THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng | |
---|---|
Số trang | 171 |
Dung lượng | 29,64 MB |
Nội dung
Ngày đăng: 21/09/2020, 22:36
Nguồn tham khảo
Tài liệu tham khảo | Loại | Chi tiết |
---|---|---|
7.Khan, A., Tahir, S.F., Majid, A., Choi, T.-S.: Machine learning based adaptive watermark decoding in view of anticipated attack. PatternRecognition.https://doi.org/10.1016/j.patcog.2008.01.007 | Link | |
8.Guttman, B., Roback, E.: An Introduction to Computer Security: the NIST Handbook. Special Publication (NIST SP) - 800-12. (1995).http://dx.doi.org/10.1002/https://dx.doi.org/10.6028/NIST.SP.800-12r1 | Link | |
9.Zielińska, E. zbieta, Mazurczyk, W., Szczypiorski, K.: Trends in Steganography.https://doi.org/10.1145/2566590.2566610 | Link | |
12. Wolfgang, R.B., Podilchuk, C.I., Delp, E.J.: Perceptual watermarks for digital images and video. Proceedings of the IEEE. 87, 1108–1126 (1999). https://doi.org/10.1109/5.771067 | Link | |
14. Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing. 6, 1673–1687 (1997). https://doi.org/10.1109/83.650120 | Link | |
1.Forouzan, B.A.: Cryptography & Network Security. McGraw-Hill, Inc., New York, NY, USA (2008) | Khác | |
2.Stallings, W.: Cryptography and Network Security: Principles and Practice. Pearson, Boston (2010) | Khác | |
3.Johnson, N.F., Jajodia, S.: Exploring steganography: Seeing the unseen | Khác | |
4.Barni, M., Bartolini, F.: Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. CRC Press (2004) | Khác | |
5.Chamlawi, R., Khan, A.: Digital image authentication and recovery:Employing integer transform based information embedding and extraction | Khác | |
6.Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann (2007) | Khác | |
10. Anastasi, J.: The New Forensics: Investigating Corporate Fraud and the Theft of Intellectual Property. Wiley, Hoboken, N.J (2003) | Khác | |
11. Simmons, G.J.: The Prisoners’ Problem and the Subliminal Channel. In:Chaum, D. (ed.) Advances in Cryptology: Proceedings of Crypto 83. pp | Khác |
TỪ KHÓA LIÊN QUAN
TÀI LIỆU CÙNG NGƯỜI DÙNG
TÀI LIỆU LIÊN QUAN