A Review of of Watermarking Principles and Practices
暂无分享,去创建一个
Ingemar J. Cox | Ton Kalker | Matthew L. Miller | Jmg Linnartz | I. Cox | T. Kalker | Jmg Linnartz | J. Linnartz
[1] Jean-Paul M. G. Linnartz,et al. Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..
[2] Ton Kalker. Watermark Estimation through Detector Observations , 1998 .
[3] Ioannis Pitas,et al. Image watermarking using DCT domain constraints , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[4] Lawrence O'Gorman,et al. Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.
[5] Jean-Paul M. G. Linnartz,et al. Public watermarks and resistance to tampering , 1997, Proceedings of International Conference on Image Processing.
[6] Jean-Paul M. G. Linnartz,et al. Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks , 1998, Information Hiding.
[7] Eckhard Koch,et al. Copyright Protection for Multimedia Data , 1994 .
[8] Germano Caronni. Assuring Ownership Rights for Digital Images , 1995, VIS.
[9] Lawrence O'Gorman,et al. Watermarking Document Images with Bounding Box Expansion , 1996, Information Hiding.
[10] Awj Werner Oomen,et al. A Variable-Bit-Rate Buried-Data Channel for Compact Disc , 1995 .
[11] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[12] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[13] Fernando Pérez-González,et al. Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images , 1998, IEEE J. Sel. Areas Commun..
[14] Eckhard Koch,et al. Towards Robust and Hidden Image Copyright Labeling , 1995 .
[15] K. Tanaka,et al. Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.
[16] David Kahn,et al. The History of Steganography , 1996, Information Hiding.
[17] Ingemar J. Cox,et al. A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.
[18] Joshua R. Smith,et al. Modulation and Information Hiding in Images , 1996, Information Hiding.
[19] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[20] Ja-Ling Wu,et al. Hidden signatures in images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[21] Ingemar J. Cox,et al. Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[22] Robert J. Safranek,et al. Signal compression based on models of human perception , 1993, Proc. IEEE.
[23] Wenjun Zeng,et al. Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..
[24] Jean-Paul M. G. Linnartz,et al. Improved watermark detection reliability using filtering before correlation , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[25] Jean-Paul M. G. Linnartz,et al. Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.
[26] Ingemar J. Cox,et al. Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.
[27] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[28] Ahmed H. Tewfik,et al. Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[29] Francis M. Boland,et al. Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[30] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[31] Jean-Paul M. G. Linnartz,et al. Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).