Publisher
Springer Berlin Heidelberg
Reference8 articles.
1. Furon, T., Bas, P.: Broken arrows. EURASIP Journal on Information Security 2008, Article ID 597040 (2008)
2. ECRYPT: BOWS-2, Break our watermarking system, 2nd edn. (2007), http://bows2.gipsa-lab.inpg.fr
3. Furon, T., Bas, P.: License agreement (2007), http://bows2.gipsa-lab.inpg.fr/Bo-blog/Images/BOWS2-agreement.pdf
4. Cox, I.J., Linnartz, J.P.M.G.: Public watermarks and resistance to tampering. In: IEEE International Conference on Image Processing ICIP 1997, Santa Barbara, California, USA, vol. 3, pp. 3–6 (1997)
5. Comesaña, P., Pérez-Freire, L., Pérez-González, F.: The blind Newton sensitivity attack. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents VIII (Proc. of SPIE), San Jose, CA (2006)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Astroethics and the Non-Fungibility Thesis;Environmental Ethics;2022
2. Steganalysis of Semi-fragile Watermarking Systems Resistant to JPEG Compression;Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications;2020
3. Forgotten Siblings: Unifying Attacks on Machine Learning and Digital Watermarking;2018 IEEE European Symposium on Security and Privacy (EuroS&P);2018-04
4. DEVELOPMENT AND IMPLEMENTATION OF HASH FUNCTION FOR GENERATING HASHED MESSAGE;Advances in Science and Technology Research Journal;2016