Funder
King Fahd University of Petroleum and Minerals
Publisher
Springer Science and Business Media LLC
Reference53 articles.
1. Moulin, P.; O’Sullivan, J.: Information-theoretic analysis of information hiding. IEEE Trans. Inf. Theory 49(3), 563–593 (2003)
2. Voloshynovskiy, S.; Pereira, S.; Iquise, V.; Pun, T.: Attack modelling: towards a second generation watermarking benchmark. Signal Process. 81(6), 1177–1214 (2001)
3. Costa, M.H.: Writing on dirty paper. IEEE Trans. Inf. Theory 29(3), 439–441 (1983)
4. Gelfand, S.I.; Pinsker, M.S.: Coding for channel with random parameters. Probl. Control Inf. Theory 9(1), 19–31 (1983)
5. Lin, C.-Y.; Wu, M.; Bloom, J.A.; Cox, I.J.; Miller, M.L.; Lui, Y.M.: Rotation, scale, and translation resilient watermarking for images. IEEE Trans. Image Process. 10(5), 767–782 (2001)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献