Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime
暂无分享,去创建一个
[1] M. Barni,et al. Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding , 2005, IEEE Transactions on Signal Processing.
[2] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[3] Ingemar J. Cox,et al. Informed embedding: exploiting image and detector information during watermark insertion , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[4] Teddy Furon,et al. Broken Arrows , 2008, EURASIP J. Inf. Secur..
[5] Ali N. Akansu,et al. Signaling methods for multimedia steganography , 2004, IEEE Transactions on Signal Processing.
[6] M. Barni,et al. Informed watermarking by means of orthogonal and pseudo-random dirty paper coding , 2005 .
[7] Max H. M. Costa,et al. Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.
[8] Mauro Barni,et al. A general framework for robust watermarking security , 2003, Signal Process..
[9] Russell M. Mersereau,et al. A Framework for Robust Watermarking of H.264-Encoded Video With Controllable Detection Performance , 2007, IEEE Transactions on Information Forensics and Security.
[10] Bo Zhang,et al. Statistically Robust Detection of Multiplicative Spread-Spectrum Watermarks , 2007, IEEE Transactions on Information Forensics and Security.
[11] Ingemar J. Cox,et al. Watermarking as communications with side information , 1999, Proc. IEEE.
[12] Fernando Pérez-González,et al. DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..
[13] Mauro Barni,et al. Effectiveness of exhaustive search and template matching against watermark desynchronization , 2005, IEEE Signal Processing Letters.
[14] Henrique S. Malvar,et al. Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..
[15] Benoit M. Macq,et al. JANIS: Just Another n-order Side-Informed Watermarking Scheme , 2002, Proceedings. International Conference on Image Processing.
[16] Pedro Comesaña Alfaro,et al. Detection in quantization-based watermarking: performance and security issues , 2005, IS&T/SPIE Electronic Imaging.
[17] Mauro Barni,et al. Expanding the class of watermark de-synchronization attacks , 2007, MM&Sec.
[18] Fernando Pérez-González,et al. Performance analysis of existing and new methods for data hiding with known-host information in additive channels , 2003, IEEE Trans. Signal Process..
[19] C. Mosquera,et al. Rational dither modulation: a high-rate data-hiding method invariant to gain attacks , 2005, IEEE Transactions on Signal Processing.
[20] Wenjun Zeng,et al. Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking , 2007, IEEE Transactions on Information Forensics and Security.
[21] Pierre Moulin,et al. Error exponents for one-bit watermarking , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[22] Teddy Furon,et al. Some theoretical aspects of watermarking detection , 2006, Electronic Imaging.
[23] H. Vincent Poor,et al. An introduction to signal detection and estimation (2nd ed.) , 1994 .
[24] Mauro Barni,et al. A new decoder for the optimum recovery of nonadditive watermarks , 2001, IEEE Trans. Image Process..
[25] Teddy Furon,et al. A Constructive and Unifying Framework for Zero-Bit Watermarking , 2006, IEEE Transactions on Information Forensics and Security.
[26] Neri Merhav,et al. Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources , 2008, IEEE Transactions on Information Theory.
[27] H. Vincent Poor,et al. An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.
[28] Roderick Wong,et al. Asymptotic approximations of integrals , 1989, Classics in applied mathematics.