Funder
National Research University Higher School of Economics
Subject
Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Signal Processing,Software
Reference71 articles.
1. Exploring steganography: Seeing the unseen;Johnson;Computer (Long. Beach. Calif),1998
2. Attacks on digital watermarks: Classification, estimation-based attacks, and benchmarks;Voloshynovskiy;IEEE Commun. Mag.,2001
3. Secure spread spectrum watermarking for multimedia;Cox;IEEE Trans. Image Process.,1997
4. Attacks on copyright marking systems;Petitcolas;Lect. Notes Comput. Sci. (Including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics),1998
5. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications;Craver;IEEE J. Sel. Areas Commun.,1998
Cited by
48 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献