Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference31 articles.
1. Agreste S, Andaloro G (2008) A new approach to pre-processing digital image for wavelet-based watermark. J Comput Appl Math 221(2):274–283
2. Caronni G (1993) Ermitteln unauthorisierter verteiler von maschinenlebaren daten. ETH Technical report
3. Chang CC, Hwang HF, Hwang MS (2002) Robust authentication scheme for protecting copyrights of images and graphics. IEE Proc Vision Image Sig Process 149(1):43–50
4. Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) Digital Watermarking and Steganography, 2nd edn. Elsevier, New York
5. Dan Y, Sattar F, Barkat B (2006) Multiresolution fragile watermarking using complex chirp signals for content authentication. Pattern Recog 39(5):935–952
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献