Perfomance analysis of the Fridrich-Goljan self-embedding authentication method
暂无分享,去创建一个
[1] Ingemar J. Cox,et al. Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[2] Jiri Fridrich,et al. Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[3] H. V. Trees. Detection, Estimation, And Modulation Theory , 2001 .
[4] Fernando Pérez-González,et al. Performance Analysis of Fridrich–Goljan Self-Embedding Authentication Method , 2009, IEEE Transactions on Information Forensics and Security.
[5] K A Birney,et al. On the modeling of DCT and subband image data for compression , 1995, IEEE Trans. Image Process..
[6] Harry L. Van Trees,et al. Detection, Estimation, and Modulation Theory, Part I , 1968 .