Secure Client-Side ST-DM Watermark Embedding
暂无分享,去创建一个
[1] Stefan Katzenbeisser,et al. Secure Embedding of Spread Spectrum Watermarks using Look-up-Tables , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[2] Alan C. Bovik,et al. Image information and visual quality , 2006, IEEE Trans. Image Process..
[3] Mauro Barni,et al. Watermarking Systems Engineering (Signal Processing and Communications, 21) , 2004 .
[4] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[5] Min Wu,et al. Exploring QIM-based anti-collusion fingerprinting for multimedia , 2006, Electronic Imaging.
[6] Min Wu,et al. Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[7] Ingemar J. Cox,et al. Watermarking as communications with side information , 1999, Proc. IEEE.
[8] K. Ramchandran,et al. Distributed source coding using syndromes (DISCUS): design and construction , 1999, Proceedings DCC'99 Data Compression Conference (Cat. No. PR00096).
[9] Ingemar J. Cox,et al. Facilitating Watermark Insertion by Preprocessing Media , 2004, EURASIP J. Adv. Signal Process..
[10] Fernando Pérez-González,et al. Performance analysis of existing and new methods for data hiding with known-host information in additive channels , 2003, IEEE Trans. Signal Process..
[11] Franco Frattolillo,et al. Watermarking Protocol for Web Context , 2007, IEEE Transactions on Information Forensics and Security.
[12] Ahmad-Reza Sadeghi,et al. Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages , 2006, ACISP.
[13] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[14] Bruno O. Shubert,et al. Random variables and stochastic processes , 1979 .
[15] Charalampos Manifavas,et al. Chameleon - A New Kind of Stream Cipher , 1997, FSE.
[16] Pedro Comesaña Alfaro,et al. Detection in quantization-based watermarking: performance and security issues , 2005, IS&T/SPIE Electronic Imaging.
[17] Stefan Katzenbeisser,et al. Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks , 2008, IEEE Transactions on Information Forensics and Security.
[18] Aarnout Brombacher,et al. Probability... , 2009, Qual. Reliab. Eng. Int..
[19] Bernd Girod,et al. Informed Watermarking , 2002 .
[20] Athanasios Papoulis,et al. Probability, Random Variables and Stochastic Processes , 1965 .
[21] Min Wu,et al. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation , 2005, IEEE Transactions on Image Processing.
[22] V. Ralph Algazi,et al. Objective picture quality scale (PQS) for image coding , 1998, IEEE Trans. Commun..
[23] Stefan Katzenbeisser,et al. A Buyer–Seller Watermarking Protocol Based on Secure Embedding , 2008, IEEE Transactions on Information Forensics and Security.
[24] Bernd Girod,et al. Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..
[25] Mauro Barni,et al. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .
[26] Kannan Ramchandran,et al. Watermarking based on duality with distributed source coding and robust optimization principles , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[27] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).