-
1
-
-
84978940128
-
Can invisible watermarks resolve rightful ownerships?
-
Feb. also IBM Tech. Rep. RC 20509, July 25, 1996
-
S. Graver, N. Memon, B. L. Yeo, and M. M. Yeung, "Can invisible watermarks resolve rightful ownerships?," in Proc., SPIE Storage and Retrieval for Still Image and Video Databases V, vol. SPIE 3022, Feb. 1997, pp. 310-321; also IBM Tech. Rep. RC 20509, July 25, 1996.
-
(1997)
Proc., SPIE Storage and Retrieval for Still Image and Video Databases V
, vol.3022 SPIE
, pp. 310-321
-
-
Graver, S.1
Memon, N.2
Yeo, B.L.3
Yeung, M.M.4
-
2
-
-
0030388964
-
Secure spread spectrum watermarking tor images, audio and video
-
I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking tor images, audio and video," in IEEE Int. Conf. Image Processing, vol. 3, pp. 243-246, 1996.
-
(1996)
IEEE Int. Conf. Image Processing
, vol.3
, pp. 243-246
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
3
-
-
0029464112
-
Techniques for data hiding
-
Feb.
-
W. R. Bender, D. Gruhl, and N. Morimoto, "Techniques for data hiding," in Proc. SPIE: Storage and Retrieval of Image and Video Databases, vol. 2420, Feb. 1995, pp. 104-173.
-
(1995)
Proc. SPIE: Storage and Retrieval of Image and Video Databases
, vol.2420
, pp. 104-173
-
-
Bender, W.R.1
Gruhl, D.2
Morimoto, N.3
-
4
-
-
84997769409
-
A digital watermark
-
R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, "A digital watermark," in Proc., IEEE Int. Conf. Image Processing, vol. II, 1994, pp. 86-90.
-
(1994)
Proc., IEEE Int. Conf. Image Processing
, vol.2
, pp. 86-90
-
-
Van Schyndel, R.G.1
Tirkel, A.Z.2
Osborne, C.F.3
-
6
-
-
0029233536
-
Watermarking digital images for copyright protection
-
F. M. Boland, J. J. K. O'Ruandaidh, and C. Dautzenberg, "Watermarking digital images for copyright protection," in Proc. IEE Image Processing Applications Conf., 1995, pp. 326-330.
-
(1995)
Proc. IEE Image Processing Applications Conf.
, pp. 326-330
-
-
Boland, F.M.1
O'Ruandaidh, J.J.K.2
Dautzenberg, C.3
-
7
-
-
0029765001
-
Copyright protection of images using robust digital signatures
-
May
-
N. Nikolaidis and I. Pitas, "Copyright protection of images using robust digital signatures," in Proc., IEEE Int. Conf. on Acoustics, Speech and Signal Processing, vol. 4, May 1996, pp. 2168-2171.
-
(1996)
Proc., IEEE Int. Conf. on Acoustics, Speech and Signal Processing
, vol.4
, pp. 2168-2171
-
-
Nikolaidis, N.1
Pitas, I.2
-
8
-
-
84865889721
-
-
Copy protection for multimedia data based on labeling techniques.
-
G. Langolaar, van der Lubbe, and J. Biemond. (1996). Copy protection for multimedia data based on labeling techniques. Available WWW: http://www-it.el.tudelft.nl/pda/smash/public/benelux_cr.html.
-
(1996)
-
-
Langolaar, G.1
Van Der Lubbe2
Biemond, J.3
-
9
-
-
0030407057
-
Transparent robust image watermarking
-
Sep.
-
M. Swanson, B. Zhu, and A. Tewfik, "Transparent robust image watermarking," in Proc. Int. Conf. on Image Processing 1996, vol. 3, pp. 211-214, Sep.
-
Proc. Int. Conf. on Image Processing 1996
, vol.3
, pp. 211-214
-
-
Swanson, M.1
Zhu, B.2
Tewfik, A.3
-
11
-
-
84865896609
-
-
Digimarc corporation. (1997). Available WWW: http://www.digi-marc.com/
-
(1997)
-
-
-
12
-
-
84865889717
-
-
"Steganography methods employing embedded calibration data," U.S. Patent 5636292, June 1997
-
G. B. Rhoads, "Steganography methods employing embedded calibration data," U.S. Patent 5636292, June 1997.
-
-
-
Rhoads, G.B.1
-
13
-
-
58849141394
-
A review of watermarking and the importance of perceptual modeling
-
Feb.
-
I. J. Cox and M. L. Miller, "A review of watermarking and the importance of perceptual modeling," in Proc. SPIE Human Vision and Elect. Imaging II, vol. SPIE, vol. 3016, Feb. 1997.
-
(1997)
Proc. SPIE Human Vision and Elect. Imaging II
, vol.3016 SPIE
-
-
Cox, I.J.1
Miller, M.L.2
-
14
-
-
0030409662
-
A method for signature casting on digital images
-
I. Pitas, "A method for signature casting on digital images," in Proc. Int. Conf. on Image Processing 1996, vol. 3, pp. 215-218.
-
Proc. Int. Conf. on Image Processing 1996
, vol.3
, pp. 215-218
-
-
Pitas, I.1
-
15
-
-
0026142897
-
The JPEG still picture compression standard
-
Apr.
-
G. K. Wallace, "The JPEG still picture compression standard," Comm. ACM, vol. 34, pp. 30-44, Apr. 1991.
-
(1991)
Comm. ACM
, vol.34
, pp. 30-44
-
-
Wallace, G.K.1
-
18
-
-
78650922644
-
The MD4 message digest algorithm
-
New York: Springer-Verlag
-
R. Rivest, "The MD4 message digest algorithm," in Advances in Cryptology, CRYPTO 92. New York: Springer-Verlag, 1991, pp. 303-311.
-
(1991)
Advances in Cryptology, CRYPTO 92
, pp. 303-311
-
-
Rivest, R.1
-
19
-
-
0003629991
-
-
NIST FIPS Pub 180-1, Apr.
-
National Institute of Standards and Technology, "Secure Hash Standard," NIST FIPS Pub 180-1, Apr. 1995.
-
(1995)
Secure Hash Standard
-
-
-
20
-
-
84865896610
-
-
U.S. Copyright Office Circular 1. Mar. Gopher: marvel.loc.gov.
-
U.S. Copyright Office Circular 1. (Mar. 1996). Available WWW: http://lcweb.loc.gov/copyright; Available Gopher: marvel.loc.gov.
-
(1996)
-
-
|