Danger of low-dimensional watermarking subspaces
暂无分享,去创建一个
[1] Shelby Pereira,et al. Secure robust digital image watermark , 1998, Other Conferences.
[2] Ingemar J. Cox,et al. Applying informed coding and embedding to design a robust high-capacity watermark , 2004, IEEE Transactions on Image Processing.
[3] Dan. Collusion-Secure Fingerprinting for Digital Data , 2002 .
[4] Sviatoslav Voloshynovskiy,et al. Watermark copy attack , 2000, Electronic Imaging.
[5] Sam T. Roweis,et al. EM Algorithms for PCA and SPCA , 1997, NIPS.
[6] Jean-Luc Dugelay,et al. A guide tour of video watermarking , 2003, Signal Process. Image Commun..
[7] Deepa Kundur,et al. Novel approach to collusion-resistant video watermarking , 2002, IS&T/SPIE Electronic Imaging.
[8] Damien Delannay,et al. Method for hiding synchronization marks in scale- and rotation-resilient watermarking schemes , 2002, IS&T/SPIE Electronic Imaging.
[9] Thierry Pun,et al. Generalized watermarking attack based on watermark estimation and perceptual remodulation , 2000, Electronic Imaging.
[10] Gregory W. Wornell,et al. Dither modulation: a new approach to digital watermarking and information embedding , 1999, Electronic Imaging.
[11] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[12] Nasir D. Memon,et al. A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[13] Jean-Luc Dugelay,et al. Secure Video Watermarking via Embedding Strength Modulation , 2003, IWDW.
[14] Bernd Girod,et al. Watermarking of uncompressed and compressed video , 1998, Signal Process..
[15] Ton Kalker,et al. Considerations on watermarking security , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).