutation and its quality metrics
暂无分享,去创建一个
[1] Gerard Salton,et al. Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..
[2] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[3] Qiang Wang,et al. On constructing permutations of finite fields , 2011, Finite Fields Their Appl..
[4] Mohamed A. Belal,et al. Digital Watermarking Techniques, Applications And Attacks Applied To Digital Media: A Survey , 2012 .
[5] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[6] K. Hemachandran,et al. AN ALGORITHM FOR DIGITAL WATERMARKING OF STILL IMAGES FOR COPYRIGHT PROTECTION , 2012 .
[7] Jean-Luc Falcone,et al. A Correlation-Based Distance , 2004, ArXiv.
[8] Josef Pieprzyk,et al. Non-linearity of Exponent Permutations , 1990, EUROCRYPT.
[9] Tariq Shah,et al. A color image watermarking scheme based on affine transformation and S4 permutation , 2014, Neural Computing and Applications.
[10] Yan Zhang,et al. On the Euclidean distance of images , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[11] Michael R. Lyu,et al. A novel scheme for hybrid digital video watermarking: approach, evaluation and experimentation , 2005, IEEE Transactions on Circuits and Systems for Video Technology.
[12] Neranga Fernando,et al. A Study of Permutation Polynomials over Finite Fields , 2013 .
[13] Michael R. Lyu,et al. A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code , 2003, ICICS.
[14] Janusz Szmidt,et al. Nonlinearity of the Round Function , 2005, IACR Cryptol. ePrint Arch..
[15] Marie Henderson,et al. A note on constructing permutation polynomials , 2009, Finite Fields Their Appl..
[16] Ahmet M. Eskicioglu,et al. Secure DCT-SVD Domain Image Watermarking : Embedding Data in All Frequencies , 2004 .
[17] Borko Furht,et al. Survey of Watermarking Techniques and Applications , 2004 .
[18] Chang Min,et al. A Review of Digital Image Watermarking , 2003 .
[19] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[20] Joachim von zur Gathen,et al. Algorithms for Exponentiation in Finite Fields , 2000, J. Symb. Comput..
[21] Jiang Xuehua. Digital Watermarking and its Application in Image Copyright Protection , 2010, 2010 International Conference on Intelligent Computation Technology and Automation.
[22] Edward J. Delp,et al. Digital watermarking: algorithms and applications , 2001, IEEE Signal Process. Mag..
[23] Chang-Tsun Li,et al. One-dimensional neighborhood forming strategy for fragile watermarking , 2003, J. Electronic Imaging.
[24] Robert C. Hilborn,et al. Chaos And Nonlinear Dynamics: An Introduction for Scientists and Engineers , 1994 .
[25] Vincent Rijmen,et al. Algebraic Construction and Cryptographic Properties of Rijndael Substitution Box , 2012 .
[26] Prabhishek Singh,et al. A Survey of Digital Watermarking Techniques, Applications and Attacks , 2013 .
[27] Ahmet M. Eskicioglu,et al. Robust DWT-SVD domain image watermarking: embedding data in all frequencies , 2004, MM&Sec '04.