Identification of Sparse Audio Tampering Using Distributed Source Coding and Compressive Sensing Techniques
暂无分享,去创建一个
[1] Ping Wah Wong,et al. A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[2] E.J. Candes,et al. An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.
[3] R.G. Baraniuk,et al. Compressive Sensing [Lecture Notes] , 2007, IEEE Signal Processing Magazine.
[4] R. A. McDonald,et al. Noiseless Coding of Correlated Information Sources , 1973 .
[5] Qibin Sun,et al. Robust Hash for Detecting and Localizing Image Tampering , 2007, 2007 IEEE International Conference on Image Processing.
[6] E.J. Candes. Compressive Sampling , 2022 .
[7] Richard G. Baraniuk,et al. Compressive Sensing , 2008, Computer Vision, A Reference Guide.
[8] Jana Dittmann,et al. EURASIP Journal on Applied Signal Processing 2003:10, 1001–1015 c ○ 2003 Hindawi Publishing Corporation Watermarking-Based Digital Audio Data Authentication , 2003 .
[9] Chun-Shien Lu,et al. Multipurpose audio watermarking , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.
[10] Bernd Girod,et al. Rate-adaptive codes for distributed source coding , 2006, Signal Process..
[11] Jiri Fridrich,et al. Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[12] Aaron D. Wyner,et al. The rate-distortion function for source coding with side information at the decoder , 1976, IEEE Trans. Inf. Theory.
[13] Bernd Girod,et al. Distributed Video Coding , 2005, Proceedings of the IEEE.
[14] Deepa Kundur,et al. Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.
[15] Bernd Girod,et al. Spatial models for localization of image tampering using distributed source codes , 2007, PCS 2007.
[16] Ton Kalker,et al. A Highly Robust Audio Fingerprinting System With an Efficient Search Strategy , 2003 .
[17] Michael B. Wakin,et al. An Introduction To Compressive Sampling [A sensing/sampling paradigm that goes against the common knowledge in data acquisition] , 2008 .
[18] E. Berg,et al. In Pursuit of a Root , 2007 .
[19] Jiying Zhao,et al. A novel semi-fragile audio watermarking scheme , 2003, The 2nd IEEE Internatioal Workshop on Haptic, Audio and Visual Environments and Their Applications, 2003. HAVE 2003. Proceedings..
[20] Shih-Kun Huang,et al. Cocktail Watermarking for Digital Image Protection , 2000, IEEE Trans. Multim..
[21] Pedro Cano,et al. A review of algorithms for audio fingerprinting , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..
[22] Stephen P. Boyd,et al. Enhancing Sparsity by Reweighted ℓ1 Minimization , 2007, 0711.1612.
[23] Bernd Girod,et al. Image Authentication Based on Distributed Source Coding , 2007, 2007 IEEE International Conference on Image Processing.
[24] Stefano Tubaro,et al. Rate allocation for robust video streaming based on distributed video coding , 2008, Signal Process. Image Commun..
[25] Biing-Hwang Juang,et al. Fundamentals of speech recognition , 1993, Prentice Hall signal processing series.
[26] Keiichi Chono,et al. Reduced-reference image quality assessment using distributed source coding , 2008, 2008 IEEE International Conference on Multimedia and Expo.
[27] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[28] Marco Dalai,et al. The DISCOVER codec: Architecture, Techniques and Evaluation , 2007, PCS 2007.
[29] Bernd Girod,et al. Audio authentication based on distributed source coding , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[30] A. Murat Tekalp,et al. Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..
[31] Bernd Girod,et al. Blind watermarking applied to image authentication , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[32] Ramarathnam Venkatesan,et al. A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding , 2001, Information Hiding.
[33] V.K. Goyal,et al. Compressive Sampling and Lossy Compression , 2008, IEEE Signal Processing Magazine.
[34] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[35] Stefano Tubaro,et al. Localization of sparse image tampering via random projections , 2008, 2008 15th IEEE International Conference on Image Processing.