A commutative digital image watermarking and encryption method in the tree structured Haar transform domain
暂无分享,去创建一个
Alessandro Neri | Francesco G. B. De Natale | Giulia Boato | Federica Battisti | Marco Carli | Michela Cancellaro | M. Carli | A. Neri | F. Battisti | G. Boato | F. D. Natale | M. Cancellaro
[1] Riccardo Scopigno,et al. Image decomposition for selective encryption and flexible network services , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[2] B.A. Assanovich. Embedding bits in compressed data for selective encryption and watermarking , 2008, 2008 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering.
[3] Andreas Uhl,et al. SELECTIVE BITPLANE ENCRYPTION FOR SECURE TRANSMISSION OF IMAGE DATA IN MOBILE ENVIRONMENTS , 2002 .
[4] Ahmad-Reza Sadeghi,et al. Zero-Knowledge Watermark Detection and Proof of Ownership , 2001, Information Hiding.
[5] Alessandro Neri,et al. Secure access control to hidden data by biometric features , 2007, SPIE Defense + Commercial Sensing.
[6] Francesco G. B. De Natale,et al. An improved asymmetric watermarking scheme suitable for copy protection , 2006, IEEE Transactions on Signal Processing.
[7] Amir Said. Measuring the strength of partial encryption schemes , 2005, IEEE International Conference on Image Processing 2005.
[8] Shiguo Lian,et al. Commutative watermarking and encryption for media data , 2006 .
[9] Shiguo Lian,et al. Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[10] Walter Geisselhardt,et al. DIGITAL IMAGE WATERMARKING USING DISCRETE WAVELET TRANSFORM : PERFORMANCE COMPARISON OF ERROR CORRECTION CODES , 2022 .
[11] Ton Kalker,et al. A Cryptographic Method for Secure Watermark Detection , 2006, Information Hiding.
[12] Stefan Katzenbeisser,et al. Watermark detection with zero-knowledge disclosure , 2003, Multimedia Systems.
[13] S. Katzenbeisser,et al. First Summary Report on Hybrid Systems , 2005 .
[14] Neri Merhav. On Joint Coding for Watermarking and Encryption , 2005, Information Hiding.
[15] Stefan Katzenbeisser,et al. Combining Tardos Fingerprinting Codes and Fingercasting , 2007, Information Hiding.
[16] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[17] Bharat K. Bhargava,et al. On the Design of Perceptual MPEG-Video Encryption Algorithms , 2005, IEEE Transactions on Circuits and Systems for Video Technology.
[18] Andreas Uhl,et al. Robustness against unauthorized watermark removal attacks via key-dependent wavelet packet subband structures , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[19] Bernd Girod,et al. Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..
[20] Fabien A. P. Petitcolas,et al. Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..
[21] Ingemar J. Cox,et al. Watermarking Is Not Cryptography , 2006, IWDW.
[22] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[23] Andreas Uhl,et al. Selective encryption of wavelet-packet encoded image data: efficiency and security , 2003, Multimedia Systems.
[24] Ioannis Pitas,et al. Digital watermarking in the fractional Fourier transformation domain , 2001, J. Netw. Comput. Appl..
[25] Stefan Katzenbeisser,et al. Secure Embedding of Spread Spectrum Watermarks using Look-up-Tables , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[26] Robert W. Shirey,et al. Internet Security Glossary , 2000, RFC.
[27] Kehar Singh,et al. Double random fractional Fourier domain encoding for optical security , 2000 .
[28] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[29] PitasIoannis,et al. Digital watermarking in the fractional Fourier transformation domain , 2001 .
[30] Jaakko Astola,et al. Tree-Structured Haar Transforms , 2004, Journal of Mathematical Imaging and Vision.
[31] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[32] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[33] Thierry Pun,et al. Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..
[34] Christophe De Vleeschouwer,et al. Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..
[35] Ahmad-Reza Sadeghi,et al. The Marriage of Cryptography and Watermarking - Beneficial and Challenging for Secure Watermarking and Detection , 2008, IWDW.