메뉴 건너뛰기




Volumn 6072, Issue , 2006, Pages

The blind newton sensitivity attack

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; DETECTORS; DIGITAL WATERMARKING; INFORMATION ANALYSIS; ROBUSTNESS (CONTROL SYSTEMS); SENSITIVITY ANALYSIS;

EID: 33645680170     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.642721     Document Type: Conference Paper
Times cited : (41)

References (17)
  • 3
    • 0007751316 scopus 로고    scopus 로고
    • Analysis of the sensitivity attack against electronic watermarks in images
    • 2nd International Workshop on Information Hiding, IH'98, D. Aucsmith, ed., Springer Verlag, (Portland, OR, USA), April
    • J. P. M. G. Linnartz and M. van Dijk, "Analysis of the sensitivity attack against electronic watermarks in images," in 2nd International Workshop on Information Hiding, IH'98, D. Aucsmith, ed., Lecture Notes in Computer Science 1525, pp. 258-272, Springer Verlag, (Portland, OR, USA), April 1998.
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 258-272
    • Linnartz, J.P.M.G.1    Van Dijk, M.2
  • 5
    • 0034769637 scopus 로고    scopus 로고
    • An unified approach of asymmetric watermarking schemes
    • Edward J. Delp III and P. W. Wong, eds., SPIE, (San Jose, California, USA), January
    • T. Furon, I. Venturini, and P. Duhamel, "An unified approach of asymmetric watermarking schemes," in Security and Watermarking of Multimedia Contents III, Edward J. Delp III and P. W. Wong, eds., 4314, pp. 269-279, SPIE, (San Jose, California, USA), January 2001.
    • (2001) Security and Watermarking of Multimedia Contents III , vol.4314 , pp. 269-279
    • Furon, T.1    Venturini, I.2    Duhamel, P.3
  • 12
    • 0033882559 scopus 로고    scopus 로고
    • DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure
    • January. Special Issue on Image and Video Processing for Digital Libraries
    • J. R. Hernández, M. Amado, and F. Pérez-González, "DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure," IEEE Trans. on ImageProcessing 9, pp. 55-68, January 2000. Special Issue on Image and Video Processing for Digital Libraries.
    • (2000) IEEE Trans. on ImageProcessing , vol.9 , pp. 55-68
    • Hernández, J.R.1    Amado, M.2    Pérez-González, F.3
  • 15
    • 21844449699 scopus 로고    scopus 로고
    • Detection in quantization-based watermarking: Performance and security issues
    • Edward J. Delp III and P. W. Wong, eds., SPIE, (San Jose, California, USA), January
    • L. Pérez-Freire, P. Comesaña, and F. Pérez- González, "Detection in quantization-based watermarking: performance and security issues," in Security, Steganography, and Watermarking of Multimedia Contents VII, Edward J. Delp III and P. W. Wong, eds., 5681, pp. 721-733, SPIE, (San Jose, California, USA), January 2005.
    • (2005) Security, Steganography, and Watermarking of Multimedia Contents VII , vol.5681 , pp. 721-733
    • Pérez-Freire, L.1    Comesaña, P.2    Pérez-González, F.3
  • 16
    • 2942568431 scopus 로고    scopus 로고
    • Applying informed coding and embedding to design a robust high-capacity watermark
    • June
    • M. L. Miller, G. J. Doërr, and I. J. Cox, "Applying informed coding and embedding to design a robust high-capacity watermark," IEEE Transactions on Image Processing 13, pp. 792-807, June 2004.
    • (2004) IEEE Transactions on Image Processing , vol.13 , pp. 792-807
    • Miller, M.L.1    Doërr, G.J.2    Cox, I.J.3
  • 17
    • 84944404911 scopus 로고    scopus 로고
    • Zero-knowledge watermark detection and proof of ownership
    • 4th International Workshop on Information Hiding, IH'.01, I. S. Moskowitz, ed., Springer Verlag, (Pittsburgh, PA, USA), April
    • A. Adelsbach and A.-R. Sadeghi, "Zero-knowledge watermark detection and proof of ownership," in 4th International Workshop on Information Hiding, IH'.01, I. S. Moskowitz, ed., Lecture Notes in Computer Science 2137, pp. 273-288, Springer Verlag, (Pittsburgh, PA, USA), April 2001.
    • (2001) Lecture Notes in Computer Science , vol.2137 , pp. 273-288
    • Adelsbach, A.1    Sadeghi, A.-R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.