Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity
暂无分享,去创建一个
Jana Dittmann | David Megías | Jordi Herrera-Joancomartí | Andreas Lang | J. Herrera-Joancomartí | J. Dittmann | D. Megías | A. Lang
[1] Sviatoslav Voloshynovskiy,et al. Watermark copy attack , 2000, Electronic Imaging.
[2] Josep Domingo-Ferrer,et al. Simple collusion-secure fingerprinting schemes for images , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[3] Jana Dittmann,et al. Audio watermark attacks: from single to profile attacks , 2005, MM&Sec '05.
[4] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[5] Jana Dittmann,et al. Profiles for evaluation: the usage of audio WET , 2006, Electronic Imaging.
[6] Edward J. Delp,et al. Application-oriented audio watermark benchmark service , 2005, IS&T/SPIE Electronic Imaging.
[7] S. Pereira,et al. Attacks on digital watermarks: classification, estimation based attacks, and benchmarks , 2001, IEEE Communications Magazine.
[8] David Megías,et al. An audio watermarking scheme robust against stereo attacks , 2004, MM&Sec '04.
[9] Ton Kalker,et al. Considerations on watermarking security , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).
[10] Narendra Ahuja,et al. A new wavelet-based scheme for watermarking images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[11] Fernando Pérez-González,et al. Information-Theoretic Analysis of Security in Side-Informed Data Hiding , 2005, Information Hiding.
[12] A. J. Jerri. The Shannon sampling theorem—Its various extensions and applications: A tutorial review , 1977, Proceedings of the IEEE.
[13] 渡辺馨. Objective measurement method of audio quality in accordance with ITU-R Recommendation BS. 1387 , 2001 .
[14] Akihiro Yamamoto,et al. A Digital Watermark Technique Based on the Wavelet Transform and Its Robustness on Image Compression and Transformation , 1999 .
[15] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[16] J. Dittmann,et al. StirMark and profiles : from high end up to preview scenarios , 2004 .
[17] Edward J. Delp,et al. Benchmarking of image watermarking algorithms for digital rights management , 2004, Proceedings of the IEEE.
[18] Darko Kirovski,et al. Spread-spectrum watermarking of audio signals , 2003, IEEE Trans. Signal Process..
[19] Jiri Fridrich,et al. Applications of data hiding in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).
[20] David Megías,et al. A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression , 2003, Communications and Multimedia Security.
[21] David Megías,et al. Robust Frequency Domain Audio Watermarking: A Tuning Analysis , 2004, IWDW.
[22] Nazim Fatès,et al. Public automated web-based evaluation service for watermarking schemes: StirMark benchmark , 2001, IS&T/SPIE Electronic Imaging.
[23] Jerome M. Shapiro,et al. Embedded image coding using zerotrees of wavelet coefficients , 1993, IEEE Trans. Signal Process..
[24] Teddy Furon,et al. Watermarking security part two: Practice , 2005, IS&T/SPIE Electronic Imaging.
[25] A. Lang,et al. Multimodal Speaker Authentication – Evaluation of Recognition Performance of Watermarked , 2006 .
[26] Jana Dittmann,et al. Transparency benchmarking on audio watermarks and steganography , 2006, Electronic Imaging.
[27] Jana Dittmann,et al. Digital watermarking of biometric speech references: impact to the EER system performance , 2007, Electronic Imaging.
[28] Margaret King,et al. Evaluation of natural language processing systems , 1991 .
[29] Teddy Furon,et al. Watermarking security part one: Theory , 2005, IS&T/SPIE Electronic Imaging.
[30] Jana Dittmann,et al. Advanced audio watermarking benchmarking , 2004, IS&T/SPIE Electronic Imaging.