Modeling , Performance Analysis , and Applications of Digital Image Watermarking Systems
暂无分享,去创建一个
[1] Nasir D. Memon,et al. Protecting digital media content , 1998, CACM.
[2] Lawrence O'Gorman,et al. Protecting ownership rights through digital watermarking , 1996 .
[3] J.E. Mazo,et al. Digital communications , 1985, Proceedings of the IEEE.
[4] Gordon W. Braudaway,et al. Opportunities for watermarking standards , 1998, CACM.
[5] John M. Acken,et al. How watermarking adds value to digital content , 1998, CACM.
[6] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[7] Boon-Lock Yeo,et al. Technical trials and legal tribulations , 1998, CACM.
[8] Jian Zhao,et al. In business today and tomorrow , 1998, CACM.
[9] Fernando Pérez-González,et al. Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images , 1998, IEEE J. Sel. Areas Commun..
[10] Joshua R. Smith,et al. Modulation and Information Hiding in Images , 1996, Information Hiding.
[11] Richard E. Blahut,et al. Principles and practice of information theory , 1987 .
[12] J. M. Foley,et al. Contrast masking in human vision. , 1980, Journal of the Optical Society of America.
[13] Ahmed H. Tewfik,et al. Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.
[14] Hal Berghel,et al. Watermarking cyberspace , 1997, CACM.