A Role for Digital Watermarking in Electronic Commerce
暂无分享,去创建一个
[1] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[2] Gordon W. Braudaway,et al. Protecting publicly-available images with an invisible image watermark , 1996, Proceedings of International Conference on Image Processing.
[3] K. Tanaka,et al. Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.
[4] Mauro Barni,et al. DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.
[5] Warwick Ford,et al. Secure electronic commerce , 1997 .
[6] Sushil Jajodia,et al. Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).
[7] Oscar Firschein,et al. Readings in computer vision: issues, problems, principles, and paradigms , 1987 .
[8] Lawrence O'Gorman,et al. Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.
[9] Germano Caronni. Assuring Ownership Rights for Digital Images , 1995, VIS.
[10] Lisa M. Marvel,et al. Reliable Blind Information Hiding for Images , 1998, Information Hiding.
[11] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[12] Thierry Pun,et al. Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.
[13] John F. Canny,et al. A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[14] G. Stewart. Introduction to matrix computations , 1973 .
[15] Eckhard Koch,et al. Copyright Protection for Multimedia Data , 1994 .
[16] Thomas Ertl,et al. Computer Graphics - Principles and Practice, 3rd Edition , 2014 .
[17] Joshua R. Smith,et al. Modulation and Information Hiding in Images , 1996, Information Hiding.
[18] Lawrence O'Gorman,et al. Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.
[19] Walter Bender,et al. Information Hiding to Foil the Casual Counterfeiter , 1998, Information Hiding.
[20] Barry J. Shepherd,et al. Graphics file formats - reference and guide , 1994 .
[21] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[22] David J. Fleet,et al. Embedding invisible information in color images , 1997, Proceedings of International Conference on Image Processing.
[23] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[24] Ja-Ling Wu,et al. Hidden signatures in images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[25] Eckhard Koch,et al. Towards Robust and Hidden Image Copyright Labeling , 1995 .
[26] Ross J. Anderson. Stretching the Limits of Steganography , 1996, Information Hiding.
[27] Sushil Jajodia,et al. Recovering Watermarks from Images , 1999 .
[28] Francis M. Boland,et al. Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[29] Azriel Rosenfeld. Models: the graphics-vision interface , 1992 .
[30] Bernd Jähne,et al. Digital Image Processing: Concepts, Algorithms, and Scientific Applications , 1991 .
[31] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[32] Ahmed H. Tewfik,et al. Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[33] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[34] Deepa Kundur,et al. A robust digital image watermarking method using wavelet-based fusion , 1997, Proceedings of International Conference on Image Processing.
[35] Xiang-Gen Xia,et al. A multiresolution watermark for digital images , 1997, Proceedings of International Conference on Image Processing.
[36] Scott Craver,et al. On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.
[37] Miodrag Potkonjak,et al. Fingerprinting Digital Circuits on Programmable Hardware , 1998, Information Hiding.
[38] Sushil Jajodia,et al. Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.