An asymmetric image watermarking scheme resistant against geometrical distortions
暂无分享,去创建一个
[1] Jean-Paul M. G. Linnartz,et al. Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..
[2] Scott Craver. Zero Knowledge Watermark Detection , 1999, Information Hiding.
[3] Bernd Girod,et al. Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.
[4] Bernd Girod,et al. Asymmetric Watermarking Schemes , 2000 .
[5] Dariusz Bogumil. Reversing Global and Local Geometrical Distortions in Image Watermarking , 2004, Information Hiding.
[6] Ralf Steinmetz,et al. Sicherheit in Mediendaten , 2000, GI Jahrestagung.
[7] Eckhard Koch,et al. Digital watermarking: what will it do for me? And what it won't! , 1999, SIGGRAPH '99.
[8] Taejeong Kim,et al. Transformed-key asymmetric watermarking system , 2004, IEEE Signal Processing Letters.
[9] Stefan Katzenbeisser,et al. Copyright Protection Protocols Based on Asymmetric Watermarking , 2001 .
[10] Joshua R. Smith,et al. Developments in Steganography , 1999, Information Hiding.
[11] T. Furon,et al. Robustness of asymmetric watermarking technique , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[12] Bernd Girod,et al. Watermarking of uncompressed and compressed video , 1998, Signal Process..
[13] Ahmad-Reza Sadeghi,et al. Zero-Knowledge Watermark Detection and Proof of Ownership , 2001, Information Hiding.
[14] Yong-Gang Fu,et al. A novel asymmetric watermarking scheme , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).
[15] Jean-Jacques Quisquater,et al. Which directions for asymmetric watermarking? , 2002, 2002 11th European Signal Processing Conference.
[16] Imants D. Svalbe,et al. Key independent watermark detection , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[17] Pierre Duhamel,et al. An Asymmetric Public Detection Watermarking Technique , 1999, Information Hiding.
[18] Bernd Girod,et al. Public key watermarking by eigenvectors of linear transforms , 2000, 2000 10th European Signal Processing Conference.
[19] Stefan Katzenbeisser. On the Integration of Watermarks and Cryptography , 2003, IWDW.
[20] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[21] Sviatoslav Voloshynovskiy,et al. Watermark template attack , 2001, IS&T/SPIE Electronic Imaging.
[22] F. Bao,et al. On the security of two public key watermarking schemes , 2003, Fourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint.
[23] Jean-Paul M. G. Linnartz,et al. Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.
[24] Stefan Katzenbeisser,et al. Security analysis of public key watermarking schemes , 2001, SPIE Optics + Photonics.