共 50 条
- [21] Attack on quantized projection watermarking scheme ISTM/2005: 6TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-9, CONFERENCE PROCEEDINGS, 2005, : 6366 - 6369
- [22] A watermarking scheme robust to IBM Attack MULTIMEDIA INFORMATION SYSTEMS IN PRACTICE, 1999, : 215 - 218
- [25] Collusion attack to a scalable AND-ACC fingerprinting scheme VISUAL COMMUNICATIONS AND IMAGE PROCESSING 2007, PTS 1 AND 2, 2007, 6508
- [26] Oblivious fragile watermarking scheme for image authentication 2002 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-IV, PROCEEDINGS, 2002, : 3445 - 3448
- [27] A Dynamic Watermarking Scheme for Color Image Authentication 2009 INTERNATIONAL CONFERENCE ON ADVANCES IN RECENT TECHNOLOGIES IN COMMUNICATION AND COMPUTING (ARTCOM 2009), 2009, : 314 - +
- [28] Chaotic watermarking scheme for authentication of JPEG images 2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, 2008, : 53 - +
- [29] A Lossless Watermarking Scheme for Halftone Image Authentication INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (2B): : 147 - 151