-
1
-
-
0001490921
-
An optimal method for two-level rendition of continuous-tone pictures
-
June
-
B. E. Bayer, "An optimal method for two-level rendition of continuous-tone pictures," in IEEE Int. Conf. Communications, Conf. Rec. 26, vol. 1, June 1973, pp. (26-11)-(26-15).
-
(1973)
IEEE Int. Conf. Communications, Conf. Rec. 26
, vol.1
, pp. 126
-
-
Bayer, B.E.1
-
2
-
-
0032656890
-
-
this issue
-
J. A. Bloom, I. J. Cox, T. Kalker, J.-P. Linnartz, M. L. Miller, and B. Traw, "Copy protection for DVD video," this issue, pp. 1267-1276.
-
Copy Protection for DVD Video
, pp. 1267-1276
-
-
Bloom, J.A.1
Cox, I.J.2
Kalker, T.3
Linnartz, J.-P.4
Miller, M.L.5
Traw, B.6
-
3
-
-
0030384775
-
Techniques for data hiding
-
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM Syst. J., vol. 35, nos. 3/4, pp. 313-336, 1996.
-
(1996)
IBM Syst. J.
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
4
-
-
0002152920
-
Assuring ownership rights for digital images
-
H. H. Brueggemann and W. G. Haeckl, Eds. Germany: Vieweg
-
G. Caronni, "Assuring ownership rights for digital images," in Reliable IT Systems. VIS'95, H. H. Brueggemann and W. G. Haeckl, Eds. Germany: Vieweg, 1995, pp. 251-263.
-
(1995)
Reliable IT Systems. VIS'
, vol.95
, pp. 251-263
-
-
Caronni, G.1
-
5
-
-
0031362116
-
Secure spread spectrum watermarking for images, audio and video
-
Dec.
-
I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for images, audio and video," IEEE Trans. Image Processing, vol. 6, pp. 1673-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Processing
, vol.6
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
7
-
-
0032075477
-
Some general methods for tampering with watermarks
-
May
-
"Some general methods for tampering with watermarks," IEEE J. Select. Areas Commun., vol. 16, pp. 587-593, May 1998.
-
(1998)
IEEE J. Select. Areas Commun.
, vol.16
, pp. 587-593
-
-
-
8
-
-
58849141394
-
A review of watermarking and the importance of perceptual modeling
-
I. J. Cox and M. L. Miller, "A review of watermarking and the importance of perceptual modeling," in Proc. SPIE, Huam Vision & Electronic Imaging II, vol. 3016, 1997, pp. 92-99.
-
(1997)
Proc. SPIE, Huam Vision & Electronic Imaging II
, vol.3016
, pp. 92-99
-
-
Cox, I.J.1
Miller, M.L.2
-
11
-
-
0032073388
-
Performance analysis of a 2-D multipluse amplitude modulation scheme for data hiding and watermarking still images
-
May
-
J. J. Hernandez, F. Perez-Gonzalez, J. M. Rodriquez, and G. Nieto, "Performance analysis of a 2-D multipluse amplitude modulation scheme for data hiding and watermarking still images," IEEE J. Select. Areas Commun., vol. 16, pp. 510-524, May 1998.
-
(1998)
IEEE J. Select. Areas Commun.
, vol.16
, pp. 510-524
-
-
Hernandez, J.J.1
Perez-Gonzalez, F.2
Rodriquez, J.M.3
Nieto, G.4
-
12
-
-
0030383845
-
Hidden signatures in images
-
Lausanne, Switzerland
-
C.-T. Hsu and J.-L. Wu, "Hidden signatures in images," in Proc. IEEE Int. Conf. Image Processing, vol. 3, Lausanne, Switzerland, 1996, pp. 223-226.
-
(1996)
Proc. IEEE Int. Conf. Image Processing
, vol.3
, pp. 223-226
-
-
Hsu, C.-T.1
Wu, J.-L.2
-
13
-
-
33646216327
-
Watermark estimation through detector observations
-
Leuven, Belgium, Mar.
-
T. Kalker, "Watermark estimation through detector observations," in Proc. IEEE Benelux Signal Processing Symp., Leuven, Belgium, Mar. 1998, pp. 119-122.
-
(1998)
Proc. IEEE Benelux Signal Processing Symp.
, pp. 119-122
-
-
Kalker, T.1
-
14
-
-
0032311781
-
Watermark estimation through detector analysis
-
Chicago, IL, Oct.
-
T. Kalker, J. P. Linnartz, and M. van Dijk, "Watermark estimation through detector analysis," in Proc. Int. Conf. Image Processing, vol. 1, Chicago, IL, Oct. 1998, pp. 425-429.
-
(1998)
Proc. Int. Conf. Image Processing
, vol.1
, pp. 425-429
-
-
Kalker, T.1
Linnartz, J.P.2
Van Dijk, M.3
-
15
-
-
0007751316
-
Analysis of the sensitivity attack against electronic watermarks in images
-
Portland, OR, Apr. 15-17
-
J.-P. M. G. Linnartz and M. van Dijk, "Analysis of the sensitivity attack against electronic watermarks in images," in Proc. Workshop Information Hiding, IH'98, Portland, OR, Apr. 15-17, 1998, pp. 258-272.
-
(1998)
Proc. Workshop Information Hiding, IH'
, vol.98
, pp. 258-272
-
-
Linnartz, M.G.1
-
17
-
-
84957877979
-
Attacks on copyright marking systems
-
Portland, OR, Apr. 15-17
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Attacks on copyright marking systems," in Proc. Workshop Information Hiding, IH'98, Portland, OR, Apr. 15-17, 1998, pp. 218-238.
-
(1998)
Proc. Workshop Information Hiding, IH'
, vol.98
, pp. 218-238
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
18
-
-
0001187269
-
Information hiding terminology
-
Portland, OR
-
B. Pfitzman, "Information hiding terminology," in Proc. Information Hiding, IH'96, Portland, OR, pp. 347-350.
-
Proc. Information Hiding, IH'96
, pp. 347-350
-
-
Pfitzman, B.1
-
20
-
-
33744649659
-
-
U.S. Patent 5319735
-
R. D. Preuss, S. E. Roukos, A. W. F. Huggins, H. Gish, M. A. Bergamo, P. M. Peterson, and A. G. Derr, "Embedded signalling," U.S. Patent 5319735, 1994.
-
(1994)
Embedded Signalling
-
-
Preuss, R.D.1
Roukos, S.E.2
Huggins, A.W.F.3
Gish, H.4
Bergamo, M.A.5
Peterson, P.M.6
Derr, A.G.7
-
21
-
-
0020128340
-
Theory of spread spectrum communications - A tutorial
-
May
-
R. L. Pickholtz, D. L. Schilling, and L. B. Millstein, "Theory of spread spectrum communications - A tutorial," IEEE Trans. Commun., vol. 30, pp. 855-884, May 1982.
-
(1982)
IEEE Trans. Commun.
, vol.30
, pp. 855-884
-
-
Pickholtz, R.L.1
Schilling, D.L.2
Millstein, L.B.3
-
22
-
-
0032072279
-
Image-adaptive watermarking using visual models
-
May
-
C. I. Podilchuk and W. Zeng, "Image-adaptive watermarking using visual models," IEEE J. Select. Areas Commun., vol. 16, pp. 525-539, May 1998.
-
(1998)
IEEE J. Select. Areas Commun.
, vol.16
, pp. 525-539
-
-
Podilchuk, C.I.1
Zeng, W.2
-
23
-
-
0030385474
-
Phase watermarking of digital images
-
Lausanne, Switzerland
-
J. J. K. O. Ruanaidh, W. J. Dowling, and F. M. Boland, "Phase watermarking of digital images," in Proc. IEEE Int. Conf. Image Processing, vol. 3, Lausanne, Switzerland, 1996, pp. 239-242.
-
(1996)
Proc. IEEE Int. Conf. Image Processing
, vol.3
, pp. 239-242
-
-
Ruanaidh, J.J.1
Dowling, W.J.2
Boland, F.M.3
-
25
-
-
84955564864
-
Modulation and information hiding in images
-
R. Anderson, Ed. Berlin, Germany: Springer-Verlag
-
J. R. Smith and B. O. Comiskey, "Modulation and information hiding in images," in Information Hiding: 1st Int. Workship Proc. (Lecture Notes in Computer Science), vol. 1174, R. Anderson, Ed. Berlin, Germany: Springer-Verlag, 1996, pp. 207-226.
-
(1996)
Information Hiding: 1st Int. Workship Proc. (Lecture Notes in Computer Science)
, vol.1174
, pp. 207-226
-
-
Smith, J.R.1
Comiskey, B.O.2
-
26
-
-
0001560154
-
Channels with side information at the transmitter
-
C. E. Shannon, "Channels with side information at the transmitter," IBM J. Res. Develop., vol. 2, pp. 289-293, 1958.
-
(1958)
IBM J. Res. Develop.
, vol.2
, pp. 289-293
-
-
Shannon, C.E.1
-
27
-
-
0032070304
-
Multiresolution scene-based video watermarking using perceptual models
-
May
-
M. D. Swanson, B. Zhu, and A. H. Tewfik, "Multiresolution scene-based video watermarking using perceptual models," IEEE J. Select. Areas Commun., vol. 16, pp. 540-550, May 1998.
-
(1998)
IEEE J. Select. Areas Commun.
, vol.16
, pp. 540-550
-
-
Swanson, M.D.1
Zhu, B.2
Tewfik, A.H.3
-
28
-
-
0025547039
-
Embedding secret information into a dithered multi-level image
-
CA, Sept.
-
K. Tanaka, Y. Nakamura, and K. Matsui, "Embedding secret information into a dithered multi-level image," in Proc. 1990 IEEE Military Communications Conf., Monterey, CA, Sept. 1990, pp. 216-220.
-
(1990)
Proc.
, vol.1990
, pp. 216-220
-
-
Tanaka, K.1
Nakamura, Y.2
Matsui, K.3
|