Author:
Bas Patrick,Furon Teddy,Cayre François,Doërr Gwenaël,Mathon Benjamin
Reference15 articles.
1. Cayre F, Fontaine C, Furon T (2005) Watermarking security: theory and practice. In: IEEE transactions on signal processing, special issue supplement on secure media II
2. PËrez-Freire L, PËrez-Gonzalez F (2007) Disclosing secrets in watermarking and data-hiding. In: Third Wavila challenge, WACHA07. Saint-Malo, France, June 2007
3. Doërr GJ, Dugelay J-L (2004) Danger of low-dimensional watermarking subspaces. In: ICASSP 2004, 29th IEEE international conference on acoustics, speech, and signal processing. Montreal, Canada, 17–21 May 2004
4. Hyvärinen A (1999) Fast and robust fixed-point algorithms for independent component analysis. IEEE Trans Neural Netw 10(3):626–634
5. Doërr G, Dugelay J-L (2004) Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Trans Signal Process 52(10):2955–2964