Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Lecture Notes in Computer Science;A. Adelsbach,2004
2. Adelsbach, A., Katzenbeisser, S., Veith, H.: Watermarking Schemes Provably Secure Against Copy and Ambiguity Attacks. In: Proceedings of the ACM Workshop on Digital Rights Management (DRM 2003), pp. 111–119 (2003)
3. Andrews, H.C., Patterson, C.L.: Singular Value Decomposition (SVD) Image Coding. IEEE Transactions on Communications, 425–432 (1976)
4. Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)
5. Craver, S., Memon, N., Yeo, B.L., Yeung, M.M.: Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks and Implications. IEEE Journal of Selected Areas in Communication 16(4), 573–586 (1998)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献