Spread spectrum watermarking: malicious attacks and counterattacks
暂无分享,去创建一个
[1] Jean-Paul M. G. Linnartz,et al. Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..
[2] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[3] Nasir D. Memon,et al. On the invertibility of invisible watermarking techniques , 1997, Proceedings of International Conference on Image Processing.
[4] M. Kutter. Watermaking resisting to translation, rotation, and scaling , 1998 .
[5] Mauro Barni,et al. DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.
[6] Ioannis Pitas,et al. A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[7] M. Yeung,et al. Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.
[8] Ahmed H. Tewfik,et al. Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.
[9] Bernd Girod,et al. Channel model for a watermark attack , 1999, Electronic Imaging.
[10] Edward J. Delp,et al. A WATERMARKING TECHNIQUE FOR DIGITAL IMAGERY: FURTHER STUDIES , 2001 .
[11] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[12] Paul G. Flikkema,et al. Spread-spectrum techniques for wireless communication , 1997, IEEE Signal Process. Mag..
[13] David J. Fleet,et al. Embedding invisible information in color images , 1997, Proceedings of International Conference on Image Processing.
[14] Ton Kalker. Watermark Estimation through Detector Observations , 1998 .
[15] Edward J. Delp,et al. A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[16] Thierry Pun,et al. Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.
[17] Robert C. Dixon,et al. Spread‐spectrum systems , 1976 .
[18] Klara Nahrstedt,et al. Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights , 1998, J. Vis. Commun. Image Represent..
[19] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[20] Germano Caronni. Assuring Ownership Rights for Digital Images , 1995, VIS.
[21] Andrew Z. Tirkel,et al. Image and watermark registration , 1998, Signal Process..
[22] Lawrence O'Gorman,et al. Protecting ownership rights through digital watermarking , 1996 .
[23] Jean-Paul M. G. Linnartz,et al. Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[24] Eckhard Koch,et al. Towards Robust and Hidden Image Copyright Labeling , 1995 .
[25] Bernd Girod,et al. Watermarking of uncompressed and compressed video , 1998, Signal Process..
[26] Reginald L. Lagendijk,et al. Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[27] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[28] D. Pearson,et al. Attack operators for digitally watermarked images , 1998 .
[29] Jean-Paul M. G. Linnartz,et al. Public watermarks and resistance to tampering , 1997, Proceedings of International Conference on Image Processing.
[30] Thierry Pun,et al. Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..
[31] Minerva M. Yeung,et al. An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.