Spread spectrum image steganography
暂无分享,去创建一个
[1] K. Tanaka,et al. Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.
[2] David L. Donoho,et al. De-noising by soft-thresholding , 1995, IEEE Trans. Inf. Theory.
[3] Edward J. Delp,et al. A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[4] L. J. Harcke,et al. Laboratory and Flight Performance of the Mars Pathfinder (15,1/6) Convolutionally Encoded Telemetry Link , 1997 .
[5] Martin Bossert,et al. Hard- and soft-decision decoding beyond the half minimum distance---An algorithm for linear codes , 1986, IEEE Trans. Inf. Theory.
[6] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[7] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[8] D. Kahn. The codebreakers : the story of secret writing , 1968 .
[9] M. Abramowitz,et al. Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .
[10] Ingemar J. Cox,et al. Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[11] Anil K. Jain. Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.
[12] Andrew J. Viterbi,et al. Error bounds for convolutional codes and an asymptotically optimum decoding algorithm , 1967, IEEE Trans. Inf. Theory.
[13] Bin Zhu,et al. Robust data hiding for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.
[14] LeeJong-Sen. Digital Image Enhancement and Noise Filtering by Use of Local Statistics , 1980 .
[15] Birgit Pfitzmann,et al. Trials of Traced Traitors , 1996, Information Hiding.
[16] Ahmed H. Tewfik,et al. Data hiding for multimedia personalization, interaction, and protection , 1997 .
[17] Michael Scott,et al. Fractal Based Image Steganography , 1996, Information Hiding.
[18] Joshua R. Smith,et al. Modulation and Information Hiding in Images , 1996, Information Hiding.
[19] Bernd Girod,et al. Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.
[20] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[21] C. T. Retter. Decoding binary expansions of low-rate Reed-Solomon codes far beyond the BCH bound , 1995, Proceedings of 1995 IEEE International Symposium on Information Theory.
[22] Wenjun Zeng,et al. Digital image watermarking using visual models , 1997, Electronic Imaging.
[23] J. Bednar,et al. Alpha-trimmed means and their relationship to median filters , 1984 .
[24] Jae S. Lim,et al. Two-Dimensional Signal and Image Processing , 1989 .
[25] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[26] Ahmed H. Tewfik,et al. Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[27] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[28] Jong-Sen Lee,et al. Digital Image Enhancement and Noise Filtering by Use of Local Statistics , 1980, IEEE Transactions on Pattern Analysis and Machine Intelligence.