A novel approach to decoding: Exploiting anticipated attack information using genetic programming
暂无分享,去创建一个
[1] Asifullah Khan,et al. Genetic perceptual shaping: Utilizing cover image and conceivable attack information during watermark embedding , 2007, Inf. Fusion.
[2] Zhou Wang,et al. Image Quality Assessment: From Error Measurement to Structural Similarity , 2004 .
[3] Asifullah Khan,et al. Combination and optimization of classifiers in gender classification using genetic programming , 2005 .
[4] Asifullah Khan,et al. Intelligent perceptual shaping of a digital watermark: Exploiting Characteristics of human visual system , 2006, Int. J. Knowl. Based Intell. Eng. Syst..
[5] Ioannis Pitas,et al. Optimal detector structure for DCT and subband domain watermarking , 2002, Proceedings. International Conference on Image Processing.
[6] Fernando Pérez-González,et al. DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..
[7] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[8] Tapio Seppänen,et al. Increasing robustness of an audio watermark using turbo codes , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[9] S. Pereira,et al. Attacks on digital watermarks: classification, estimation based attacks, and benchmarks , 2001, IEEE Communications Magazine.
[10] Pao-Ta Yu,et al. Digital watermarking based on neural networks for color images , 2001, Signal Process..
[11] Hongtao Lu,et al. Optimal Watermark Detection Based on Support Vector Machines , 2004, ISNN.
[12] Jeng-Shyang Pan,et al. Genetic watermarking based on transform-domain techniques , 2004, Pattern Recognit..
[13] Panagiotis Tsakalides,et al. Hidden messages in heavy-tails: DCT-domain watermark detection using alpha-stable models , 2005, IEEE Transactions on Multimedia.
[14] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[15] Ingemar J. Cox,et al. Watermarking applications and their properties , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[16] Thierry Pun,et al. Secure hybrid robust watermarking resistant against tampering and copy attack , 2003, Signal Process..
[17] Mauro Barni,et al. A new decoder for the optimum recovery of nonadditive watermarks , 2001, IEEE Trans. Image Process..
[18] Pierre Moulin,et al. Design and statistical analysis of a hash-aided image watermarking system , 2004, IEEE Transactions on Image Processing.
[19] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[20] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[21] Michael G. Strintzis,et al. Locally optimum nonlinearities for DCT watermark detection , 2004, IEEE Transactions on Image Processing.
[22] Jonas S. Almeida,et al. Dynamic maximum tree depth: a simple technique for avoiding bloat in tree-based GP , 2003 .
[23] Thierry Pun,et al. Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..
[24] Pierre Moulin,et al. A framework for evaluating the data-hiding capacity of image sources , 2002, IEEE Trans. Image Process..
[25] B. Girod,et al. A blind watermarking scheme based on structured codebooks , 2000 .
[26] Peter Nordin,et al. Genetic programming - An Introduction: On the Automatic Evolution of Computer Programs and Its Applications , 1998 .
[27] John R. Koza,et al. Genetic Programming IV: Routine Human-Competitive Machine Intelligence , 2003 .