Author:
Wang Zhouliang,Xiang Wanni,Wang Weiya,Li Hui
Publisher
Springer Science and Business Media LLC
Reference25 articles.
1. GUGELMANN D, SOMMER D, LENDERS V, et al. Screen watermarking for data theft investigation and attribution[C]//2018 10th International Conference on Cyber Conflict (CyCon), May 29–June 1, 2018, Tallinn, Estonia. New York: IEEE, 2018: 391–408.
2. HAN S, YANG J, WANG R, et al. A robust color image watermarking algorithm against rotation attacks[J]. Optoelectronics letters, 2018, 14(1): 61–66.
3. KANG X, HUANG J, ZENG W. Efficient general print-scanning resilient data hiding based on uniform log-polar mapping[J]. IEEE transactions on information forensics and security, 2010, 5(1): 1–12.
4. NAKAMURA T, KATAYAMA A, YAMAMURO M, et al. Fast watermark detection scheme from camera-captured images on mobile phones[J]. International journal of pattern recognition and artificial intelligence, 2006, 20(04): 543–564.
5. SCHABER P, KOPF S, WETZEL S, et al. CamMark: analyzing, modeling, and simulating artifacts in camcorder copies[J]. ACM transactions on multimedia computing, communications, and applications (TOMM), 2015, 11(2s): 1–23.