-
1
-
-
0030384775
-
Techniques for data hiding
-
Bender, W., Gruhl, D., Morimoto, N. and Lu, A., Techniques for data hiding. IBM Systems Journal, 1996, 25, 313-
-
(1996)
IBM Systems Journal
, vol.25
, pp. 313
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
2
-
-
0003039773
-
Applying signatures on digital images
-
Pitas, I. and Kaskalis, T., Applying signatures on digital images. Proceedings IEEE Workshop on Nonlinear Signal and Image processing, 1995, 1, 460-463.
-
(1995)
Proceedings IEEE Workshop on Nonlinear Signal and Image Processing
, vol.1
, pp. 460-463
-
-
Pitas, I.1
Kaskalis, T.2
-
3
-
-
0000357117
-
Digital images protection techniques in a broadcast framework: An overview
-
Delaigle, J. F., Boucqueau, J. M., Quisquater, J. J. and Macq, B., Digital images protection techniques in a broadcast framework: an overview. Proceedings of ECMAST'96, 1996, 2, 711-727
-
(1996)
Proceedings of ECMAST'96
, vol.2
, pp. 711-727
-
-
Delaigle, J.F.1
Boucqueau, J.M.2
Quisquater, J.J.3
Macq, B.4
-
4
-
-
0000370347
-
Video-Steganography: How to secretly embed a signature in a picture
-
Matsui, K. and Tanaka, K., Video-Steganography: how to secretly embed a signature in a picture. IMA Intellectual Property Project Proceedings, Vol. 1, no. 1, 1994.
-
(1994)
IMA Intellectual Property Project Proceedings
, vol.1
, Issue.1
-
-
Matsui, K.1
Tanaka, K.2
-
5
-
-
84997769409
-
A digital watermark
-
van Schyndel, R. G., Tirkel, A. Z. and Osborne, C. F., A digital watermark. Proceedings of ICIP'94, 1994, 2, 86-89.
-
(1994)
Proceedings of ICIP'94
, vol.2
, pp. 86-89
-
-
Van Schyndel, R.G.1
Tirkel, A.Z.2
Osborne, C.F.3
-
6
-
-
0000543038
-
Towards robust and hidden image copyright labeling
-
Koch, E. and Zhao, J., Towards robust and hidden image copyright labeling. Proceedings IEEE workshop on Nonlinear Signal and Image processing, 1995, 1, 452-455.
-
(1995)
Proceedings IEEE Workshop on Nonlinear Signal and Image Processing
, vol.1
, pp. 452-455
-
-
Koch, E.1
Zhao, J.2
-
7
-
-
0030383845
-
Hidden signatures in images
-
Hsu, C. T. and Wu, J. L., Hidden signatures in images. Proceedings of ICIP'96, 1996, 3, 223-226.
-
(1996)
Proceedings of ICIP'96
, vol.3
, pp. 223-226
-
-
Hsu, C.T.1
Wu, J.L.2
-
8
-
-
0003451454
-
Secure spread spectrum watermarking for multimedia
-
NEC research Institute, no. 9510
-
Cox, I. J., Kilian, J., Leighton, T. and Shammoon, T., Secure spread spectrum watermarking for multimedia, Tech. Report, NEC research Institute, no. 9510 (1995).
-
(1995)
Tech. Report
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shammoon, T.4
-
9
-
-
0004166728
-
Can invisible watermarks resolve rightful ownerships?
-
RC 20509
-
Graver, S., Memon, N., Yeo, B. L. and Yeung, M. M., Can invisible watermarks resolve rightful ownerships? IBM Technical Report, RC 20509 (1996).
-
(1996)
IBM Technical Report
-
-
Graver, S.1
Memon, N.2
Yeo, B.L.3
Yeung, M.M.4
-
11
-
-
1642362425
-
Embedding parametric digital signatures in images
-
Bors, A. G. and Pitas, L, Embedding parametric digital signatures in images. Proceedings of EUSIPCO'96, 1996, 3, 1701-1
-
(1996)
Proceedings of EUSIPCO'96
, vol.3
, pp. 1701-1701
-
-
Bors, A.G.1
Pitas, L.2
-
13
-
-
0000412724
-
Arithmetical properties of strongly chaotic systems
-
Percival, I. and Vivaldi, F., Arithmetical properties of strongly chaotic systems. Physica 25D, 1987, 105-130.
-
(1987)
Physica
, vol.25 D
, pp. 105-130
-
-
Percival, I.1
Vivaldi, F.2
-
14
-
-
0000861888
-
Chaotic mixing of digital images and applications to watermarking
-
Voyatzis, G. and Pitas, L, Chaotic mixing of digital images and applications to watermarking. Proceedings of ECMAST'96, 1996, 2, 687-694.
-
(1996)
Proceedings of ECMAST'96
, vol.2
, pp. 687-694
-
-
Voyatzis, G.1
Pitas, L.2
-
15
-
-
0032069486
-
Robust audio watermarking using perceptual masking, to appear
-
Swanson, M. D., Zhu, B., Tewfik A. H. and Boney, L., Robust audio watermarking using perceptual masking, to appear in Signal Proc. sp. issue on Copyright Protection and Access control (1998).
-
(1998)
Signal Proc. sp. Issue on Copyright Protection and Access Control
-
-
Swanson, M.D.1
Zhu, B.2
Tewfik, A.H.3
Boney, L.4
-
16
-
-
0027684995
-
Signal compression based on models of human perception
-
Jayant, N., Johnston, J. and Safranek, R., Signal compression based on models of human perception. Proceedings of the IEEE, 1993, 81(10), 1385-1
-
(1993)
Proceedings of the IEEE
, vol.81
, Issue.10
, pp. 1385-1391
-
-
Jayant, N.1
Johnston, J.2
Safranek, R.3
-
17
-
-
0030386584
-
Applications of toral automorphisms in image watermarking
-
Voyatzis, G. and Pitas, L, Applications of Toral automorphisms in image watermarking. Proceedings of ICIP'96, 1996, 2, 237-240.
-
(1996)
Proceedings of ICIP'96
, vol.2
, pp. 237-240
-
-
Voyatzis, G.1
Pitas, L.2
-
18
-
-
0031382096
-
Embedding robust logo watermarks in digital images
-
Voyatzis, G. and Pitas, L, Embedding robust logo watermarks in digital images. Proceedings of DSP'97, 1997, 1, 213-216.
-
(1997)
Proceedings of DSP'97
, vol.1
, pp. 213-216
-
-
Voyatzis, G.1
Pitas, L.2
|