A cryptographic watermark embedding technique
暂无分享,去创建一个
T. Li | J. Ren | M. Nadooshan | J. Ren | T. Li | M. Nadooshan
[1] Nasir D. Memon,et al. On sequential watermark detection , 2003, IEEE Trans. Signal Process..
[2] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[3] K. Conrad,et al. Finite Fields , 2018, Series and Products in the Development of Mathematics.
[4] Chin-Chen Chang,et al. A watermarking technique based on one-way hash functions , 1999, IEEE Trans. Consumer Electron..
[5] Henrique S. Malvar,et al. Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..
[6] Fernando Pérez-González,et al. Performance analysis of existing and new methods for data hiding with known-host information in additive channels , 2003, IEEE Trans. Signal Process..
[7] Pierre Moulin,et al. A framework for evaluating the data-hiding capacity of image sources , 2002, IEEE Trans. Image Process..
[8] Rudolf Lide,et al. Finite fields , 1983 .
[9] Ahmed H. Tewfik,et al. Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.