Author:
Fazli Amir Reza,Sarbisheie Ghazaleh
Publisher
Springer Science and Business Media LLC
Reference41 articles.
1. Simmons, G.J.: The prisoners problem and the subliminal channel. In: Proceedings of Advances Cryptology, pp. 51–67 (1984)
2. Cayre, F.; Bas, P.: Kerckhoffs-based embedding security class for WOA data hiding. In: IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 1–15 (2008)
3. Hsieh, M.; Tseng, D.; Huang, Y.: Hiding digital watermarks using multiresolution wavelet transform. In: IEEE Transactions on Signal Process, vol. 48, no. 5, pp. 875–881 (2001)
4. Kalker, T.: Consideration on watermarking security. In: Proceedings of IEEE International Workshop on Multimedia Signal Processing, Cannes, pp. 201–206 (2007)
5. Comesaña P., Pérez-González F., Balado F.: Watermarking security: a survey. IEEE Trans. Signal Process. 54(2), 585–600 (2006)