Amplitude-adaptive spread-spectrum data embedding
暂无分享,去创建一个
Yanqing Guo | Bo Wang | Qian Liu | Ming Li | Xiangwei Kong
[1] Min Wu,et al. Data hiding in binary image for authentication and annotation , 2004, IEEE Transactions on Multimedia.
[2] KokSheik Wong,et al. An Overview of Information Hiding in H.264/AVC Compressed Video , 2014, IEEE Transactions on Circuits and Systems for Video Technology.
[3] Dimitris A. Pados,et al. SINR, bit error rate, and Shannon capacity optimized spread-spectrum steganography , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[4] Hamid Reza Tohidypour,et al. Robust quantisation index modulation-based approach for image watermarking , 2013, IET Image Process..
[5] Henrique S. Malvar,et al. Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..
[6] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[7] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[8] Yiyan Wu,et al. A New Approach for Optimal Multiple Watermarks Injection , 2011, IEEE Signal Processing Letters.
[9] Ming Li,et al. Extracting Spread-Spectrum Hidden Data From Digital Media , 2013, IEEE Transactions on Information Forensics and Security.
[10] Di Xiao,et al. Separable data hiding in encrypted image based on compressive sensing , 2014 .
[11] Rui Li,et al. A digital watermarking approach to secure and precise range query processing in sensor networks , 2013, 2013 Proceedings IEEE INFOCOM.
[12] Sen Bai,et al. Steganography Integration Into a Low-Bit Rate Speech Codec , 2012, IEEE Transactions on Information Forensics and Security.
[13] Alex ChiChung Kot,et al. On Establishing Edge Adaptive Grid for Bilevel Image Data Hiding , 2013, IEEE Transactions on Information Forensics and Security.
[14] Wen-Hsiang Tsai,et al. Line-Based Cubism-Like Image—A New Type of Art Image and its Application to Lossless Data Hiding , 2012, IEEE Transactions on Information Forensics and Security.
[15] Wei Lu,et al. Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture , 2015, IEEE Transactions on Information Forensics and Security.
[16] T. Geetamma,et al. An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain , 2014 .
[17] Thomas S. Huang,et al. An additive approach to transform-domain information hiding and optimum detection structure , 2001, IEEE Trans. Multim..
[18] Z. Jane Wang,et al. An Improved Multiplicative Spread Spectrum Embedding Scheme for Data Hiding , 2012, IEEE Transactions on Information Forensics and Security.
[19] Z. Jane Wang,et al. A Framework of Multiplicative Spread Spectrum Embedding for Data Hiding: Performance, Decoder and Signature Design , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[20] Mauro Barni,et al. Capacity of full frame DCT image watermarks , 2000, IEEE Trans. Image Process..
[21] Mauro Barni,et al. Optimum decoding and detection of multiplicative watermarks , 2003, IEEE Trans. Signal Process..
[22] Joseph W. Goodman,et al. A mathematical analysis of the DCT coefficient distributions for images , 2000, IEEE Trans. Image Process..
[23] Yao Zhao,et al. LDFT-Based Watermarking Resilient to Local Desynchronization Attacks , 2013, IEEE Transactions on Cybernetics.
[24] Hsien-Wen Tseng,et al. High-payload block-based data hiding scheme using hybrid edge detector with minimal distortion , 2014, IET Image Process..
[25] Ahmed H. Tewfik,et al. Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.
[26] Ying Wang,et al. Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions , 2007, IEEE Transactions on Information Theory.
[27] Deepa Kundur,et al. Analysis and design of watermarking algorithms for improved resistance to compression , 2004, IEEE Transactions on Image Processing.
[28] Mauro Barni,et al. A new decoder for the optimum recovery of nonadditive watermarks , 2001, IEEE Trans. Image Process..
[29] Dimitris A. Pados,et al. Optimal Signature Design for Spread-Spectrum Steganography , 2007, IEEE Transactions on Image Processing.
[30] Pierre Moulin,et al. Design and statistical analysis of a hash-aided image watermarking system , 2004, IEEE Transactions on Image Processing.
[31] Tianqing Zhu,et al. Correlated Differential Privacy: Hiding Information in Non-IID Data Set , 2015, IEEE Transactions on Information Forensics and Security.
[32] Cheng Yang,et al. A Survey of JND Models in Digital Image Watermarking , 2013 .
[33] Z. Jane Wang,et al. Correlation-and-Bit-Aware Spread Spectrum Embedding for Data Hiding , 2011, IEEE Transactions on Information Forensics and Security.
[34] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[35] Pierre Moulin,et al. The zero-rate spread-spectrum watermarking game , 2003, IEEE Trans. Signal Process..
[36] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..