Author:
Cao Jian,Huang Jiwu,Ni Jiangqun
Publisher
Springer Berlin Heidelberg
Reference11 articles.
1. Lecture Notes in Computer Science;P. Comesaña,2005
2. Kerckhoffs, A.: La cryptographie militaire. Journal des Sciences militaires IX, 5–38 (1883)
3. Kalker, T.: Considerations on watermarking security. In: Proc. MMSP, Cannes, France, pp. 201–206 (October 2001)
4. Cayre, F., Furon, T., Fontaine, C.: Watermarking security: Theory and practice. IEEE Trans. Signal Process. 53(10), 3976–3987 (2005)
5. Cox, I., Killian, J., Leighton, F., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Processing 6(12), 1673–1687 (1997)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献