暂无分享,去创建一个
[1] Mauro Barni,et al. A general framework for robust watermarking security , 2003, Signal Process..
[2] Mauro Barni,et al. Effectiveness of exhaustive search and template matching against watermark desynchronization , 2005, IEEE Signal Processing Letters.
[3] Bo Zhang,et al. Statistically Robust Detection of Multiplicative Spread-Spectrum Watermarks , 2007, IEEE Transactions on Information Forensics and Security.
[4] Neri Merhav,et al. Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources , 2008, IEEE Transactions on Information Theory.
[5] H. Vincent Poor,et al. An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.
[6] Neri Merhav,et al. Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources , 2008, IEEE Trans. Inf. Theory.
[7] G. Wornell,et al. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).
[8] Russell M. Mersereau,et al. A Framework for Robust Watermarking of H.264-Encoded Video With Controllable Detection Performance , 2007, IEEE Transactions on Information Forensics and Security.
[9] Mauro Barni,et al. A new decoder for the optimum recovery of nonadditive watermarks , 2001, IEEE Trans. Image Process..
[10] Wenjun Zeng,et al. Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking , 2007, IEEE Transactions on Information Forensics and Security.
[11] Max H. M. Costa,et al. Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.
[12] Roderick Wong,et al. Asymptotic approximations of integrals , 1989, Classics in applied mathematics.
[13] Fernando Pérez-González,et al. DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..
[14] H. Vincent Poor,et al. An introduction to signal detection and estimation (2nd ed.) , 1994 .
[15] Ingemar J. Cox,et al. Informed embedding: exploiting image and detector information during watermark insertion , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[16] Benoit M. Macq,et al. JANIS: Just Another n-order Side-Informed Watermarking Scheme , 2002, Proceedings. International Conference on Image Processing.
[17] Fernando Pérez-González,et al. Performance analysis of existing and new methods for data hiding with known-host information in additive channels , 2003, IEEE Trans. Signal Process..
[18] Mauro Barni,et al. Expanding the class of watermark de-synchronization attacks , 2007, MM&Sec.
[19] Ali N. Akansu,et al. Signaling methods for multimedia steganography , 2004, IEEE Transactions on Signal Processing.
[20] Ingemar J. Cox,et al. Watermarking as communications with side information , 1999, Proc. IEEE.
[21] Mauro Barni,et al. Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding , 2005, IEEE Transactions on Signal Processing.
[22] Teddy Furon,et al. A Constructive and Unifying Framework for Zero-Bit Watermarking , 2006, IEEE Transactions on Information Forensics and Security.
[23] Russell M. Mersereau,et al. A Framework for Robust Watermarking of H.264-Encoded Video With Controllable Detection Performance , 2007, IEEE Trans. Inf. Forensics Secur..
[24] C. Mosquera,et al. Rational dither modulation: a high-rate data-hiding method invariant to gain attacks , 2005, IEEE Transactions on Signal Processing.
[25] Wei Liu,et al. Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking , 2007, IEEE Trans. Inf. Forensics Secur..
[26] Pierre Moulin,et al. Error exponents for one-bit watermarking , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..