Improvement of the watermark detector performance using image enhancement filters
暂无分享,去创建一个
[1] Fabien A. P. Petitcolas,et al. Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..
[2] Lam,et al. Iterative statistical approach to blind image deconvolution , 2000, Journal of the Optical Society of America. A, Optics, image science, and vision.
[3] Ingemar J. Cox,et al. Rotation, scale, and translation resilient watermarking for images , 2001, IEEE Trans. Image Process..
[4] Nazim Fatès,et al. Public automated web-based evaluation service for watermarking schemes: StirMark benchmark , 2001, IS&T/SPIE Electronic Imaging.
[5] P. Laguna,et al. Signal Processing , 2002, Yearbook of Medical Informatics.
[6] Yan Lin,et al. A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression , 2003, IEEE Trans. Circuits Syst. Video Technol..
[7] W. C. Chu,et al. DCT-based image watermarking using subsampling , 2003, IEEE Trans. Multim..
[8] Yuan-Pei Lin,et al. Wavelet tree quantization for copyright protection watermarking , 2004, IEEE Transactions on Image Processing.
[9] B. S. Manjunath,et al. Estimating and undoing rotation for print-scan resilient data hiding , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[10] K.B. Raja,et al. A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.
[11] Qibin Sun,et al. A practical print-scan resilient watermarking scheme , 2005, IEEE International Conference on Image Processing 2005.
[12] M.-R. Akbarzadeh-T,et al. A New Genetic Algorithm Approach for Secure JPEG Steganography , 2006, 2006 IEEE International Conference on Engineering of Intelligent Systems.
[13] A. Al-Haj. Combined DWT-DCT Digital Image Watermarking , 2007 .
[14] Tapio Seppänen,et al. Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding , 2007, IWDW.
[15] Gaurav Bhatnagar,et al. A new robust reference watermarking scheme based on DWT-SVD , 2009, Comput. Stand. Interfaces.
[16] Ming-Shi Wang,et al. A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography , 2009, Comput. Stand. Interfaces.
[17] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[18] Wenjun Zeng,et al. Efficient General Print-Scanning Resilient Data Hiding Based on Uniform Log-Polar Mapping , 2010, IEEE Transactions on Information Forensics and Security.
[19] Lidija Mandic,et al. Discrete Fourier transform-based watermarking method with an optimal implementation radius , 2011, J. Electronic Imaging.
[20] Kshetrimayum Jenita Devi. A Secure Image Steganography Using LSB Technique and Random Pseudo Random Encoding Technique , 2013 .