Attack modelling: towards a second generation watermarking benchmark
- 1 June 2001
- journal article
- Published by Elsevier BV in Signal Processing
- Vol. 81 (6), 1177-1214
- https://doi.org/10.1016/s0165-1684(01)00039-1
Abstract
No abstract availableKeywords
This publication has 41 references indexed in Scilit:
- Secure spread spectrum watermarking for images, audio and videoPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Watermarking as communications with side informationProceedings of the IEEE, 1999
- Capacity of the watermark channel: how many bits can be hidden within a digital image?Published by SPIE-Intl Soc Optical Eng ,1999
- Dither modulation: a new approach to digital watermarking and information embeddingPublished by SPIE-Intl Soc Optical Eng ,1999
- A DCT-domain system for robust image watermarkingSignal Processing, 1998
- Some general methods for tampering with watermarksIEEE Journal on Selected Areas in Communications, 1998
- Globally convergent edge-preserving regularized reconstruction: an application to limited-angle tomographyIEEE Transactions on Image Processing, 1998
- Secure spread spectrum watermarking for multimediaIEEE Transactions on Image Processing, 1997
- Deterministic edge-preserving regularization in computed imagingIEEE Transactions on Image Processing, 1997
- Writing on dirty paper (Corresp.)IEEE Transactions on Information Theory, 1983