What people are saying - Write a review
We haven't found any reviews in the usual places.
An Implementation of and Attacks on ZeroKnowledge Watermarking
On the Possibility of Noninvertible Watermarking Schemes
Reversing Global and Local Geometrical Distortions in Image
24 other sections not shown
Other editions - View all
adversary algorithm Alice Alice and Bob anonymity application basic blocks benchmark bits buyer calibration CART model classification collocations Computer constraints correlations covert channels DCT coefficients decoder detection rate Digital Watermarking distortion distribution double quantized embed embedding encoding encrypted entropy estimate example executed fingerprinting forensic engineering Fridrich function graph groups hidden message histogram IEEE Image Set implementation Information Hiding input instance integer Java JPEG JPEG compression LNCS LSB steganography matrix method module node noise oblivious transfer optimization original output packets padding pairs paper parameters payload traffic rate ping pixels possible probability probing attacks problem properties proposed random re-sampling receiver reliability robustness ROC curves sample scheme Section seller sender sequence signal software watermarking solution Springer-Verlag statistics steganalysis steganography synonyms synonymy technique template thread tion traffic analysis variables vector Verilog Workshop