-
1
-
-
0012085074
-
Information hiding
-
R. Anderson, Ed., Tokyo, Japan: Springer
-
R. Anderson, Ed., "Information hiding," in Lecture Notes in Computer Science. Tokyo, Japan: Springer, 1996.
-
(1996)
Lecture Notes in Computer Science.
-
-
-
2
-
-
0030384775
-
Techniques for data hiding
-
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM Syst. J., vol. 35, nos. 3 and 4, pp. 313-336, 1996.
-
(1996)
IBM Syst. J.
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
3
-
-
85008047913
-
Protecting ownership rights through digital watermarking
-
July
-
H. Berghel and L. O'Gorman, "Protecting ownership rights through digital watermarking," IEEE Computer Mag., pp. 101-103, July 1996.
-
(1996)
IEEE Computer Mag.
, pp. 101-103
-
-
Berghel, H.1
O'Gorman, L.2
-
4
-
-
0029694397
-
Digital watermarks for audio signals
-
Piscataway, NJ: IEEE Press
-
L. Boney, A. Tewfik, and K. Hamdy, "Digital watermarks for audio signals," in Proceedings of Multimedia'96. Piscataway, NJ: IEEE Press, 1996, pp. 473-480.
-
(1996)
Proceedings of Multimedia'96.
, pp. 473-480
-
-
Boney, L.1
Tewfik, A.2
Hamdy, K.3
-
6
-
-
0029394108
-
Electronic marking and identification techniques to discourage document copying
-
Oct.
-
J. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman, "Electronic marking and identification techniques to discourage document copying," IEEE J. Select. Areas Commun., vol. 13, pp. 1495-1504, Oct. 1995.
-
(1995)
IEEE J. Select. Areas Commun.
, vol.13
, pp. 1495-1504
-
-
Brassil, J.1
Low, S.2
Maxemchuk, N.3
O'Gorman, L.4
-
7
-
-
0005038537
-
-
U.S. Patent 5530759, June 25
-
G. Braudway, K. Magerlein, and F. Mintzer, "Color correct digital watermarking of images," U.S. Patent 5530759, June 25, 1996.
-
(1996)
Color Correct Digital Watermarking of Images
-
-
Braudway, G.1
Magerlein, K.2
Mintzer, F.3
-
8
-
-
33646936122
-
Protecting publically-available images with a visible image watermark
-
Jan. 15
-
_, "Protecting publically-available images with a visible image watermark," IBM Research Rep. TC-20336(89918), Jan. 15, 1996.
-
(1996)
IBM Research Rep. TC-20336(89918)
-
-
-
9
-
-
0002029137
-
Spatial method for copyright labeling of digital images
-
O. Bruyndonckx, J. J. Quisquater, and B. Macq, "Spatial method for copyright labeling of digital images," in Proc. IEEE Nonlinear Signal Processing Workshop, 1995, pp. 456-459.
-
(1995)
Proc. IEEE Nonlinear Signal Processing Workshop
, pp. 456-459
-
-
Bruyndonckx, O.1
Quisquater, J.J.2
Macq, B.3
-
10
-
-
0002152920
-
Assuring ownership rights for digital images
-
H. H. Breggemann and W. Gerhardt-Häckl, Eds. Vieweg, Germany
-
G. Caronni, "Assuring ownership rights for digital images," in Reliable IT Systems, H. H. Breggemann and W. Gerhardt-Häckl, Eds. Vieweg, Germany, 1995.
-
(1995)
Reliable IT Systems
-
-
Caronni, G.1
-
11
-
-
0030409375
-
A content-based approach to image signature generation and authentication
-
M. Schneider and S.-F. Chang, "A content-based approach to image signature generation and authentication," in Proc. ICIP'96, vol. III, pp. 227-230.
-
Proc. ICIP'96
, vol.3
, pp. 227-230
-
-
Schneider, M.1
Chang, S.-F.2
-
14
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
see also Proc. ICIP'96, vol. III, pp. 243-246
-
I. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Processing, vol. 6, no. 12, pp. 1673-1687, 1997; see also Proc. ICIP'96, vol. III, pp. 243-246.
-
(1997)
IEEE Trans. Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
15
-
-
84978940128
-
Can invisible watermarks resolve rightful ownership?
-
IBM Research Rep. RC20509, July 1996. . See also
-
S. Graver, N. Memon, B.-L. Yeo, and M. Yeung, "Can invisible watermarks resolve rightful ownership?" IBM Research Rep. RC20509, July 1996. (Available WWW: http://www.research.ibm.com:8080.) See also Proc. SPIE Storage and Retrieval for Image and Video Databases V, Feb. 1997, vol. 3022, pp. 310-321.
-
(1997)
Proc. SPIE Storage and Retrieval for Image and Video Databases V, Feb.
, vol.3022
, pp. 310-321
-
-
Graver, S.1
Memon, N.2
Yeo, B.-L.3
Yeung, M.4
-
16
-
-
33646917538
-
Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
-
Mar.
-
_, "Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications," IBM Research Rep. RC 20755, Mar. 1997.
-
(1997)
IBM Research Rep. RC 20755
-
-
-
17
-
-
0003494104
-
-
Dept. of Electrical Engineering, Trinity College, Dublin, Tech. Rep.
-
C. Dautzenberg and F. Boland, "Watermarking images," Dept. of Electrical Engineering, Trinity College, Dublin, Tech. Rep., 1994.
-
(1994)
Watermarking Images
-
-
Dautzenberg, C.1
Boland, F.2
-
18
-
-
84955596411
-
Fractal based image steganography
-
in R. Anderson, Ed., Tokyo, Japan: Springer
-
P. Davern and M. Scott, "Fractal based image steganography," in R. Anderson, Ed., Lecture Notes in Computer Science. Tokyo, Japan: Springer, 1996, pp. 279-294.
-
(1996)
Lecture Notes in Computer Science
, pp. 279-294
-
-
Davern, P.1
Scott, M.2
-
19
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inform. Theory, vol. IT-22, pp. 644-654, 1976.
-
(1976)
IEEE Trans. Inform. Theory
, vol.IT-22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
20
-
-
0031147434
-
Spread-spectrum techniques for wireless communications
-
P. Flikkema, "Spread-spectrum techniques for wireless communications," IEEE Trans. Signal Processing, vol. 14, pp. 26-36, May 1997.
-
(1997)
IEEE Trans. Signal Processing
, vol.14
, pp. 26-36
-
-
Flikkema, P.1
-
21
-
-
0013086931
-
-
Center for Intelligent Systems & Dept. of Systems Science and Industrial Engineering, State Univ. of New York-Binghamton, preprint
-
J. Fridrich, "Methods for data hiding," Center for Intelligent Systems & Dept. of Systems Science and Industrial Engineering, State Univ. of New York-Binghamton, preprint. (Available: http://ssie.binghamton.edu/jirif/.)
-
Methods for Data Hiding
-
-
Fridrich, J.1
-
22
-
-
84958492575
-
The information theoretical significance of spatial and temporal masking in video signals
-
B. Girod, 'The information theoretical significance of spatial and temporal masking in video signals," in Proc. SPIE Human Vision, Visual Processing, and Digital Display, 1989, vol. 1077, pp. 178-187.
-
(1989)
Proc. SPIE Human Vision, Visual Processing, and Digital Display
, vol.1077
, pp. 178-187
-
-
Girod, B.1
-
23
-
-
33646945414
-
-
submitted for U.S. patent
-
B. Girod and F. Härtung, submitted for U.S. patent.
-
-
-
Girod, B.1
Härtung, F.2
-
24
-
-
85019590801
-
Low-cost perceptive digital picture watermarking method
-
Jan.
-
F. Coffin, J.-F. Delaigle, C. D. Vleeschouwer, B. Macq, and J.-J. Quisquater, "Low-cost perceptive digital picture watermarking method," in Proc. SPIE Storage and Retrieval for Image and Video Databases, Jan. 1997, vol. 3022, pp. 264-277.
-
(1997)
Proc. SPIE Storage and Retrieval for Image and Video Databases
, vol.3022
, pp. 264-277
-
-
Coffin, F.1
Delaigle, J.-F.2
Vleeschouwer, C.D.3
Macq, B.4
Quisquater, J.-J.5
-
27
-
-
33646922934
-
-
D. Gruhl. (1996). Examples of affine embedding. [Online]. Available WWW: http://nif.www.media.mit.edu/ DataHiding/affine/affine.html.
-
(1996)
Examples of Affine Embedding
-
-
Gruhl, D.1
-
28
-
-
0030384775
-
Techniques for data hiding
-
D. Gruhl, A. Lu, and W. Bender, 'Techniques for data hiding," IBM Syst. J., vol. 35, nos. 3 and 4, pp. 313-336, 1996.
-
(1996)
IBM Syst. J.
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Gruhl, D.1
Lu, A.2
Bender, W.3
-
30
-
-
84898214331
-
Copyright protection in video delivery networks by watermarking of pre-compressed video
-
S. Fdida and M. Morganti, Eds. Tokyo, Japan: Springer
-
_, "Copyright protection in video delivery networks by watermarking of pre-compressed video," in Multimedia Applications, Services and Techniques-ECMAST'97, Lecture Notes in Computer Science, S. Fdida and M. Morganti, Eds. Tokyo, Japan: Springer, 1997, vol. 1242, pp. 423-436.
-
(1997)
Multimedia Applications, Services and Techniques-ECMAST'97, Lecture Notes in Computer Science
, vol.1242
, pp. 423-436
-
-
-
32
-
-
33646899976
-
Digital watermarking of uncompressed and compressed video
-
to appear in
-
_, "Digital watermarking of uncompressed and compressed video," Signal Processing, to appear in 1997.
-
(1997)
Signal Processing
-
-
-
40
-
-
33646900284
-
Information technology-Coding of moving pictures and associated audio for digital storage up to about 1.5 Mbits/s
-
"Information technology-Coding of moving pictures and associated audio for digital storage up to about 1.5 Mbits/s," ISO/IEC IS 11172, 1993.
-
(1993)
ISO/IEC IS
, pp. 11172
-
-
-
41
-
-
0027684995
-
Signal compression based on models of human perception
-
Oct.
-
N. Jayant, J. Johnston, and R. Safranek, "Signal compression based on models of human perception," Proc. IEEE, vol. 81, pp. 1385-1422, Oct. 1993.
-
(1993)
Proc. IEEE
, vol.81
, pp. 1385-1422
-
-
Jayant, N.1
Johnston, J.2
Safranek, R.3
-
42
-
-
0006480295
-
Wideband coding-Perceptual considerations for speech and music
-
S. Furui and M. Sondhi, Eds. New York: Marcel Dekker
-
J. Johnston and K. Brandenburg, "Wideband coding-Perceptual considerations for speech and music," in Advances in Speech Signal Processing, S. Furui and M. Sondhi, Eds. New York: Marcel Dekker, 1992.
-
(1992)
Advances in Speech Signal Processing
-
-
Johnston, J.1
Brandenburg, K.2
-
45
-
-
0037878198
-
-
M. Kuhn. (1997). StirMark, [Online]. Available WWW: http://www.cl.carn.ac.uk/-fapp2/ watermarking/image.watermarking/stirmark.
-
(1997)
StirMark
-
-
Kuhn, M.1
-
48
-
-
0019266099
-
Contrast masking in human vision
-
Dec.
-
G. Legge and J. Foley, "Contrast masking in human vision," J. Opt. Soc. Amer., vol. 70, no. 12, pp. 1458-1471, Dec. 1990.
-
(1990)
J. Opt. Soc. Amer.
, vol.70
, Issue.12
, pp. 1458-1471
-
-
Legge, G.1
Foley, J.2
-
49
-
-
61849153506
-
Document marking and identification using both line and word shifting
-
Boston, MA, Apr.
-
S. Low, N. Maxemchuk, J. Brassil, and L. O'Gorman, "Document marking and identification using both line and word shifting," in Proc. Infocom'95, Boston, MA, Apr. 1995. (Available WWW: http://www.research.att.com:80/ lateinfo/projects/ecom.html.)
-
(1995)
Proc. Infocom'95
-
-
Low, S.1
Maxemchuk, N.2
Brassil, J.3
O'Gorman, L.4
-
51
-
-
0001320242
-
Embedding robust labels into images for copyright protection
-
Vienna, Austria, Aug.
-
E. Koch and J. Zhao, "Embedding robust labels into images for copyright protection," in Proc. Int. Congress Intellectual Property Rights for Specialized Information, Knowledge, and New Technologies, Vienna, Austria, Aug. 1995, pp. 242-251.
-
(1995)
Proc. Int. Congress Intellectual Property Rights for Specialized Information, Knowledge, and New Technologies
, pp. 242-251
-
-
Koch, E.1
Zhao, J.2
-
52
-
-
85027148221
-
Digital signature of color images using amplitude modulation
-
M. Kutter, F. Jordan, and F. Bossen, "Digital signature of color images using amplitude modulation," in Proc. SPIE-EI97, 1997, pp. 518-526.
-
(1997)
Proc. SPIE-EI97
, pp. 518-526
-
-
Kutter, M.1
Jordan, F.2
Bossen, F.3
-
55
-
-
0000370347
-
Video-steganography: How to embed a signature in a picture
-
Jan.
-
_, "Video-steganography: How to embed a signature in a picture," in Proc. IMA Intellectual Property, Jan. 1994, vol. 1, no. 1, pp. 187-206.
-
(1994)
Proc. IMA Intellectual Property
, vol.1
, Issue.1
, pp. 187-206
-
-
-
56
-
-
0028496330
-
Electronic document distribution
-
Sept.
-
N. Maxemchuk, "Electronic document distribution," AT&T Tech. J., pp. 73-80, Sept. 1994.
-
(1994)
AT&T Tech. J.
, pp. 73-80
-
-
Maxemchuk, N.1
-
58
-
-
33646919868
-
-
U.S. Patent 4210346, July 1
-
W. Mowry, Jr., M. McElligott, V. Tkalenko, J. Baran, and C Inaalls, "Protected document bearing watermark and method of making," U.S. Patent 4210346, July 1, 1980.
-
(1980)
Protected Document Bearing Watermark and Method of Making
-
-
Mowry Jr., W.1
McElligott, M.2
Tkalenko, V.3
Baran, J.4
Inaalls, C.5
-
60
-
-
0003629991
-
-
NIST FIPS Pub. 180-1, Apr.
-
National Institute of Standards and Technology (NIST), Secure Hash Standard, NIST FIPS Pub. 180-1, Apr. 1995.
-
(1995)
Secure Hash Standard
-
-
-
61
-
-
0027699710
-
Wideband speech and audio coding
-
Nov.
-
P. Noll, "Wideband speech and audio coding," IEEE Commun. Mag., pp. 34-44, Nov. 1993.
-
(1993)
IEEE Commun. Mag.
, pp. 34-44
-
-
Noll, P.1
-
62
-
-
33646928427
-
Embedding data in three-dimensional models
-
no. 1309. Tokyo, Japan: Springer
-
R. Ohbuchi, H. Masuda, and M. Aono, "Embedding data in three-dimensional models," in Proc. Eur. Workshop Interactive Distributed Multimedia Systems and Telecommunication Services, Darmstadt, Germany, Lecture Notes in Computer Science, no. 1309. Tokyo, Japan: Springer, 1997.
-
(1997)
Proc. Eur. Workshop Interactive Distributed Multimedia Systems and Telecommunication Services, Darmstadt, Germany, Lecture Notes in Computer Science
-
-
Ohbuchi, R.1
Masuda, H.2
Aono, M.3
-
63
-
-
0031339601
-
Watermarking three-dimensional models
-
Seattle, WA, Nov. 9-13
-
_, "Watermarking three-dimensional models," in Proc. 5th ACM Int. Multimedia Conf., Seattle, WA, Nov. 9-13, 1997, pp. 261-272.
-
(1997)
Proc. 5th ACM Int. Multimedia Conf.
, pp. 261-272
-
-
-
64
-
-
0029706672
-
Embedding a seal into a picture under orthogonal wavelet transform
-
Piscataway, NJ: IEEE Press
-
J. Ohnishi and K. Matsui, "Embedding a seal into a picture under orthogonal wavelet transform," in Proceedings of Multimedia'96. Piscataway, NJ: IEEE Press, 1996., pp. 514-521.
-
(1996)
Proceedings of Multimedia'96
, pp. 514-521
-
-
Ohnishi, J.1
Matsui, K.2
-
65
-
-
0030205766
-
Watermarking digital images for copyright protection
-
Aus.
-
J. O'Ruanaidh, C. Dautzenbcrg, and F. Boland, "Watermarking digital images for copyright protection," Proc. Inst. Elect. Eng. Vis. Image Signal Processing, Aus. 1996, vol. 143, no. 4, pp. 250-256.
-
(1996)
Proc. Inst. Elect. Eng. Vis. Image Signal Processing
, vol.143
, Issue.4
, pp. 250-256
-
-
O'Ruanaidh, J.1
Dautzenbcrg, C.2
Boland, F.3
-
68
-
-
0020128340
-
Theory of spread spectrum communications
-
May
-
R. Pickholz, D. Schilling, and L. Milstein, "Theory of spread spectrum communications," IEEE Trans. Commun., vol. COM30, pp. 855-884, May 1982.
-
(1982)
IEEE Trans. Commun., Vol. COM30
, pp. 855-884
-
-
Pickholz, R.1
Schilling, D.2
Milstein, L.3
-
71
-
-
33646934169
-
-
Multimedia Communication Lab, Lucent Technologies, Bell Labs, Tech. Memo, Sept. See also Proc. SPIE/IS&T Electronic Imaging'97: Human Vision and Electronic Imaging, Feb. 1997, vol. 3022, pp. 310-321
-
C. Podilchuk and W. Zeng, "Digital image watermarking using visual models," Multimedia Communication Lab, Lucent Technologies, Bell Labs, Tech. Memo, Sept. 1996. See also Proc. SPIE/IS&T Electronic Imaging'97: Human Vision and Electronic Imaging, Feb. 1997, vol. 3022, pp. 310-321.
-
(1996)
Digital Image Watermarking Using Visual Models
-
-
Podilchuk, C.1
Zeng, W.2
-
72
-
-
85018015036
-
Perceptual watermarking of still images
-
June
-
_, "Perceptual watermarking of still images," in Proc. IEEE Workshop Multimedia Signal Processing, June 1997, pp. 363-368.
-
(1997)
Proc. IEEE Workshop Multimedia Signal Processing
, pp. 363-368
-
-
-
73
-
-
0010218201
-
Embedded signalling
-
R. Preuss, S. Roukos, A. Muggins, H. Gish, M. Bergamo, and P. Peterson, "Embedded signalling," U.S. Patent 5319735, 1994.
-
(1994)
U.S. Patent 5319735
-
-
Preuss, R.1
Roukos, S.2
Muggins, A.3
Gish, H.4
Bergamo, M.5
Peterson, P.6
-
76
-
-
0012397471
-
Cryptography
-
J. van Leeuwen, Ed. Cambridge, MA: MIT Press, ch. 13
-
R. Rivest, "Cryptography," in Handbook of Theoretical Computer Science, vol. 1, J. van Leeuwen, Ed. Cambridge, MA: MIT Press, 1990, ch. 13, pp. 717-755. '
-
(1990)
Handbook of Theoretical Computer Science
, vol.1
, pp. 717-755
-
-
Rivest, R.1
-
77
-
-
78650922644
-
The MD4 message digest algorithm
-
Tokyo, Japan: Springer
-
-, 'The MD4 message digest algorithm," in Advances in I Cryptology, CKYPTO'92. Tokyo, Japan: Springer, 1991, pp. 303-311.
-
(1991)
Advances in I Cryptology, CKYPTO'92
, pp. 303-311
-
-
-
82
-
-
84955564864
-
Modulation and information hiding in images
-
R. Anderson, Ed., Information hiding, Tokyo, Japan: Springer
-
J. Smith and B. Comiskey, "Modulation and information hiding in images," in R. Anderson, Ed., "Information hiding," in Lecture Notes in Computer Science. Tokyo, Japan: Springer, 1996, pp. 207-226.
-
(1996)
Lecture Notes in Computer Science
, pp. 207-226
-
-
Smith, J.1
Comiskey, B.2
-
83
-
-
0003538515
-
Analysis of attacks on image watermarks with randomized coefficients
-
Princeton, NJ, Tech. Rep., May 17
-
H. Stone, "Analysis of attacks on image watermarks with randomized coefficients," NEC Research Institute, Princeton, NJ, Tech. Rep., May 17, 1996. (Available WWW: http://www.neci.nj.nec.com.)
-
(1996)
NEC Research Institute
-
-
Stone, H.1
-
84
-
-
0031365052
-
Data hiding for video in video
-
Piscataway, NJ
-
M. Swanson, B. Zhu, and A. Tewfik, "Data hiding for video in video," in Proceedings of the IEEE International Conference on Image Processing 1997. Piscataway, NJ: 1997, vol. II, pp. 676-679.
-
(1997)
Proceedings of the IEEE International Conference on Image Processing 1997
, vol.2
, pp. 676-679
-
-
Swanson, M.1
Zhu, B.2
Tewfik, A.3
-
85
-
-
0031355236
-
Multiresolution video watermarking using perceptual models and scene segmentation
-
to be published. See also Proceedings ofllie IEEE International Conference on Image Processing 1997. Piscataway, NJ
-
M. Swanson, B. Zhu, and A. Tewfik, "Multiresolution video watermarking using perceptual models and scene segmentation," IEEE J. Select. Areas Commun., to be published. See also Proceedings ofllie IEEE International Conference on Image Processing 1997. Piscataway, NJ: 1997, vol. II, pp. 558-561.
-
(1997)
IEEE J. Select. Areas Commun.
, vol.2
, pp. 558-561
-
-
Swanson, M.1
Zhu, B.2
Tewfik, A.3
-
86
-
-
85013986121
-
Object-based transparent video watermarking
-
M- Swanson, B. Zhu, and A. Tewfik, "Object-based transparent video watermarking," in Proc. 1997 IEEE Multimedia Signal Processing Workshop, 1997, pp. 369-374.
-
Proc. 1997 IEEE Multimedia Signal Processing Workshop, 1997
, pp. 369-374
-
-
Swanson, M.1
Zhu, B.2
Tewfik, A.3
-
87
-
-
0032069486
-
Robust audio watermarking using perceptual masking
-
to be published
-
M. Swanson, B. Zhu, A. Tewfik, and L. Boney, "Robust audio watermarking using perceptual masking," Signal Process., to be published.
-
Signal Process.
-
-
Swanson, M.1
Zhu, B.2
Tewfik, A.3
Boney, L.4
-
88
-
-
0030407057
-
Transparent robust image watermarking
-
Piscataway, NJ: IEEE Press
-
M. Swanson, B. Zhu, and A. Tewfik, 'Transparent robust image watermarking," in Proceedings of the IEEE International Conference on Image Processing 1996. Piscataway, NJ: IEEE Press, 1996, vol. III, pp. 211-214.
-
(1996)
Proceedings of the IEEE International Conference on Image Processing 1996
, vol.3
, pp. 211-214
-
-
Swanson, M.1
Zhu, B.2
Tewfik, A.3
-
89
-
-
0002197488
-
Encoding a hidden digital signature onto an audio signal using psychoacoustic masking
-
J. Tilki and A. Beex, "Encoding a hidden digital signature onto an audio signal using psychoacoustic masking," in Proc. 1996 7th Int. Conf. Sig. Proc. Appls. Tech., 1996, pp. 476-480.
-
(1996)
Proc. 1996 7th Int. Conf. Sig. Proc. Appls. Tech.
, pp. 476-480
-
-
Tilki, J.1
Beex, A.2
-
90
-
-
84997769409
-
A digital watermark
-
Piscataway, NJ: IEEE Press
-
R. van Schyndel, A. Tirkel, and C. Osborne, "A digital watermark," in Proceedings of ICASSP. Piscataway, NJ: IEEE Press, 1994, vol. II, pp. 86-90.
-
(1994)
Proceedings of ICASSP.
, vol.2
, pp. 86-90
-
-
Van Schyndel, R.1
Tirkel, A.2
Osborne, C.3
-
94
-
-
0030386584
-
Applications of toral automorphisms in image watermarking
-
Piscataway, NJ: IEEE Press
-
G. Voyatzis and I. Pitas, "Applications of toral automorphisms in image watermarking," in Proceedings of the IEEE International Conference on Image Processing 1996. Piscataway, NJ: IEEE Press, 1996, vol. II, pp. 237-240.
-
(1996)
Proceedings of the IEEE International Conference on Image Processing 1996
, vol.2
, pp. 237-240
-
-
Voyatzis, G.1
Pitas, I.2
-
95
-
-
0029292158
-
Image authentication for a slippery new age
-
Apr.
-
S. Wallon, "Image authentication for a slippery new age," Dr. Dobb'sJ., pp. 18-26 and 82-87, Apr. 1995.
-
(1995)
Dr. Dobb'sJ.
, pp. 18-26
-
-
Wallon, S.1
-
97
-
-
33646940789
-
A watermarking technique for digital imagery: Further studies
-
Las Vegas, NV, June 30-July 3
-
__, "A watermarking technique for digital imagery: Further studies," in Proc. Int. Conf. Imaging Science, Systems and Technology, Las Vegas, NV, June 30-July 3, 1997.
-
(1997)
Proc. Int. Conf. Imaging Science, Systems and Technology
-
-
-
99
-
-
0029453437
-
Low bit rate near-transparent image coding
-
B. Zhu, A. Tewfik, and O. Gerek, "Low bit rate near-transparent image coding," in Proc. SPIE Int. Conf. Wavelet Appls. for Dual Use, 1995, vol. 2491, pp. 173-184.
-
(1995)
Proc. SPIE Int. Conf. Wavelet Appls. for Dual Use
, vol.2491
, pp. 173-184
-
-
Zhu, B.1
Tewfik, A.2
Gerek, O.3
|