Improving the security of watermark public detectors
暂无分享,去创建一个
[1] Athanasios Papoulis,et al. Probability, Random Variables and Stochastic Processes , 1965 .
[2] S. Kay. Fundamentals of statistical signal processing: estimation theory , 1993 .
[3] Irene A. Stegun,et al. Handbook of Mathematical Functions. , 1966 .
[4] Mohamed F. Mansour,et al. Techniques for data embedding in image using wavelet extrema , 2001, IS&T/SPIE Electronic Imaging.
[5] Jean-Paul M. G. Linnartz,et al. Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[6] S. Haykin,et al. Adaptive Filter Theory , 1986 .
[7] Jean-Paul M. G. Linnartz,et al. Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.
[8] Steven Kay,et al. Fundamentals Of Statistical Signal Processing , 2001 .
[9] Gregory W. Wornell,et al. Dither modulation: a new approach to digital watermarking and information embedding , 1999, Electronic Imaging.
[10] G. C. Langelaar,et al. Watermarking digital image and video data , 2000 .
[11] Fernando Pérez-González,et al. DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..
[12] Jean-Paul M. G. Linnartz,et al. Public watermarks and resistance to tampering , 1997, Proceedings of International Conference on Image Processing.
[13] Pierre Duhamel,et al. Unified approach of asymmetric watermarking schemes , 2001, IS&T/SPIE Electronic Imaging.
[14] William H. Press,et al. Numerical recipes in C , 2002 .
[15] Mohamed F. Mansour,et al. Robust high capacity data embedding , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[16] Benoit B. Mandelbrot,et al. Fractal Geometry of Nature , 1984 .