Fast Watermarking of MPEG-1/2 Streams Using Compressed-Domain Perceptual Embedding and a Generalized Correlator Detector
暂无分享,去创建一个
Michael G. Strintzis | Sotirios A. Tsaftaris | Nikolaos V. Boulgouris | Dimitrios Simitopoulos | Alexia Briassouli | M. Strintzis | A. Briassouli | N. Boulgouris | S. Tsaftaris | D. Simitopoulos
[1] Mauro Barni,et al. A new decoder for the optimum recovery of nonadditive watermarks , 2001, IEEE Trans. Image Process..
[2] John W. Betz,et al. Detection of weak random signals in IID non-Gaussian noise , 2000, IEEE Trans. Commun..
[3] Michael G. Strintzis,et al. Scalable Detection of Perceptual Watermarks in JPEG2000 Images , 2001, Communications and Multimedia Security.
[4] H. Vincent Poor,et al. An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.
[5] H. Vincent Poor,et al. An introduction to signal detection and estimation (2nd ed.) , 1994 .
[6] Ton Kalker,et al. Video watermarking system for broadcast monitoring , 1999, Electronic Imaging.
[7] Reginald L. Lagendijk,et al. Optimal differential energy watermarking of DCT encoded images and video , 2001, IEEE Trans. Image Process..
[8] Robert J. Safranek,et al. Methods for matching compressed video to ATM networks , 1995, Proceedings., International Conference on Image Processing.
[9] Christoph Busch,et al. Digital Watermarking: From Concepts to Real-Time Video Applications , 1999, IEEE Computer Graphics and Applications.
[10] I. Miller. Probability, Random Variables, and Stochastic Processes , 1966 .
[11] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[12] R. R. Clarke. Transform coding of images , 1985 .
[13] Reginald L. Lagendijk,et al. Real-Time Labeling of MPEG-2 Compressed Video , 1998, J. Vis. Commun. Image Represent..
[14] Edward J. Delp,et al. Perceptual watermarks for digital images and video , 1999, Electronic Imaging.
[15] Panagiotis Tsakalides,et al. Hidden messages in heavy-tails: DCT-domain watermark detection using alpha-stable models , 2005, IEEE Transactions on Multimedia.
[16] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[17] Thomas S. Huang,et al. A DCT-domain blind watermarking system using optimum detection on Laplacian model , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[18] Mauro Barni,et al. A DCT-domain system for robust image watermarking , 1998, Signal Process..
[19] Daniel Rodríguez. Adobe Premiere 6 , 2001 .
[20] K. R. Rao,et al. Techniques and Standards for Image, Video, and Audio Coding , 1996 .
[21] M. G. Strintzis,et al. Image watermarking resistant to geometric attacks using generalized Radon transformations , 2002, 2002 14th International Conference on Digital Signal Processing Proceedings. DSP 2002 (Cat. No.02TH8628).
[22] Alexandros Eleftheriadis,et al. Constrained and general dynamic rate shaping of compressed digital video , 1995, Proceedings., International Conference on Image Processing.
[23] J. Ilow,et al. Detection for binary transmission in a mixture of Gaussian noise and impulsive noise modeled as an alpha-stable process , 1994, IEEE Signal Processing Letters.
[24] Ebroul Izquierdo,et al. Using Invariant Image Features for Synchronization in Spread Spectrum Image Watermarking , 2002, EURASIP J. Adv. Signal Process..
[25] Sang-Hui Park,et al. Digital Watermarking For Copyright Protection Of Mpeg2 Compressed Video , 1998, International 1998 Conference on Consumer Electronics.
[26] Ingemar J. Cox,et al. Watermarking applications and their properties , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[27] Fernando Pérez-González,et al. DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..
[28] Ahmed H. Tewfik,et al. Robust audio watermarking using perceptual masking , 1998, Signal Process..
[29] Gao You-xing. Image Watermarking Method Based on Wavelet Transform , 2002 .
[30] Franck Davoine. Triangular meshes: A solution to resist to geometric distortions based watermark-removal softwares , 2000, 2000 10th European Signal Processing Conference.
[31] Joseph W. Goodman,et al. A mathematical analysis of the DCT coefficient distributions for images , 2000, IEEE Trans. Image Process..
[32] Andrew B. Watson,et al. DCT quantization matrices visually optimized for individual images , 1993, Electronic Imaging.
[33] Arun N. Netravali,et al. Digital Video: An introduction to MPEG-2 , 1996 .
[34] Michael G. Strintzis,et al. Digital watermarking of MPEG-1 and MPEG-2 multiplexed streams for copyright protection , 2001, Proceedings Second International Workshop on Digital and Computational Video.
[35] Bruno O. Shubert,et al. Random variables and stochastic processes , 1979 .
[36] Bernd Girod,et al. Watermarking of uncompressed and compressed video , 1998, Signal Process..
[37] Ioannis Pitas,et al. Robust image watermarking in the spatial domain , 1998, Signal Process..
[38] D. Applebaum. Stable non-Gaussian random processes , 1995, The Mathematical Gazette.
[39] Brian M. Sadler,et al. TDE, DOA and related parameter estimation problems in impulsive noise , 1997, Proceedings of the IEEE Signal Processing Workshop on Higher-Order Statistics.
[40] Ingemar J. Cox,et al. Rotation, scale, and translation resilient watermarking for images , 2001, IEEE Trans. Image Process..
[41] H. Saunders,et al. Probability, Random Variables and Stochastic Processes (2nd Edition) , 1989 .
[42] S. Kassam. Signal Detection in Non-Gaussian Noise , 1987 .
[43] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[44] Thierry Pun,et al. Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..
[45] Michael G. Strintzis,et al. Robust image watermarking in the subband or discrete cosine transform domain , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[46] Wenjun Zeng,et al. A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images , 1999, IEEE Trans. Image Process..
[47] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[48] John G. Proakis,et al. Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..