Цифровая стеганография
Шрифт:
16. Provos N. Defending Against on Statistical Steganalysis // Proceeding of the 10 USENIX Security Symposium. 2001. P. 323–335.
17. Provos N., Honeyman P. Detecting Steganographic Content on the Internet // Proceeding of the 10 USENIX Security Symposium. 2001. P. 323–335.
18. Вентцель Е. С. Овчаров Л. А. Теория вероятностей и ее инженерные приложения. —М.: Наука. Гл. ред. физ. — мат. лит. 1988. — 480 с.
19. Moskowitz I.S., Longdon G.E., Chang L. A new paradigm hidden in Steganography // Proceedings of Workshop «New Security Paradigms». ACM Press. 2000. P. 41–50.
20. Katzenbeisser S., Petitcolas F. Defining Security in Steganographic Systems.
1. Girod B. The information theoretical significance of spatial and temporal masking in video signals // Proc. of the SPIE Symposium on Electronic Imaging. 1989. Vol. 1077. P. 178–187.
2. Watson A. The cortex transform: rapid computation of simulated neural images // Computer Vision, Graphics, and Image Processing. 1987. Vol. 39. № 3. P. 311–327.
3. Lewis A., Knowles G. Image compression using the 2-d wavelet transform // IEEE Transactions on Image Processing. 1992. № 2. P. 244–250.
4. Shapiro J. Embedded image coding using zerotrees of wavelet coefficients // IEEE Trans. on Signal Processing. 1993. № 12. P. 3445–3462.
5. Said A., Pearlman W. A new, fast, and efficient image codec based on set partitioning in hierarchical trees // IEEE Trans. on Circuits and Systems for Video Technology. 1996. № 3. P. 243–250.
6. Taubman D., Ordentlich E., Weinberger M., Seroussi G. Embedded block coding in JPEG 2000 // Signal Processing: Image Communication. 2002. № 17. P. 49–72
7. Shoham Y., Gersho A. Efficient bit allocation for an arbitrary set of quantizers // IEEE Trans. Acoustics, Speech, and Signal Processing. 1988. № 9. P. 1445–1453.
8. Kutter M., Jordan F., Bossen F. Digital signature of color images using amplitude modulation // Proc. of the SPIE Storage and Retrieval for Image and Video Databases V. 1997. Vol. 3022. P. 518–526.
9. Darmstaedter V., Delaigle J.-F., Quisquater J., Macq B. Low cost spatial watermarking // Computers and Graphics. 1998. Vol. 5. P. 417–423.
10. Langelaar G., Lagendijk R., Biemond J. Robust labeling methods for copy protection of images // Proc. of the SPIE Storage and Retrieval for Image and Video Databases V. 1997. Vol. 3022.
11. Nikolaidis N., Pitas I. Robust image watermarking in the spatial domain // Signal Processing, Special Issue on Copyright Protection and Control. 1998. Vol. 66. № 3. P. 385–403.
12. Maes M., Rongen P., van Overveld C. Digital image waermarking by salient point modification practical results // SPIE Conference on Security and Watermarking of Multimedia Contents. 1999. Vol. 3657. P. 273–282.
13. Bender W., Gruhl D., Morimoto N., Lu A. Techniques for Data Hiding // IBM Systems Journal. 1996. Vol. 35.
14. Marvel L., Boncelet C., Retter J. Reliable Blind Information Hiding for Images // Proceedings of 2nd Workshop on Information Hiding. Lecture Notes in Computer Science. 1998.
15. Ramkumar M. Data Hiding in Multimedia — Theory and Applications. 1999.
16. Hernandez J., Perez-Gonzalez F., Rodriguez J., Nieto G. Performance Analysis of a 2-D Multipulse Amplitude Modulation Scheme for Data Hiding and Watermarking of Still Images // IEEE Journal on Selected Areas in Communications. 1998. Vol. 16, № 5. P. 510–525.
17. Koch E., Zhao J. Towards Robust and Hidden Image Copyright Labeling // IEEE Workshop on Nonlinear Signal and Image Processing. 1995. P. 123–132.
18. Benham D., Memon N., Yeo B.-L., Yeung M. Fast watermarking of DCT-based compressed images // Proc. of the International Conference on Image Science, Systems and Technology. 1997. P. 243–252.
19. Podilchuk C., Zeng W. Perceptual watermarking of still images // Electronic Proceedings of the IEEE Workshop on Multimedia Signal Processing. 1997.
20. Hsu C.-T., Wu J.-L. Hidden digital watermarks in images // IEEE Transactions on Image Processing. 1999. Vol. 8. № 1. P. 58–68.
21. Tao B., Dickinson B. Adaptive watermarking in the DCT domain // Proceedings of the International Conference on Acoustics, Speech and Signal Processing. 1997.
22. Cox I., Kilian J., Leighton T., Shamoon T. Secure spread spectrum watermarking for multimedia // IEEE Transactions on Image Processing. 1997. Vol. 6. № 12. P. 1673–1687.
23. Barni M., Bartolini R., Cappellini V., Piva A. A DCT-domain system for robust image watermarking // Signal Processing, Special Issue on Copyright Protection and Control. 1998. Vol. 66. № 3. P. 357–372.
24. Fridrich J. Combining low-frequency and spread spectrum watermarking // Proceedings of the SPIE Conference on Mathematics of Data/Image Coding, Compression and Encryption. 1998. Vol. 3456. P. 2–12.
1. Arnold M., Kanka S. MP3 robust audio watermarking // International Watermarking Workshop. 1999.
2. Barlow J. P. The economy of ideas. Wired Magazine. 1994. № 2.
3. Barni M., Bartolini F., Cappellini V., Lippi A., Piva A. A DWT-based technique for spatio-frequency masking of digital signatures // Proceedings of the 11th SPIE Annual Symposium, Electronic Imaging '99, Security and Watermarking of Multimedia Contents. 1999. Vol. 3657.
4. Chae J. J. Robust Techniques for Data Hiding in Images and Video. PhD thesis, CA, USA, 1999.
5. Chae J. J., Mukherjee D., Manjunath B. S. A robust embedded data from wavelet coeffcients // Proceedings of SPIE, Electronic Imaging, Storage and Retrieval for Image and Video Database. 1998. Vol. 3312. P. 308–317.
6. Collberg C., Thomborson C. On the limits of software watermarking // Technical report, University of Auckland, New Zealand, 1998.
7. Corvi M., Nicchiotti G. Wavelet-based image watermarking for copyright protection // Scandinavian Conference on Image Analysis. 1997.