default search action
Transactions on Data Hiding and Multimedia Security, Volume 4, 2009
- Yun Q. Shi:
Transactions on Data Hiding and Multimedia Security IV. Lecture Notes in Computer Science 5510, Springer 2009, ISBN 978-3-642-01756-8 - Angela Piper, Reihaneh Safavi-Naini:
How to Compare Image Watermarking Algorithms. 1-28 - Xiaojun Qi, Ji Qi:
A Desynchronization Resilient Watermarking Scheme. 29-48 - Tsung-Yuan Liu, Wen-Hsiang Tsai:
Robust Watermarking in Slides of Presentations by Blank Space Coloring: A New Approach. 49-64 - Weina Jiang, Anthony T. S. Ho, Helen Treharne:
A Novel Least Distortion Linear Gain Model for Halftone Image Watermarking Incorporating Perceptual Quality Metrics. 65-83 - Guorong Xuan, Yun Q. Shi, Peiqi Chai, Jianzhong Teng, Zhicheng Ni, Xuefeng Tong:
Optimum Histogram Pair Based Image Lossless Data Embedding. 84-102
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.