A source and channel coding approach to data hiding with application to hiding speech in video
暂无分享,去创建一个
[1] M. Yeung,et al. Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.
[2] B. S. Manjunath,et al. A robust data hiding technique using multidimensional lattices , 1998, Proceedings IEEE International Forum on Research and Technology Advances in Digital Libraries -ADL'98-.
[3] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[4] Ahmed H. Tewfik,et al. Object-based transparent video watermarking , 1997, Proceedings of First Signal Processing Society Workshop on Multimedia Signal Processing.
[5] Bernd Girod,et al. Digital watermarking of raw and compressed video , 1996, Other Conferences.
[6] Bernd Girod,et al. Watermarking of MPEG-2 encoded video without decoding and reencoding , 1997, Electronic Imaging.
[7] N. J. A. Sloane,et al. Sphere Packings, Lattices and Groups , 1987, Grundlehren der mathematischen Wissenschaften.
[8] N. J. A. Sloane,et al. Voronoi regions of lattices, second moments of polytopes, and quantization , 1982, IEEE Trans. Inf. Theory.
[9] Kineo Matsui,et al. Embedding a seal into a picture under orthogonal wavelet transform , 1996, Proceedings of the Third IEEE International Conference on Multimedia Computing and Systems.
[10] Ahmed H. Tewfik,et al. Multiresolution video watermarking using perceptual models and scene segmentation , 1997, Proceedings of International Conference on Image Processing.
[11] Ahmed H. Tewfik,et al. Data hiding for video-in-video , 1997, Proceedings of International Conference on Image Processing.
[12] Allen Gersho,et al. Vector quantization and signal compression , 1991, The Kluwer international series in engineering and computer science.
[13] N. J. A. Sloane,et al. Tables of sphere packings and spherical codes , 1981, IEEE Trans. Inf. Theory.