메뉴 건너뛰기




Volumn 87, Issue 7, 1999, Pages 1127-1141

Watermarking as communications with side information

Author keywords

[No Author keywords available]

Indexed keywords

IMAGE COMMUNICATION SYSTEMS; SIGNAL DETECTION; SPREAD SPECTRUM COMMUNICATION; TRANSMITTERS;

EID: 0032625842     PISSN: 00189219     EISSN: None     Source Type: Journal    
DOI: 10.1109/5.771068     Document Type: Article
Times cited : (468)

References (29)
  • 1
    • 0001490921 scopus 로고
    • An optimal method for two-level rendition of continuous-tone pictures
    • June
    • B. E. Bayer, "An optimal method for two-level rendition of continuous-tone pictures," in IEEE Int. Conf. Communications, Conf. Rec. 26, vol. 1, June 1973, pp. (26-11)-(26-15).
    • (1973) IEEE Int. Conf. Communications, Conf. Rec. 26 , vol.1 , pp. 126
    • Bayer, B.E.1
  • 3
    • 0030384775 scopus 로고    scopus 로고
    • Techniques for data hiding
    • W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM Syst. J., vol. 35, nos. 3/4, pp. 313-336, 1996.
    • (1996) IBM Syst. J. , vol.35 , Issue.3-4 , pp. 313-336
    • Bender, W.1    Gruhl, D.2    Morimoto, N.3    Lu, A.4
  • 4
    • 0002152920 scopus 로고
    • Assuring ownership rights for digital images
    • H. H. Brueggemann and W. G. Haeckl, Eds. Germany: Vieweg
    • G. Caronni, "Assuring ownership rights for digital images," in Reliable IT Systems. VIS'95, H. H. Brueggemann and W. G. Haeckl, Eds. Germany: Vieweg, 1995, pp. 251-263.
    • (1995) Reliable IT Systems. VIS' , vol.95 , pp. 251-263
    • Caronni, G.1
  • 5
    • 0031362116 scopus 로고    scopus 로고
    • Secure spread spectrum watermarking for images, audio and video
    • Dec.
    • I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for images, audio and video," IEEE Trans. Image Processing, vol. 6, pp. 1673-1687, Dec. 1997.
    • (1997) IEEE Trans. Image Processing , vol.6 , pp. 1673-1687
    • Cox, I.J.1    Kilian, J.2    Leighton, F.T.3    Shamoon, T.4
  • 7
    • 0032075477 scopus 로고    scopus 로고
    • Some general methods for tampering with watermarks
    • May
    • "Some general methods for tampering with watermarks," IEEE J. Select. Areas Commun., vol. 16, pp. 587-593, May 1998.
    • (1998) IEEE J. Select. Areas Commun. , vol.16 , pp. 587-593
  • 8
    • 58849141394 scopus 로고    scopus 로고
    • A review of watermarking and the importance of perceptual modeling
    • I. J. Cox and M. L. Miller, "A review of watermarking and the importance of perceptual modeling," in Proc. SPIE, Huam Vision & Electronic Imaging II, vol. 3016, 1997, pp. 92-99.
    • (1997) Proc. SPIE, Huam Vision & Electronic Imaging II , vol.3016 , pp. 92-99
    • Cox, I.J.1    Miller, M.L.2
  • 11
    • 0032073388 scopus 로고    scopus 로고
    • Performance analysis of a 2-D multipluse amplitude modulation scheme for data hiding and watermarking still images
    • May
    • J. J. Hernandez, F. Perez-Gonzalez, J. M. Rodriquez, and G. Nieto, "Performance analysis of a 2-D multipluse amplitude modulation scheme for data hiding and watermarking still images," IEEE J. Select. Areas Commun., vol. 16, pp. 510-524, May 1998.
    • (1998) IEEE J. Select. Areas Commun. , vol.16 , pp. 510-524
    • Hernandez, J.J.1    Perez-Gonzalez, F.2    Rodriquez, J.M.3    Nieto, G.4
  • 12
    • 0030383845 scopus 로고    scopus 로고
    • Hidden signatures in images
    • Lausanne, Switzerland
    • C.-T. Hsu and J.-L. Wu, "Hidden signatures in images," in Proc. IEEE Int. Conf. Image Processing, vol. 3, Lausanne, Switzerland, 1996, pp. 223-226.
    • (1996) Proc. IEEE Int. Conf. Image Processing , vol.3 , pp. 223-226
    • Hsu, C.-T.1    Wu, J.-L.2
  • 13
    • 33646216327 scopus 로고    scopus 로고
    • Watermark estimation through detector observations
    • Leuven, Belgium, Mar.
    • T. Kalker, "Watermark estimation through detector observations," in Proc. IEEE Benelux Signal Processing Symp., Leuven, Belgium, Mar. 1998, pp. 119-122.
    • (1998) Proc. IEEE Benelux Signal Processing Symp. , pp. 119-122
    • Kalker, T.1
  • 14
    • 0032311781 scopus 로고    scopus 로고
    • Watermark estimation through detector analysis
    • Chicago, IL, Oct.
    • T. Kalker, J. P. Linnartz, and M. van Dijk, "Watermark estimation through detector analysis," in Proc. Int. Conf. Image Processing, vol. 1, Chicago, IL, Oct. 1998, pp. 425-429.
    • (1998) Proc. Int. Conf. Image Processing , vol.1 , pp. 425-429
    • Kalker, T.1    Linnartz, J.P.2    Van Dijk, M.3
  • 15
    • 0007751316 scopus 로고    scopus 로고
    • Analysis of the sensitivity attack against electronic watermarks in images
    • Portland, OR, Apr. 15-17
    • J.-P. M. G. Linnartz and M. van Dijk, "Analysis of the sensitivity attack against electronic watermarks in images," in Proc. Workshop Information Hiding, IH'98, Portland, OR, Apr. 15-17, 1998, pp. 258-272.
    • (1998) Proc. Workshop Information Hiding, IH' , vol.98 , pp. 258-272
    • Linnartz, M.G.1
  • 18
    • 0001187269 scopus 로고    scopus 로고
    • Information hiding terminology
    • Portland, OR
    • B. Pfitzman, "Information hiding terminology," in Proc. Information Hiding, IH'96, Portland, OR, pp. 347-350.
    • Proc. Information Hiding, IH'96 , pp. 347-350
    • Pfitzman, B.1
  • 21
    • 0020128340 scopus 로고
    • Theory of spread spectrum communications - A tutorial
    • May
    • R. L. Pickholtz, D. L. Schilling, and L. B. Millstein, "Theory of spread spectrum communications - A tutorial," IEEE Trans. Commun., vol. 30, pp. 855-884, May 1982.
    • (1982) IEEE Trans. Commun. , vol.30 , pp. 855-884
    • Pickholtz, R.L.1    Schilling, D.L.2    Millstein, L.B.3
  • 22
    • 0032072279 scopus 로고    scopus 로고
    • Image-adaptive watermarking using visual models
    • May
    • C. I. Podilchuk and W. Zeng, "Image-adaptive watermarking using visual models," IEEE J. Select. Areas Commun., vol. 16, pp. 525-539, May 1998.
    • (1998) IEEE J. Select. Areas Commun. , vol.16 , pp. 525-539
    • Podilchuk, C.I.1    Zeng, W.2
  • 26
    • 0001560154 scopus 로고
    • Channels with side information at the transmitter
    • C. E. Shannon, "Channels with side information at the transmitter," IBM J. Res. Develop., vol. 2, pp. 289-293, 1958.
    • (1958) IBM J. Res. Develop. , vol.2 , pp. 289-293
    • Shannon, C.E.1
  • 27
    • 0032070304 scopus 로고    scopus 로고
    • Multiresolution scene-based video watermarking using perceptual models
    • May
    • M. D. Swanson, B. Zhu, and A. H. Tewfik, "Multiresolution scene-based video watermarking using perceptual models," IEEE J. Select. Areas Commun., vol. 16, pp. 540-550, May 1998.
    • (1998) IEEE J. Select. Areas Commun. , vol.16 , pp. 540-550
    • Swanson, M.D.1    Zhu, B.2    Tewfik, A.H.3
  • 28
    • 0025547039 scopus 로고
    • Embedding secret information into a dithered multi-level image
    • CA, Sept.
    • K. Tanaka, Y. Nakamura, and K. Matsui, "Embedding secret information into a dithered multi-level image," in Proc. 1990 IEEE Military Communications Conf., Monterey, CA, Sept. 1990, pp. 216-220.
    • (1990) Proc. , vol.1990 , pp. 216-220
    • Tanaka, K.1    Nakamura, Y.2    Matsui, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.