Author:
Bas Patrick,Furon Teddy,Cayre François,Doërr Gwenaël,Mathon Benjamin
Reference37 articles.
1. Cox I, Killian J, Leighton T, Shamoon T (1996) Secure spread spectrum watermarking for images, audio and video. In: Proceedings of the IEEE international conference on image processing ICIP-96, Lausanne, Switzerland, pp 243–246
2. Kalker T, Linnartz JP, Dijk van M (1998) Watermark estimation through detector analysis. In: IEEE international conference on image processing 98 proceedings, Focus Interactive Technology Inc., Chicago, Illinois
3. Mansour M, Tewfik A (2002) Secure detection of public watermarks with fractal decision boundaries. In: Proceedings of the 11th European signal processing conference (EUSIPCO’02)
4. Choubassi ME, Moulin P (2005) A new sensitivity analysis attack. In: Proceedings of the SPIE international conference on security and watermarking of multimedia contents III. San Jose, CA, USA
5. Comesaña P, Pérez-Freire L, Pérez-González F (2005) The return of the sensitivity attack. In: Barni M (Hrsg.), Cox I (Hrsg.), Kalker T (Hrsg.), Kim HJ (Hrsg.) (eds) Digital watermarking: 4th international workshop, IWDW 2005 Bd. 3710, Lecture notes in computer science, Siena, Italy, Springer, pp 260–274