Transportation Spherical Watermarking
暂无分享,去创建一个
[1] Benoit M. Macq,et al. Comparison of secure spread-spectrum modulations applied to still image watermarking , 2009, Ann. des Télécommunications.
[2] François Cayre,et al. Achieving subspace or key security for WOA using natural or circular watermarking , 2006, MM&Sec '06.
[3] Shu Lin,et al. Error control coding : fundamentals and applications , 1983 .
[4] Yuan-Gen Wang,et al. Recursive optimization of spherical watermarking using transportation theory , 2015, 2015 IEEE International Conference on Image Processing (ICIP).
[5] Fernando Pérez-González,et al. Security of spread-spectrum-based data hiding , 2007, Electronic Imaging.
[6] Jidong Zhong,et al. An Enhanced Multiplicative Spread Spectrum Watermarking Scheme , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[7] Harold W. Kuhn,et al. The Hungarian method for the assignment problem , 1955, 50 Years of Integer Programming.
[8] L. Kantorovich. On a Problem of Monge , 2006 .
[9] Fernando Pérez-González,et al. Information-Theoretic Analysis of Security in Side-Informed Data Hiding , 2005, Information Hiding.
[10] Song Guo,et al. Spread Spectrum-Based High Embedding Capacity Watermarking Method for Audio Signals , 2015, IEEE/ACM Transactions on Audio, Speech, and Language Processing.
[11] C. Fontaine,et al. Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.
[12] Sam Kwong,et al. A Study on the Security Levels of Spread-Spectrum Embedding Schemes in the WOA Framework , 2018, IEEE Transactions on Cybernetics.
[13] Jian Cao,et al. Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security , 2012, IEEE Transactions on Information Forensics and Security.
[14] Mauro Barni,et al. DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.
[15] Benoit M. Macq,et al. Optimal Transport for Secure Spread-Spectrum Watermarking of Still Images , 2014, IEEE Transactions on Image Processing.
[16] S. Kotz,et al. Symmetric Multivariate and Related Distributions , 1989 .
[17] Lihong Cui,et al. Adaptive Multiwavelet-Based Watermarking Through JPW Masking , 2011, IEEE Transactions on Image Processing.
[18] Fernando Pérez-González,et al. Spread-Spectrum Watermarking Security , 2009, IEEE Transactions on Information Forensics and Security.
[19] Henrique S. Malvar,et al. Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..
[20] M. Knott,et al. On the optimal mapping of distributions , 1984 .
[21] G. Simons,et al. On the theory of elliptically contoured distributions , 1981 .
[22] I. Miller. Probability, Random Variables, and Stochastic Processes , 1966 .
[23] Benoit M. Macq,et al. Optimization of natural watermarking using transportation theory , 2009, MM&Sec '09.
[24] François Cayre,et al. Natural Watermarking: A Secure Spread Spectrum Technique for WOA , 2006, Information Hiding.
[25] Teddy Furon,et al. A Survey of Watermarking Security , 2005, IWDW.
[26] Pierre Moulin,et al. The zero-rate spread-spectrum watermarking game , 2003, IEEE Trans. Signal Process..
[27] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[28] Fernando Pérez-González,et al. Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding , 2008, Information Hiding.
[29] Morris L. Eaton,et al. On the Projections of Isotropic Distributions , 1981 .
[30] Athanasios Papoulis,et al. Probability, Random Variables and Stochastic Processes , 1965 .
[31] Mauro Barni,et al. A general framework for robust watermarking security , 2003, Signal Process..
[32] I. Daubechies,et al. Biorthogonal bases of compactly supported wavelets , 1992 .
[33] Jing-Ming Guo,et al. High Capacity Data Hiding for Error-Diffused Block Truncation Coding , 2012, IEEE Transactions on Image Processing.
[34] Mauro Barni,et al. Improved wavelet-based watermarking through pixel-wise masking , 2001, IEEE Trans. Image Process..
[35] François Cayre,et al. Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding , 2008, IEEE Transactions on Information Forensics and Security.
[36] Arthur Cayley,et al. The Collected Mathematical Papers: On Monge's “Mémoire sur la théorie des déblais et des remblais” , 2009 .