期刊文献+

数字水印的技术、理论与应用(2) 被引量:1

下载PDF
导出
出处 《电视技术》 北大核心 2004年第9期81-84,共4页 Video Engineering
  • 相关文献

参考文献15

  • 1Moulin P, O' Sullivan Joseph A. Information-Theoretic Analysis of Information Hiding. IEEE Transactions on information theory, 49(3).
  • 2Wang P H W, Au O C. A capacity estimation technique for JPEG-to-JPEG image watermarking. Circuits and Systems for Video Technology. IEEE Transactions on, 2003,13(8)746-752.
  • 3Wang P H W, et al. Capacity for jpeg2000-tojpeg2000 images watermarking. Multimedia and Expo, 2003.ICME'03. Proceedings. 2003 International Conference on,2003,2(6-9)485- 488.
  • 4StirMark Kugn M. [EB/DL]. http://www.cl.cam.ac.uk/~mgk25/stirmark/, 1997-11.
  • 5Aguste Kerckhoff. La Cryptographie Militaire. Journal des Sciences Militaires, IX (Jan., Feb.): 5-38, 161-191,1883.
  • 6Petitcolas F A P, Anderson R, Kuhn M G. Information Hiding: A Survey. Proceedings of the IEEE, 1999, 87(7):1062-1077.
  • 7Kutter M, Voloshynovskiy S, Herrigel A. The watermark copy attack. in Security and Watermarking of Multimedia Contents II, SPIE-3971:371-380, 2000.
  • 8Linnartz J P M G, van Dijk M. Analysis of the sensitivity arrack against electronic watermarks in images. in Workshop on Information hiding, Portland, OR, 1998, 15(4):258-272.
  • 9Hartung F, Kutter M. Multimedia Watermarking Techniques. Proceedings the IEEE, 1999, 87(7): 1079-1107.?A
  • 10Watson A B. DCT quantization matrices optimized for individual image. Human Vision, Visual Processing, and Digital Display Ⅳ, 1993,SPIE-1913: 202-216.

同被引文献10

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部