-
1
-
-
47649099498
-
An efficient watermarking method based on significant difference of wavelet coefficient quantization
-
Aug
-
W.-H. Lin, S.-J. Horng, T.-W. Kao, P. Fan, C.-L. Lee, and Y. Pan, "An efficient watermarking method based on significant difference of wavelet coefficient quantization," IEEE Trans. Multimedia, vol. 10, no. 5, pp. 746-757, Aug. 2008.
-
(2008)
IEEE Trans. Multimedia
, vol.10
, Issue.5
, pp. 746-757
-
-
Lin, W.-H.1
Horng, S.-J.2
Kao, T.-W.3
Fan, P.4
Lee, C.-L.5
Pan, Y.6
-
2
-
-
21844463487
-
Watermarking security: Theory and practice
-
Oct
-
F. Cayre, C. Fontaine, and T. Furon, "Watermarking security: Theory and practice," IEEE Trans. Signal Process., vol. 53, no. 10, pp. 3976-3987, Oct. 2005.
-
(2005)
IEEE Trans. Signal Process
, vol.53
, Issue.10
, pp. 3976-3987
-
-
Cayre, F.1
Fontaine, C.2
Furon, T.3
-
4
-
-
0035790994
-
Considerations on watermarking security
-
Cannes, France, Oct
-
T. Kalker, "Considerations on watermarking security," in Proc. IEEE Workshop Multimedia Signal Processing (MMSP'01), Cannes, France, Oct. 2001, pp. 201-206.
-
(2001)
Proc. IEEE Workshop Multimedia Signal Processing (MMSP'01)
, pp. 201-206
-
-
Kalker, T.1
-
5
-
-
84957877979
-
Attacks on copyright marking systems
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, D. Aucsmith, Ed, Proc. Information Hiding: 2nd Int. Workshop, Portland, OR, Apr, Springer Verlag
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, D. Aucsmith, Ed., "Attacks on copyright marking systems," in Proc. Information Hiding: 2nd Int. Workshop, Portland, OR, Apr. 1998, vol. 1525, pp. 218-238, ser. Lecture Notes in Computer Science, Springer Verlag.
-
(1998)
ser. Lecture Notes in Computer Science
, vol.1525
, pp. 218-238
-
-
-
6
-
-
0035417219
-
Attack on digital watermarks: Classification, estimation-based attacks and benchmarks
-
Aug
-
S. Voloshynovskiy, S. Pereira, T. Pun, J. K. Su, and J. J. Eggers, "Attack on digital watermarks: Classification, estimation-based attacks and benchmarks," IEEE Commun. Mag., vol. 39, no. 8, pp. 118-126, Aug. 2001.
-
(2001)
IEEE Commun. Mag
, vol.39
, Issue.8
, pp. 118-126
-
-
Voloshynovskiy, S.1
Pereira, S.2
Pun, T.3
Su, J.K.4
Eggers, J.J.5
-
7
-
-
33645680170
-
Blind Newton sensitivity attack
-
Sep
-
P. Comesana, L. Perez-Freire, and F. Perez-Gonzalez, "Blind Newton sensitivity attack," Proc. Inst. Elect. Eng., Inf. Secur., vol. 153, no. 3, pp. 115-125, Sep. 2006.
-
(2006)
Proc. Inst. Elect. Eng., Inf. Secur
, vol.153
, Issue.3
, pp. 115-125
-
-
Comesana, P.1
Perez-Freire, L.2
Perez-Gonzalez, F.3
-
8
-
-
34548240632
-
The first BOWS contest: Break our watermarking system
-
E. J. Delp and P. W. Wong, Eds. San Jose, CA: SPIE, Jan
-
A. Piva and M. Barni, "The first BOWS contest: Break our watermarking system," in Proc. SPIE Security, Steganography, and Watermarking of Multimedia Contents IX, E. J. Delp and P. W. Wong, Eds. San Jose, CA: SPIE, Jan. 2007, vol. 6505.
-
(2007)
Proc. SPIE Security, Steganography, and Watermarking of Multimedia Contents IX
, vol.6505
-
-
Piva, A.1
Barni, M.2
-
9
-
-
0034780126
-
Public automated web-based evaluation service for watermarking schemes: Stirmark benchmark
-
San Jose, CA, Jan
-
F. A. P. Petitcolas, C. Fontaine, J. Dittmann, M. Steinebach, and N. Fatès, "Public automated web-based evaluation service for watermarking schemes: Stirmark benchmark," in Proc. SPIE, Security and Watermarking of Multimedia Contents III, San Jose, CA, Jan. 2001, vol. 4314, pp. 575-584.
-
(2001)
Proc. SPIE, Security and Watermarking of Multimedia Contents III
, vol.4314
, pp. 575-584
-
-
Petitcolas, F.A.P.1
Fontaine, C.2
Dittmann, J.3
Steinebach, M.4
Fatès, N.5
-
10
-
-
33750969059
-
Analysis of the 'wavelet tree quantization' watermarking strategy and a modified robust scheme
-
Aug
-
T. K. Das and S. Maitra, "Analysis of the 'wavelet tree quantization' watermarking strategy and a modified robust scheme," Multimedia Syst., vol. 12, no. 2, pp. 151-163, Aug. 2006.
-
(2006)
Multimedia Syst
, vol.12
, Issue.2
, pp. 151-163
-
-
Das, T.K.1
Maitra, S.2
-
11
-
-
1942486241
-
Wavelet tree quantization for copyright protection watermarking
-
Feb
-
S.-H. Wang and Y.-P. Lin, "Wavelet tree quantization for copyright protection watermarking," IEEE Trans. Image Process., vol. 13, no. 2, pp. 154-165, Feb. 2004.
-
(2004)
IEEE Trans. Image Process
, vol.13
, Issue.2
, pp. 154-165
-
-
Wang, S.-H.1
Lin, Y.-P.2
-
12
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
May
-
B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
13
-
-
1942436689
-
Image quality assessment: From error visibility to structural similarity
-
Apr
-
Z. Wang, A. Bovik, H. Sheikh, and E. Simoncelli, "Image quality assessment: From error visibility to structural similarity," IEEE Trans. Image Process., vol. 13, no. 4, pp. 600-612, Apr. 2004.
-
(2004)
IEEE Trans. Image Process
, vol.13
, Issue.4
, pp. 600-612
-
-
Wang, Z.1
Bovik, A.2
Sheikh, H.3
Simoncelli, E.4
|