Author:
Das Tanmoy Kanti,Maitra Subhamoy
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Information Systems,Software
Reference26 articles.
1. Anderson R.J., Petitcolas F.A.P. (1998): On the limits of steganography. IEEE J. Sel. Areas Commun. (Special issue on copyright and privacy protection) 16(4): 474–481
2. Boeuf, J., Stern, J.P.: An analysis of one of the SDMI candidates. In: Information Hiding 2001. Lecture Notes in Computer Science. vol. 2137, pp. 395–410 Springer, Berlin Heidelberg New York (2001)
3. Cayre, F., Fontaine, C., Furon, T.: Watermarking security part I: theory. In: The Proceedings of International Conference on Security, Steganography and Watermarking of Multimedia Contents VI SPIE-IS & T Electronic Imaging, SPIE, vol. 5681, pp. 746–757, 2005
4. Das T.K., Maitra S., Mitra J. (2005): Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme. IEEE Trans. Signal Process. 53(2): 768–775
5. Das T.K., Maitra S. (2004): Cryptanalysis of correlation based watermarking schemes using single watermarked copy. IEEE Signal Process. Lett. 11(4): 446–449
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献