排出 发表于 2025-3-23 11:50:52

Kirk A. B. Newring,Megan N. Carterbility of differentiating “content preserving” modifications from “malicious” attacks and so can ascertain and locate the “malicious” attacks. Experimental results show the feasibility of the proposed scheme.

急性 发表于 2025-3-23 17:34:06

Richard W. Elwood,Donn R. Kolbeckes. We examine the effect of the coefficient selection method on watermark scalability by considering the quality and resolution scalability of seven simple selection methods when used as part of a spread spectrum watermarking algorithm.

乐器演奏者 发表于 2025-3-23 19:36:10

Watermark Embedding for Black-Box Channelsthat the watermark does not survive. When the watermark survives 100 times in a row, the algorithm terminates. This algorithm is shown experimentally to produce good results with three different channel models.

Meander 发表于 2025-3-23 23:02:17

http://reply.papertrans.cn/28/2799/279888/279888_14.png

Comprise 发表于 2025-3-24 03:12:44

http://reply.papertrans.cn/28/2799/279888/279888_15.png

hedonic 发表于 2025-3-24 06:47:11

http://reply.papertrans.cn/28/2799/279888/279888_16.png

思想上升 发表于 2025-3-24 12:07:21

http://reply.papertrans.cn/28/2799/279888/279888_17.png

MOAN 发表于 2025-3-24 18:04:53

On the Integration of Watermarks and Cryptography and cryptographic primitives poses new problems. This paper reviews some of the fallacies and pitfalls that occur during the design of secure watermarking applications, and provides some practical guidelines for secure watermarking protocols.

枫树 发表于 2025-3-24 19:11:51

http://reply.papertrans.cn/28/2799/279888/279888_19.png

aptitude 发表于 2025-3-25 02:49:23

http://reply.papertrans.cn/28/2799/279888/279888_20.png
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Digital Watermarking; Second International Ton Kalker,Ingemar Cox,Yong Man Ro Conference proceedings 2004 Springer-Verlag Berlin Heidelberg