<< Chapter < Page Chapter >> Page >

1.Chandramouli, R., Nasir Memon, and Majid Rabbani. "Digital watermarking." Encyclopedia of Imaging Science and Technology (2002).

2. Fridrich, Jessica, and Miroslav Goljan. "Comparing robustness of watermarking techniques." Electronic Imaging'99. International Society for Optics and Photonics, 1999.

3. Voloshynovsky, S., et al. "Generalized watermarking attack based on watermark estimation and perceptual remodulation." Proceedings of SPIE: Security and Watermarking of Multimedia Content II, San Jose, CA, USA (2000).

4. Voloshynovskiy, Sviatolsav, et al. "Attacks on digital watermarks: classification, estimation based attacks, and benchmarks." Communications Magazine, IEEE 39.8 (2001): 118-126.

5. Cox, Ingemar J., et al. "Digital watermarking." U.S. Patent No. 5,915,027. 22 Jun. 1999.

6. Cao, Lijie. "Singular value decomposition applied to digital image processing." Division of Computing Studies, Arizona State University Polytechnic Campus, Mesa, Arizona State University polytechnic Campus (2006).

Get Jobilize Job Search Mobile App in your pocket Now!

Get it on Google Play Download on the App Store Now




Source:  OpenStax, Robustness analysis on dct watermarking technique under compression attack. OpenStax CNX. Dec 19, 2012 Download for free at http://cnx.org/content/col11472/1.1
Google Play and the Google Play logo are trademarks of Google Inc.

Notification Switch

Would you like to follow the 'Robustness analysis on dct watermarking technique under compression attack' conversation and receive update notifications?

Ask