-
3
-
-
33744608259
-
-
International Digital Object Identification Foundation. DOI project. Washington, DC [Online]. Available WWW: http://www.doi.org.
-
-
-
-
4
-
-
33744566458
-
-
HOLE project. UCL, Louvain-la-Neuve, Belgium [Online]. Available WWW
-
T. Colles. HOLE project. UCL, Louvain-la-Neuve, Belgium [Online]. Available WWW: http://www.muse.ucl.ac.be/Eole/.
-
-
-
Colles, T.1
-
5
-
-
0032308292
-
Compression tolerant image authentication
-
S. Bhattacharjee and M. Kutter, "Compression tolerant image authentication," in Proc. IEEE IClP'98, Chicago, IL, Oct. 1998, vol. 1, pp. 435-439.
-
(1998)
Proc. IEEE IClP'98, Chicago, IL, Oct.
, vol.1
, pp. 435-439
-
-
Bhattacharjee, S.1
Kutter, M.2
-
6
-
-
33744562534
-
EBU/SMPTE task force for harmonized standards for the exchange of programme material as bit-streams
-
[Online]. Available WWW
-
EBU and SPMPTE, "EBU/SMPTE task force for harmonized standards for the exchange of programme material as bit-streams," EBU Tech. Rev., Special Supplement, 1998. [Online]. Available WWW: http://www.ebu.ch/pmc_es.tf.html.
-
(1998)
EBU Tech. Rev., Special Supplement
-
-
-
7
-
-
0022716288
-
A simple unpredictable pseudo-random number generator
-
L. Blum, M. Blum, and M. Shub, "A simple unpredictable pseudo-random number generator," SIAM J. Compnt., vol. 15, no. 2, pp. 364-383, 1986.
-
(1986)
SIAM J. Compnt.
, vol.15
, Issue.2
, pp. 364-383
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
10
-
-
0032069486
-
Robust audio watermarking using perceptual masking
-
May
-
M. D. Swanson, B. Zhu, A. H. Tewfik, and L. Boney, "Robust audio watermarking using perceptual masking," Signal Processing (Special Issue on Watermarking), vol. 66, no. 3, pp. 337-356, May 1998.
-
(1998)
Signal Processing (Special Issue on Watermarking)
, vol.66
, Issue.3
, pp. 337-356
-
-
Swanson, M.D.1
Zhu, B.2
Tewfik, A.H.3
Boney, L.4
-
11
-
-
0032069705
-
Watermarking 3D polygonal models through geometric and topological modifications
-
May
-
R. Ohbuchi, H. Masuda, and M. Aono, "Watermarking 3D polygonal models through geometric and topological modifications," in IEEE J. Select. Areas Commun., vol. 16, pp. 551-560, May 1998.
-
(1998)
IEEE J. Select. Areas Commun.
, vol.16
, pp. 551-560
-
-
Ohbuchi, R.1
Masuda, H.2
Aono, M.3
-
12
-
-
0029777872
-
Protecting publicly available images with a visible image watermark
-
G. W. Braudaway, K. A. Magerlein, and F. Mintzer, "Protecting publicly available images with a visible image watermark," in Proc. SPIE/IS&T Optical Security and Counterfeit Deterrence Techniques, Electronic Imaging, Feb. 1997, vol. 3016, pp. 126-133.
-
(1997)
Proc. SPIE/IS&T Optical Security and Counterfeit Deterrence Techniques, Electronic Imaging, Feb.
, vol.3016
, pp. 126-133
-
-
Braudaway, G.W.1
Magerlein, K.A.2
Mintzer, F.3
-
13
-
-
0032304995
-
Toward a telltalt watermarking technique for tamper-proofing
-
D. Kundur and D. Hatzinakos, "Toward a telltalt watermarking technique for tamper-proofing," in Proc. IEEE ICIP'98, Chicago, IL, Oct. 1998, vol. 2, pp. 409-413.
-
(1998)
Proc. IEEE ICIP'98, Chicago, IL, Oct.
, vol.2
, pp. 409-413
-
-
Kundur, D.1
Hatzinakos, D.2
-
14
-
-
0001726259
-
Techniques for data hiding
-
W. Bender, D. Gruhl, and N. Morimoto, "Techniques for data hiding," in Proc. SPIE, San Jose, CA, Feb. 1995, pp. 2420-2440.
-
(1995)
Proc. SPIE, San Jose, CA, Feb.
, pp. 2420-2440
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
-
15
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Dec.
-
J. Cox, Kilian, F. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," in IEEE Trans. Image Processing, vol. 6, pp. 1673-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Processing
, vol.6
, pp. 1673-1687
-
-
Cox, J.1
Kilian2
Leighton, F.3
Shamoon, T.4
-
16
-
-
0032074148
-
Rotation, scale and translation invariant spread spectrum digital image watermarking
-
May
-
J. J. K. O'Ruanaidh and T. Pun, "Rotation, scale and translation invariant spread spectrum digital image watermarking," Signal Processing (Special Issue on Watermarking), vol. 66, no. 3, pp. 303-318, May 1998.
-
(1998)
Signal Processing (Special Issue on Watermarking)
, vol.66
, Issue.3
, pp. 303-318
-
-
O'Ruanaidh, J.J.1
Pun, T.2
-
17
-
-
84948963544
-
The self shrinking generator
-
W. Meier and O. Staffelbach, "The self shrinking generator," in Advances in Cryptography - EUROCRYT94, A. D. Santis, Ed. Berlin, Germany: Springer-Verlag, 1995, pp. 205-214.
-
(1995)
Advances in Cryptography - EUROCRYT94, A. D. Santis, Ed. Berlin, Germany: Springer-Verlag
, pp. 205-214
-
-
Meier, W.1
Staffelbach, O.2
-
18
-
-
0032072064
-
Watermarking of uncompressed and compressed video
-
May
-
F. Hartung and B. Girod, "Watermarking of uncompressed and compressed video," Signal Processing (Special Issue on Watermarking), vol. 66, no. 3, pp. 283-302, May 1998.
-
(1998)
Signal Processing (Special Issue on Watermarking)
, vol.66
, Issue.3
, pp. 283-302
-
-
Hartung, F.1
Girod, B.2
-
19
-
-
0032072279
-
Image-adaptive watermarks using visual models
-
May
-
C. Podilchuk and W. Zeng, "Image-adaptive watermarks using visual models," in IEEE J. Select. Areas Commun., vol. 16, pp. 525-540, May 1998.
-
(1998)
IEEE J. Select. Areas Commun.
, vol.16
, pp. 525-540
-
-
Podilchuk, C.1
Zeng, W.2
-
20
-
-
0032070304
-
Multiresolution scene-based video watermarking using perceptual models
-
May
-
M. D. Swanson, B. Zhu, and A. H. Tewfik, "Multiresolution scene-based video watermarking using perceptual models," in IEEE J. Select. Areas Commun., vol. 16, pp. 540-550, May 1998.
-
(1998)
IEEE J. Select. Areas Commun.
, vol.16
, pp. 540-550
-
-
Swanson, M.D.1
Zhu, B.2
Tewfik, A.H.3
-
21
-
-
0032074501
-
Watermarking algorithm based on a human visual model
-
May
-
J. F. Delaigle, C. De Vleeschouwer, and B. Macq, "Watermarking algorithm based on a human visual model," Signal Processing (Special Issue on Watermarking), vol. 66, no. 3, pp. 319-336, May 1998.
-
(1998)
Signal Processing (Special Issue on Watermarking)
, vol.66
, Issue.3
, pp. 319-336
-
-
Delaigle, J.F.1
De Vleeschouwer, C.2
Macq, B.3
-
22
-
-
84957877979
-
Attacks on copyright marking systems
-
F. Peticolas, R. J. Anderson, and M. G. Kuhn, "Attacks on copyright marking systems," in Information Hiding: Second International Workshop, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1998.
-
(1998)
Information Hiding: Second International Workshop, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag
-
-
Peticolas, F.1
Anderson, R.J.2
Kuhn, M.G.3
-
23
-
-
0343624618
-
Intellectual property protection systems and digital watermarking
-
J. Lacy, S. Quackenbush, A. Reibman, and J. Snyder, "Intellectual property protection systems and digital watermarking," in Proc. Information Hiding Workshop, Portland, OR, Apr. 15-17, 1998.
-
(1998)
Proc. Information Hiding Workshop, Portland, OR, Apr. 15-17
-
-
Lacy, J.1
Quackenbush, S.2
Reibman, A.3
Snyder, J.4
-
24
-
-
33744687397
-
Octalis tools
-
Nov..
-
J. M. Boucqueau, M. Arnold, E. Goray, J. Guimaraes, D. Nicholson, and R. Poulet. (1998, Nov.). Octalis tools. Octalis Deliverable D23. [Online]. Available WWW: http://www.octalis.com.
-
(1998)
Octalis Deliverable D23. [Online]. Available WWW
-
-
Boucqueau, J.M.1
Arnold, M.2
Goray, E.3
Guimaraes, J.4
Nicholson, D.5
Poulet, R.6
|