-
1
-
-
84979063273
-
The role of experiment in the theory of algorithms
-
Rutgers University, Oct
-
R. J. Anderson. The role of experiment in the theory of algorithms. In 5th DI-MACS Challenge Workshop: Experimental Methodology Day, Rutgers University, Oct. 1996. http://www.cs.amherst.edu/~dsj/methday.html.
-
(1996)
5th DI-MACS Challenge Workshop: Experimental Methodology Day
-
-
Anderson, R.J.1
-
4
-
-
0030384775
-
Techniques for data hiding
-
W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for data hiding. IBM Systems Journal, 35(3&4), 1996. http://www.almaden.ibm.com/journal/sj/mit/sectiona/bender.pdf.
-
(1996)
IBM Systems Journal
, vol.35
, Issue.3-4
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
5
-
-
0003451454
-
Secure spread spectrum watermarking for multimedia
-
NEC Research Institute, May
-
I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. Technical Report 95-10, NEC Research Institute, May 1995. http://www.neci.nj.nec.com/tr/index.html.
-
(1995)
Technical Report 95-10
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
6
-
-
0004166728
-
-
Technical Report RC20509, IBM Research Report, July
-
S. Craver, N. Memon, B.-L. Yeo, and M. Yeung. Can invisible watermarks resolve rightful ownership. Technical Report RC20509, IBM Research Report, July 1996.
-
(1996)
Can invisible watermarks resolve rightful ownership
-
-
Craver, S.1
Memon, N.2
Yeo, B.-L.3
Yeung, M.4
-
8
-
-
84947907875
-
Technical trials and legal tribulations
-
July
-
S. Craver, N. Memon, B.-L. Yeo, and M. Yeung. Technical trials and legal tribulations. CACM, 41(7):45-54, July 1998.
-
(1998)
CACM
, vol.41
, Issue.7
, pp. 45-54
-
-
Craver, S.1
Memon, N.2
Yeo, B.-L.3
Yeung, M.4
-
11
-
-
4243719806
-
Coding and synchronization: A boost and a bottleneck for the development of image watermarking
-
L'Aquila, Italy, June
-
J. R. Hernandez, F. Perez-Gonzalez, J. M. Rodriguez, and G. Nieto. Coding and synchronization: A boost and a bottleneck for the development of image watermarking. In Cost #254 Workshop on Intelligent Communications, L'Aquila, Italy, June 1998.
-
(1998)
Cost #254 Workshop on Intelligent Communications
-
-
Hernandez, J.R.1
Perez-Gonzalez, F.2
Rodriguez, J.M.3
Nieto, G.4
-
12
-
-
84978940131
-
The robustness of digital image watermarks
-
Las Vegas, NV, July
-
L. Irwin, G. L. Heileman, C. E. Pizano, C. T. Abdallah, and R. Jordan. The robustness of digital image watermarks. In Proceedings of the International Conference on Imaging Science, Systems, and Technology, pages 82-85, Las Vegas, NV, July 1998.
-
(1998)
Proceedings of the International Conference on Imaging Science, Systems, and Technology
, pp. 82-85
-
-
Irwin, L.1
Heileman, G.L.2
Pizano, C.E.3
Abdallah, C.T.4
Jordan, R.5
-
14
-
-
84955584804
-
The history of steganography
-
R. Anderson, editor, Springer-Verlag
-
D. Kahn. The history of steganography. In R. Anderson, editor, Information Hiding, Springer Lecture Notes in Computer Science, volume 1174, pages 183-206. Springer-Verlag, 1996.
-
(1996)
Information Hiding, Springer Lecture Notes in Computer Science
, vol.1174
, pp. 183-206
-
-
Kahn, D.1
-
17
-
-
0001001980
-
Digital signature of color images using amplitude modulation
-
M. Kutter, F. Jordan, and F. Bossen. Digital signature of color images using amplitude modulation. Journal of Electronic Imaging, 7(2):326-332, 1998.
-
(1998)
Journal of Electronic Imaging
, vol.7
, Issue.2
, pp. 326-332
-
-
Kutter, M.1
Jordan, F.2
Bossen, F.3
-
19
-
-
0001891194
-
Opportunities for watermarking standards
-
F. Mintzer, G. W. Braudaway, and A. E. Bell. Opportunities for watermarking standards. CACM, 41(7):57-64, 1998.
-
(1998)
CACM
, vol.41
, Issue.7
, pp. 57-64
-
-
Mintzer, F.1
Braudaway, G.W.2
Bell, A.E.3
-
20
-
-
84979065449
-
Towards a discipline of experimental algorithmics
-
Rutgers University, Oct
-
B. M. Moret. Towards a discipline of experimental algorithmics. In 5th DIMACS Challenge Workshop: Experimental Methodology Day, Rutgers University, Oct. 1996. http://www.cs.amherst.edu/~dsj/abstract.moret.
-
(1996)
5th DIMACS Challenge Workshop: Experimental Methodology Day
-
-
Moret, B.M.1
-
21
-
-
0029765001
-
Copyright protection of images using robust digital signatures
-
Atlanta, GA, May
-
N. Nikolaidis and I. Pitas. Copyright protection of images using robust digital signatures. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, pages 2168-2171, Atlanta, GA, May 1996. http://poseidon.csd.auth.gr/signatures/.
-
(1996)
Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing
, pp. 2168-2171
-
-
Nikolaidis, N.1
Pitas, I.2
-
23
-
-
84957877979
-
Attacks on copyright marking systems
-
Portland, Oregon, April. Springer-Verlag
-
F. A. Petitcolas, R. J. Anderson, and M. G. Kuhn. Attacks on copyright marking systems. In Proceedings Second International Workshop on Information Hiding, Lecture Notes in Computer Science, Portland, Oregon, April 1998. Springer-Verlag. http://www.cl.cam.ac.uk/~fapp2/papers/ih98-attacks/.
-
(1998)
Proceedings Second International Workshop on Information Hiding, Lecture Notes in Computer Science
-
-
Petitcolas, F.A.1
Anderson, R.J.2
Kuhn, M.G.3
-
25
-
-
84978940090
-
A GIF watermarking technique based on inveriant measures
-
Las Vegas, NV, July
-
C. E. Pizano and G. L. Heileman. A GIF watermarking technique based on inveriant measures. In Proceedings of the International Conference on Imaging Science, Systems, and Technology, pages 60-67, Las Vegas, NV, July 1998.
-
(1998)
Proceedings of the International Conference on Imaging Science, Systems, and Technology
, pp. 60-67
-
-
Pizano, C.E.1
Heileman, G.L.2
-
26
-
-
0030409375
-
A content-based approach to image signature generation and authentication
-
Sept
-
M. Schneider and S.-F. Chang. A content-based approach to image signature generation and authentication. In International Conference on Image Processing, volume III, pages 227-230, Sept 1996.
-
(1996)
International Conference on Image Processing
, vol.3
, pp. 227-230
-
-
Schneider, M.1
Chang, S.-F.2
-
29
-
-
0000157604
-
Image processing in the context of a visual model
-
T. G. Stockham, Jr. Image processing in the context of a visual model. Proceedings of the IEEE, 60:828-842, 1972.
-
(1972)
Proceedings of the IEEE
, vol.60
, pp. 828-842
-
-
Stockham, T.G.1
-
30
-
-
0032095654
-
Multimedia data-embedding and watermarking technologies
-
M. D. Swanson, M. Kobayashi, and A. H. Tewfik. Multimedia data-embedding and watermarking technologies. Proceedings of the IEEE, 86(6):1064-1087, 1998.
-
(1998)
Proceedings of the IEEE
, vol.86
, Issue.6
, pp. 1064-1087
-
-
Swanson, M.D.1
Kobayashi, M.2
Tewfik, A.H.3
-
31
-
-
0002167987
-
Electronic watermark
-
A. Z. Tirkel, G. A. Rankin, R. M. van Schyndel, W. J. Ho, N. Mee, and C. F. Osborne. Electronic watermark. In Digital Image Computing, Technology and Applications, pages 666-673, 1993.
-
(1993)
Digital Image Computing, Technology and Applications
, pp. 666-673
-
-
Tirkel, A.Z.1
Rankin, G.A.2
van Schyndel, R.M.3
Ho, W.J.4
Mee, N.5
Osborne, C.F.6
-
32
-
-
84997769409
-
A digital watermark
-
Austin, TX, Nov
-
R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne. A digital watermark. In International Conference on Image Processing, volume 2, pages 86-90, Austin, TX, Nov 1994.
-
(1994)
International Conference on Image Processing
, vol.2
, pp. 86-90
-
-
van Schyndel, R.G.1
Tirkel, A.Z.2
Osborne, C.F.3
|