The Control Technology of Integrity and Legitimacy of LUT-Oriented Information Object Usage by Self-Recovering Digital Watermark
暂无分享,去创建一个
[1] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[2] Jessica J. Fridrich,et al. Lossless Data Embedding—New Paradigm in Digital Watermarking , 2002, EURASIP J. Adv. Signal Process..
[3] Raphael C.-W. Phan. Review of Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition by Ross J. Anderson , 2009, Cryptologia.
[4] Nasir D. Memon,et al. Watermarking and ownership problem: a revisit , 2005, DRM '05.
[5] Swarup Bhunia,et al. Reconfigurable computing using content addressable memory for improved performance and resource usage , 2008, 2008 45th ACM/IEEE Design Automation Conference.
[6] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[7] K. Zashcholkin. STEGANOGRAPHY DATA HIDING IN LUT-ORIENTED HARDWARE CONTAINERS METHOD DEVELOPMENT , 2014 .
[8] P. P. Deepthi,et al. An Integrity Verification System for Images Using Hashing and Watermarking , 2012, 2012 International Conference on Communication Systems and Network Technologies.
[9] Huazhong Shu,et al. A Watermarking-Based Medical Image Integrity Control System and an Image Moment Signature for Tampering Characterization , 2013, IEEE Journal of Biomedical and Health Informatics.
[10] Ryan Kastner,et al. Handbook of FPGA Design Security , 2010 .
[11] Stephen D. Wolthusen,et al. Techniques and Applications of Digital Watermarking and Content Protection , 2003, Artech House computer security series.
[12] Jessica J. Fridrich,et al. Distortion-Free Data Embedding for Images , 2001, Information Hiding.
[13] Frank Y. Shih. Multimedia security : watermarking, steganography, and forensics , 2012 .