暂无分享,去创建一个
[1] No Value,et al. IEEE International Conference on Image Processing , 2003 .
[2] Javaid A. Sheikh,et al. Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing , 2016, Digit. Signal Process..
[3] Ton Kalker,et al. Considerations on watermarking security , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).
[4] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[5] S. Behnia,et al. Multiple-watermarking scheme based on improved chaotic maps , 2010 .
[6] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[7] Tiegang Gao,et al. A novel reversible robust watermarking algorithm based on chaotic system , 2013, Digit. Signal Process..
[8] N. Venkateswaran,et al. Secured medical image watermarking with DNA codec , 2015, Multimedia Tools and Applications.
[9] Kwok-Tung Lo,et al. Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2011, Signal Process..
[10] Mehdi Khalili,et al. DCT-Arnold chaotic based watermarking using JPEG-YCbCr , 2015 .
[11] H. Dai,et al. Robust blind image watermarking based on chaotic mixtures , 2015 .
[12] Nikolaos G. Bourbakis,et al. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..
[13] Fernando Pérez-González,et al. Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis , 2005, Information Hiding.
[14] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[15] Ingemar J. Cox,et al. Watermarking Is Not Cryptography , 2006, IWDW.
[16] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[17] Fernando Pérez-González,et al. Security of Lattice-Based Data Hiding Against the Known Message Attack , 2006, IEEE Transactions on Information Forensics and Security.
[18] Fernando Pérez-González,et al. Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack , 2008, IEEE Transactions on Information Forensics and Security.
[19] Teddy Furon,et al. A New Measure of Watermarking Security: The Effective Key Length , 2013, IEEE Transactions on Information Forensics and Security.
[20] Dong Ni,et al. Optimal image watermarking scheme based on chaotic map and quaternion wavelet transform , 2014 .
[21] Sajjad Shaukat Jamal,et al. An efficient scheme for digital watermarking using chaotic map , 2013 .
[22] Xiaomin Wang,et al. Secure chaotic system with application to chaotic ciphers , 2013, Inf. Sci..
[23] François Cayre,et al. Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding , 2008, IEEE Transactions on Information Forensics and Security.
[24] C. Fontaine,et al. Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.
[25] Sodeif Ahadpour,et al. Design and implementation of coupled chaotic maps in watermarking , 2014, Appl. Soft Comput..