Author:
Chung Kuo-Liang,Shen Chao-Hui,Chang Lung-Chun
Subject
Artificial Intelligence,Computer Vision and Pattern Recognition,Signal Processing,Software
Reference18 articles.
1. Anderson, R., 1996. Strentching the limits of steganography. In: Proc. First Internat. Workshop Information Hiding, Cambridge, UK. Lecture Notes, Vol. 1174. Springer, Berlin, pp. 39–48
2. Singular value decomposition (SVD) image coding;Andrews;IEEE Trans. Comm.,1976
3. Achievable performance digital watermarking systems;Chen;Proc. IEEE Internat. Conf. Multimedia Comput. Systems,1999
4. A virtual image cryptosystem based upon vector quantization;Chen;IEEE Trans. Image Process.,1998
5. Eggers, J., Su, J., Girod, B., 2000. Robustness of a blind image watermarking scheme. In: Proc. IEEE Internat. Conf. Image Process., Vancouver, Canada
Cited by
86 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Feature Selection Based Universal Image Steganalysis: A Survey;2022 Fifth National Conference of Saudi Computers Colleges (NCCC);2022-12-17
2. Digital watermarking techniques: Comparative analysis and robustness for real time applications;INTERNATIONAL CONFERENCE ON RESEARCH IN SCIENCES, ENGINEERING & TECHNOLOGY;2022
3. Hide Chopin in the Music: Efficient Information Steganography Via Random Shuffling;ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP);2021-06-06
4. Image Steganography in Spatial Domain: Current Status, Techniques, and Trends;Intelligent Automation & Soft Computing;2021
5. A Recent Survey of SVD- and DWT-Based Digital Image Watermarking Theories and Techniques: A Review;Proceedings of International Conference on Big Data, Machine Learning and Applications;2021