Information Hiding Method Using Best DCT and Wavelet Coefficients and ItsWatermark Competition
暂无分享,去创建一个
[1] Nazim Fatès,et al. Public automated web-based evaluation service for watermarking schemes: StirMark benchmark , 2001, IS&T/SPIE Electronic Imaging.
[2] Pablo Pavón-Mariño,et al. Third-generation mobile communications in europe: light and shadows , 2001, IEEE Communications Magazine.
[3] Reihaneh Safavi-Naini,et al. How to Compare Image Watermarking Algorithms , 2009, Trans. Data Hiding Multim. Secur..
[4] Sanjay N. Talbar,et al. A High Quality Steganographic Method Using Morphing , 2014, J. Inf. Process. Syst..
[5] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[6] Stelvio Cimato,et al. Encyclopedia of Cryptography and Security , 2005 .
[7] Masaki Kawamura,et al. Digital watermarking method using LDPC code for clipped image , 2014, IWIHC '14.
[8] Benoit M. Macq,et al. Benchmarking image watermarking algorithms with Openwatermark , 2006, 2006 14th European Signal Processing Conference.
[9] Fabien A. P. Petitcolas,et al. Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..
[10] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.
[11] Fabien A. P. Petitcolas,et al. Fair benchmark for image watermarking systems , 1999, Electronic Imaging.
[12] G. Geethakumari,et al. Detecting misinformation in online social networks using cognitive psychology , 2014, Human-centric Computing and Information Sciences.
[13] Jana Dittmann,et al. Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity , 2006, Trans. Data Hiding Multim. Secur..
[14] Francesco G. B. De Natale,et al. Watermarking Robustness Evaluation Based on Perceptual Quality via Genetic Algorithms , 2009, IEEE Transactions on Information Forensics and Security.
[15] Motoi Iwata,et al. Information Hiding and Its Criteria for Evaluation , 2017, IEICE Trans. Inf. Syst..
[16] Francesco G. B. De Natale,et al. Robustness and security assessment of image watermarking techniques by a stochastic approach , 2009, Electronic Imaging.
[17] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[18] T. Moon. Error Correction Coding: Mathematical Methods and Algorithms , 2005 .
[19] Masaki Hakka,et al. DCT-OFDM based watermarking scheme robust against clipping attack , 2014, IWIHC '14.
[20] Edward J. Delp,et al. The Watermark Evaluation Testbed (WET) , 2004, IS&T/SPIE Electronic Imaging.
[21] Seong-Jun Lee,et al. An exploratory study on the core spectrum for mobile telecommunication , 2014 .
[22] Toru Fujiwara,et al. Salt-and-pepper image watermarking system for IHC evaluation criteria , 2014, IWIHC '14.
[23] Mamta Juneja,et al. A New Approach for Information Security using an Improved Steganography Technique , 2013, J. Inf. Process. Syst..
[24] Bruce Davis. Signal rich art: enabling the vision of ubiquitous computing , 2011, Electronic Imaging.
[25] S. Pereira,et al. Attacks on digital watermarks: classification, estimation based attacks, and benchmarks , 2001, IEEE Communications Magazine.
[26] Keiichi Iwamura,et al. Watermarking based on the difference of discrete cosine transform coefficients and an error-correcting code , 2014, IWIHC '14.