메뉴 건너뛰기




Volumn 87, Issue 7, 1999, Pages 1062-1078

Information hiding - a survey

Author keywords

[No Author keywords available]

Indexed keywords

COPYRIGHTS; CRYPTOGRAPHY; MOBILE RADIO SYSTEMS; TELECOMMUNICATION TRAFFIC;

EID: 0032680807     PISSN: 00189219     EISSN: None     Source Type: Journal    
DOI: 10.1109/5.771065     Document Type: Article
Times cited : (2139)

References (151)
  • 3
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses and digital pseudonyms
    • D. Chaum, "Untraceable electronic mail, return addresses and digital pseudonyms," Commun. ACM, vol. 24, no. 2, pp. 84-88, Feb. 1981.
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 7
    • 0005019117 scopus 로고    scopus 로고
    • Watermarking in the real world: An application to DVD
    • J. Dittmann, P. Wohlmacher, P. Horster, and R. Steinmetz, Eds. Bristol, U.K.: ACM, GMD - Forschungszentrum Informationstechnik GmbH
    • M. L. Miller, I. J. Cox, and J. A. Bloom, "Watermarking in the real world: An application to DVD," in Multimedia and Security - Workshop at ACM Multimedia'98 (GMD Report), vol. 41, J. Dittmann, P. Wohlmacher, P. Horster, and R. Steinmetz, Eds. Bristol, U.K.: ACM, GMD - Forschungszentrum Informationstechnik GmbH, 1998, pp. 71-76.
    • (1998) Multimedia and Security - Workshop at ACM Multimedia'98 (GMD Report) , vol.41 , pp. 71-76
    • Miller, M.L.1    Cox, I.J.2    Bloom, J.A.3
  • 8
    • 0003945449 scopus 로고
    • Ph.D. dissertation, Yale University, New Haven, CT, YALEU/DCS/TR-561
    • J. C. Benaloh, Verifiable Secret-Ballot Elections, Ph.D. dissertation, Yale University, New Haven, CT, YALEU/DCS/TR-561, 1987.
    • (1987) Verifiable Secret-Ballot Elections
    • Benaloh, J.C.1
  • 9
    • 0001187269 scopus 로고    scopus 로고
    • Information hiding terminology
    • Berlin, Germany: Springer-Verlag
    • B. Pfitzmann, "Information hiding terminology," in Lecture Notes in Computer Science, vol. 1174. Berlin, Germany: Springer-Verlag, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1174
    • Pfitzmann, B.1
  • 11
    • 0029777872 scopus 로고    scopus 로고
    • Protecting publicly-available images with a visible image watermark
    • R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE
    • G. W. Braudaway, K. A. Magerlein, and F. Mintzer, "Protecting publicly-available images with a visible image watermark," in Optical Security and Counterfeit Deterrence Techniques, vol. 2659, R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE, 1996, pp. 126-133.
    • (1996) Optical Security and Counterfeit Deterrence Techniques , vol.2659 , pp. 126-133
    • Braudaway, G.W.1    Magerlein, K.A.2    Mintzer, F.3
  • 13
    • 58849141394 scopus 로고    scopus 로고
    • A review of watermarking and the importance of perceptual modeling
    • E. Rogowitz and T. N. Pappas, Eds. San Jose, CA: IS&T and SPIE
    • I. J. Cox and M. L. Miller, "A review of watermarking and the importance of perceptual modeling," in Human Vision and Electronic Imaging II, vol. 3016B, E. Rogowitz and T. N. Pappas, Eds. San Jose, CA: IS&T and SPIE, 1997.
    • (1997) Human Vision and Electronic Imaging II , vol.3016
    • Cox, I.J.1    Miller, M.L.2
  • 14
    • 0002152920 scopus 로고
    • Assuring ownership rights for digital images
    • H. Brüggermann and W. Gerhardt-Häckl, Eds. Germany: Vieweg
    • G. Caronni, "Assuring ownership rights for digital images," in Reliable IT Systems (VIS'95), H. Brüggermann and W. Gerhardt-Häckl, Eds. Germany: Vieweg, 1995, pp. 251-263.
    • (1995) Reliable IT Systems (VIS'95) , pp. 251-263
    • Caronni, G.1
  • 15
    • 84947937393 scopus 로고    scopus 로고
    • A secure, robust watermark for multimedia
    • R. J. Anderson, Ed., Information hiding: First international workshop Berlin, Germany: Springer-Verlag
    • I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "A secure, robust watermark for multimedia," in R. J. Anderson, Ed., "Information hiding: First international workshop," in Lec-ture Notes in Computer Science, vol. 1174. Berlin, Germany: Springer-Verlag, 1996, pp. 183-206.
    • (1996) Lec-ture Notes in Computer Science , vol.1174 , pp. 183-206
    • Cox, I.J.1    Kilian, J.2    Leighton, T.3    Shamoon, T.4
  • 16
    • 58749110701 scopus 로고    scopus 로고
    • Digital image watermarking using visual models
    • B. E. Rogowitz and T. N. Pappas, Eds. San Jose, CA: IS&T and SPIE
    • C. I. Podilchuk and W. Zeng, "Digital image watermarking using visual models," in Human Vision and Electronic Imaging II, vol. 3016, B. E. Rogowitz and T. N. Pappas, Eds. San Jose, CA: IS&T and SPIE, 1997, pp. 100-111.
    • (1997) Human Vision and Electronic Imaging II , vol.3016 , pp. 100-111
    • Podilchuk, C.I.1    Zeng, W.2
  • 17
    • 0032072250 scopus 로고    scopus 로고
    • A DCT-domain system for robust image watermarking
    • M. Barni, F. Bartolini, V. Cappellini, and A. Piva, "A DCT-domain system for robust image watermarking," Signal Processing, vol. 66, no. 3, pp. 357-372, May 1998.
    • (1998) Signal Processing , vol.66 , Issue.3 , pp. 357-372
    • Barni, M.1    Bartolini, F.2    Cappellini, V.3    Piva, A.4
  • 18
    • 0031619127 scopus 로고    scopus 로고
    • Digital watermarking using multiresolution wavelet decomposition
    • Seattle, WA: IEEE
    • D. Kundur and D. Hatzinakos, "Digital watermarking using multiresolution wavelet decomposition," in Int. Conf. Acoustic, Speech and Signal Processing (ICASP), vol. 5. Seattle, WA: IEEE, 1998, pp. 2969-2972.
    • (1998) Int. Conf. Acoustic, Speech and Signal Processing (ICASP) , vol.5 , pp. 2969-2972
    • Kundur, D.1    Hatzinakos, D.2
  • 20
    • 0032075445 scopus 로고    scopus 로고
    • Robust image watermarking in the spatial domain
    • N. Nikolaidis and I. Pitas, "Robust image watermarking in the spatial domain," Signal Processing, vol. 66, no. 3, pp. 385-403, May 1998.
    • (1998) Signal Processing , vol.66 , Issue.3 , pp. 385-403
    • Nikolaidis, N.1    Pitas, I.2
  • 23
    • 0008779206 scopus 로고    scopus 로고
    • A watermarking technique for digital imagery: Further studies
    • Las Vegas, NV, June 30-July 3
    • R. B. Wolfgang and E. J. Delp, "A watermarking technique for digital imagery: Further studies," in Proc. IEEE Int. Conf. Imaging, Systems, and Technology, Las Vegas, NV, June 30-July 3, 1997, pp. 279-287.
    • (1997) Proc. IEEE Int. Conf. Imaging, Systems, and Technology , pp. 279-287
    • Wolfgang, R.B.1    Delp, E.J.2
  • 24
    • 0032072064 scopus 로고    scopus 로고
    • Watermarking of uncompressed and compressed video
    • F. Hartung and B. Girod, "Watermarking of uncompressed and compressed video," Signal Processing, vol. 66, no. 3, pp. 283-301, May 1998.
    • (1998) Signal Processing , vol.66 , Issue.3 , pp. 283-301
    • Hartung, F.1    Girod, B.2
  • 27
    • 85076090605 scopus 로고    scopus 로고
    • Robust labeling methods for copy protection of images
    • I. K. Sethin and R. C. Jain, Eds. San Jose, CA: IS&T and SPIE
    • G. C. Langelaar, J. C. A. van der Lubbe, and R. L. Lagendijk, "Robust labeling methods for copy protection of images," in Storage and Retrieval for Image and Video Database V, vol. 3022, I. K. Sethin and R. C. Jain, Eds. San Jose, CA: IS&T and SPIE, pp. 298-309.
    • Storage and Retrieval for Image and Video Database V , vol.3022 , pp. 298-309
    • Langelaar, G.C.1    Lagendijk, R.L.2
  • 30
    • 84867166654 scopus 로고    scopus 로고
    • Solved: The ciphers in book III of Trithemius' steganographia
    • Oct.
    • J. Reeds, "Solved: The ciphers in book III of Trithemius' steganographia," Cryptologia, vol. XXII, no. 4, pp. 291-317, Oct. 1998.
    • (1998) Cryptologia , vol.22 , Issue.4 , pp. 291-317
    • Reeds, J.1
  • 32
    • 0003185688 scopus 로고
    • La cryptographie militaire
    • Jan.
    • A. Kerckhoffs, "La cryptographie militaire," J. Sciences Militaires, vol. 9, pp. 5-38, Jan. 1883.
    • (1883) J. Sciences Militaires , vol.9 , pp. 5-38
    • Kerckhoffs, A.1
  • 36
    • 0003617369 scopus 로고
    • London, U.K.: J. M. Dent & Sons, ch. 5 and 7.
    • Herodotus, The Histories. London, U.K.: J. M. Dent & Sons, 1992, ch. 5 and 7.
    • (1992) The Histories
    • Herodotus1
  • 38
    • 33744582409 scopus 로고    scopus 로고
    • Apr.. Aliroo home page. [Online]. Available WWW
    • WitnesSoft and ScarLet security software. (1997, Apr.). Aliroo home page. [Online]. Available WWW: http://www.aliroo.com/.
    • (1997) WitnesSoft and ScarLet Security Software.
  • 39
    • 0032224391 scopus 로고    scopus 로고
    • Technology approaches to currency security
    • R. L. van Renesse, Ed.. San Jose, CA: IS&T and SPIE
    • J. C. Murphy, D. Dubbel, and R. Benson, "Technology approaches to currency security," in Optical Security and Counterfeit Deterrence Techniques II, vol. 3314, R. L. van Renesse, Ed.. San Jose, CA: IS&T and SPIE, 1998, pp. 21-28.
    • (1998) Optical Security and Counterfeit Deterrence Techniques II , vol.3314 , pp. 21-28
    • Murphy, J.C.1    Dubbel, D.2    Benson, R.3
  • 42
  • 44
    • 0347422194 scopus 로고
    • The enemy's masterpiece of espionage
    • May
    • J. E. Hoover, "The enemy's masterpiece of espionage," The Reader's Dig., vol. 48, pp. 49-53, May 1946.
    • (1946) The Reader's Dig. , vol.48 , pp. 49-53
    • Hoover, J.E.1
  • 45
    • 0032074501 scopus 로고    scopus 로고
    • Watermarking algorithm based on a human visual model
    • J. F. Delaigle, C. De Vleeschouwer, and B. Macq, "Watermarking algorithm based on a human visual model," Signal Processing, vol. 66, no. 3, pp. 319-335, May 1998.
    • (1998) Signal Processing , vol.66 , Issue.3 , pp. 319-335
    • Delaigle, J.F.1    De Vleeschouwer, C.2    Macq, B.3
  • 48
    • 0027684995 scopus 로고
    • Signal compression based on models of human perception
    • Oct.
    • N. Jayant, J. Johnston, and R. Safranek, "Signal compression based on models of human perception," Proc. IEEE, vol. 81, pp. 1385-1422, Oct. 1993.
    • (1993) Proc. IEEE , vol.81 , pp. 1385-1422
    • Jayant, N.1    Johnston, J.2    Safranek, R.3
  • 54
    • 0028532579 scopus 로고
    • Why cryptosystems fail
    • R. J. Anderson, "Why cryptosystems fail," Commun. ACM, vol. 37, pp. 32-40, Nov. 1994.
    • (1994) Commun. ACM , vol.37 , pp. 32-40
    • Anderson, R.J.1
  • 57
    • 0020939201 scopus 로고
    • Fingerprinting
    • Oakland, CA, Apr. 25-27
    • N. R. Wagner, "Fingerprinting," in IEEE Symp. Security and Privacy, Oakland, CA, Apr. 25-27, 1983, pp. 18-22.
    • (1983) IEEE Symp. Security and Privacy , pp. 18-22
    • Wagner, N.R.1
  • 60
    • 0029292158 scopus 로고
    • Image authentication for a slippery new age
    • Apr.
    • S. Walton, "Image authentication for a slippery new age," Dr. Dobb's J. Software Tools, vol. 20, no. 4, pp. 18-26, Apr. 1995.
    • (1995) Dr. Dobb's J. Software Tools , vol.20 , Issue.4 , pp. 18-26
    • Walton, S.1
  • 64
    • 0030384775 scopus 로고    scopus 로고
    • Techniques for data hiding
    • W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM Syst. J., vol. 35, nos. 3, 4, pp. 313-336, 1996.
    • (1996) IBM Syst. J. , vol.35 , Issue.3-4 , pp. 313-336
    • Bender, W.1    Gruhl, D.2    Morimoto, N.3    Lu, A.4
  • 65
    • 0030409662 scopus 로고    scopus 로고
    • A method for signature casting on digital images
    • Sept.
    • I. Pitas, "A method for signature casting on digital images," in Proc. Int. Conf. Image Processing, vol. 3, Sept. 1996, pp. 215-218.
    • (1996) Proc. Int. Conf. Image Processing , vol.3 , pp. 215-218
    • Pitas, I.1
  • 66
    • 0347029289 scopus 로고    scopus 로고
    • Copy protection for multimedia data based on labeling techniques
    • Enschede, The Netherlands, May
    • G. C. Langelaar, J. C. van der Lubbe, and J. Biemond, "Copy protection for multimedia data based on labeling techniques," in Proc. 17th Symp. Information Theory in the Benelux, Enschede, The Netherlands, May 1996.
    • (1996) Proc. 17th Symp. Information Theory in the Benelux
    • Langelaar, G.C.1    Biemond, J.2
  • 68
    • 0020126821 scopus 로고
    • The origins of spread spectrum communications
    • R. A. Scholtz, "The origins of spread spectrum communications," IEEE Trans. Commun., vol. 30, pp. 822-853, May 1982.
    • (1982) IEEE Trans. Commun. , vol.30 , pp. 822-853
    • Scholtz, R.A.1
  • 69
    • 0020128340 scopus 로고
    • Theory of spread spectrum communications - A tutorial
    • R. L. Pickholtz, D. L. Schilling, and L. B. Milstein, "Theory of spread spectrum communications - A tutorial," IEEE Trans. Commun., vol. 30, pp. 855-884, May 1982.
    • (1982) IEEE Trans. Commun. , vol.30 , pp. 855-884
    • Pickholtz, R.L.1    Schilling, D.L.2    Milstein, L.B.3
  • 71
  • 72
    • 50049086657 scopus 로고    scopus 로고
    • Watermarking of MPEG-2 encoded video without decoding and re-encoding
    • M. Freeman, P. Jardetzky, and H. M. Vin, Eds. San Jose, CA: IS&T and SPIE
    • F. Hartung and B. Girod, "Watermarking of MPEG-2 encoded video without decoding and re-encoding," in Multimedia Computing and Networking 1997, vol. 3020, M. Freeman, P. Jardetzky, and H. M. Vin, Eds. San Jose, CA: IS&T and SPIE, 1997, pp. 264-273.
    • (1997) Multimedia Computing and Networking 1997 , vol.3020 , pp. 264-273
    • Hartung, F.1    Girod, B.2
  • 76
    • 33744688237 scopus 로고    scopus 로고
    • 1998, Aug.. MP3Stego. [Online]. Available WWW
    • F. A. P. Petitcolas. (1998, Aug.). MP3Stego. [Online]. Available WWW: http://www.cl.cam.ac.uk/ ̃fapp2/steganography/mp3stego/.
    • Petitcolas, F.A.P.1
  • 77
  • 81
    • 0032074148 scopus 로고    scopus 로고
    • Rotation, scale and translation invariant spread spectrum digital image watermarking
    • J. J. K. O'Ruanaidh and T. Pun, "Rotation, scale and translation invariant spread spectrum digital image watermarking," Signal Processing, vol. 66, no. 3, pp. 303-317, May 1998.
    • (1998) Signal Processing , vol.66 , Issue.3 , pp. 303-317
    • O'Ruanaidh, J.J.K.1    Pun, T.2
  • 83
    • 0002161311 scopus 로고
    • The quefrency alanysis of time series for echoes: Cepstrum, pseudoautocovariance, cross-cepstrum and saphe cracking
    • M. Rosenblatt, Ed. New York: Wiley
    • B. P. Bogert, M. J. R. Healy, and J. W, Tukey, "The quefrency alanysis of time series for echoes: Cepstrum, pseudoautocovariance, cross-cepstrum and saphe cracking," in Symp. Time Series Analysis, M. Rosenblatt, Ed. New York: Wiley, 1963, pp. 209-243.
    • (1963) Symp. Time Series Analysis , pp. 209-243
    • Bogert, B.P.1    Healy, M.J.R.2    Tukey, J.W.3
  • 85
  • 86
    • 0029737178 scopus 로고    scopus 로고
    • Security design of valuable documents and products
    • San Jose, CA: IS&T and SPIE
    • R. L. van Renesse, "Security design of valuable documents and products," in Optical Security and Counterfeit Deterrence Techniques, vol. 2659. San Jose, CA: IS&T and SPIE, 1996, pp. 10-20.
    • (1996) Optical Security and Counterfeit Deterrence Techniques , vol.2659 , pp. 10-20
    • Van Renesse, R.L.1
  • 90
    • 0029772741 scopus 로고    scopus 로고
    • The new Dutch passport
    • R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE
    • D. van Lingen, "The new Dutch passport," in Optical Security and Counterfeit Deterrence Techniques, vol. 2659, R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE, 1996, pp. 67-73.
    • (1996) Optical Security and Counterfeit Deterrence Techniques , vol.2659 , pp. 67-73
    • Van Lingen, D.1
  • 91
    • 0029762580 scopus 로고    scopus 로고
    • Optically- And machine-detectable security elements
    • R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE
    • S. Spannenburg, "Optically- and machine-detectable security elements," in Optical Security and Counterfeit Deterrence Techniques, vol. 2659, R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE, 1996, pp. 76-96.
    • (1996) Optical Security and Counterfeit Deterrence Techniques , vol.2659 , pp. 76-96
    • Spannenburg, S.1
  • 93
    • 0032224344 scopus 로고    scopus 로고
    • Search for effective document security by 'inventioneering'
    • R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE
    • J. D. Brongers, "Search for effective document security by 'inventioneering'," in Optical Security and Counterfeit Deterrence Techniques 11, vol. 3314, R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE, 1998, pp. 29-38.
    • (1998) Optical Security and Counterfeit Deterrence Techniques 11 , vol.3314 , pp. 29-38
    • Brongers, J.D.1
  • 94
    • 33744639170 scopus 로고
    • Anti-counterfeit trials begin with watermark technology
    • "Anti-counterfeit trials begin with watermark technology," Financial Technol. Int. Bulletin, vol. 9, no. 2, pp. 6-7, Oct. 1993.
    • (1993) Financial Technol. Int. Bulletin , vol.9 , Issue.2 , pp. 6-7
  • 95
    • 33744588045 scopus 로고    scopus 로고
    • Progress in counterfeit deterrence: The contribution of information exchange
    • R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE
    • I. M. Lancaster and L. T. Konntnik, "Progress in counterfeit deterrence: The contribution of information exchange," in Optical Security and Counterfeit Deterrence Techniques II, vol. 3314, R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE, 1998, pp. 2-8.
    • (1998) Optical Security and Counterfeit Deterrence Techniques II , vol.3314 , pp. 2-8
    • Lancaster, I.M.1    Konntnik, L.T.2
  • 96
    • 0011710159 scopus 로고    scopus 로고
    • Vulnerability assessment of security seals
    • R. Johnson and A. Garcia, "Vulnerability assessment of security seals," J. Security Administration, vol. 20, no. 1, pp. 15-27, June 1997.
    • (1997) J. Security Administration , vol.20 , Issue.1 , pp. 15-27
    • Johnson, R.1    Garcia, A.2
  • 97
    • 33744707221 scopus 로고
    • A guide to understanding covert channel analysis of trusted systems, National Computer Security Center, Ft. George G. Meade, MD
    • Nov.
    • V. Gligor, "A guide to understanding covert channel analysis of trusted systems," National Computer Security Center, Ft. George G. Meade, MD, Tech. Rep. NCSC-TG-030, Nov. 1993.
    • (1993) Tech. Rep. NCSC-TG-030
    • Gligor, V.1
  • 98
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Oct.
    • B. Lampson, "A note on the confinement problem," Commun. ACM, vol. 16, no. 10, pp. 613-615, Oct. 1973.
    • (1973) Commun. ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.1
  • 99
    • 0022218742 scopus 로고
    • Electromagnetic radiation from video display units: An eavesdropping risk?
    • W. van Eck, "Electromagnetic radiation from video display units: an eavesdropping risk?," Comput. Security, vol. 4, no. 4, pp. 269-286, Dec. 1985.
    • (1985) Comput. Security , vol.4 , Issue.4 , pp. 269-286
    • Van Eck, W.1
  • 101
    • 84859015303 scopus 로고    scopus 로고
    • Soft tempest: Hidden data transmission using electromagnetic emanations
    • D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag
    • M. G. Kuhn and R. J. Anderson, "Soft tempest: Hidden data transmission using electromagnetic emanations," in Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science), vol. 1525, D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag, 1998, pp. 124-142.
    • (1998) Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science) , vol.1525 , pp. 124-142
    • Kuhn, M.G.1    Anderson, R.J.2
  • 102
    • 0007751316 scopus 로고    scopus 로고
    • Analysis of the sensitivity attack against electronic watermarks in images
    • D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag
    • J.-P. M. G. Linnartz and M. van Dijk, "Analysis of the sensitivity attack against electronic watermarks in images," in Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science), vol. 1525, D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag, 1998, pp. 258-272.
    • (1998) Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science) , vol.1525 , pp. 258-272
    • Linnartz, J.-P.M.G.1    Van Dijk, M.2
  • 103
    • 84947930048 scopus 로고    scopus 로고
    • Twin peaks: The histogram attack on fixed depth image watermarks
    • D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag
    • M. Maes, "Twin peaks: The histogram attack on fixed depth image watermarks," in Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science), vol. 1525, D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag, 1998, pp. 290-305.
    • (1998) Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science) , vol.1525 , pp. 290-305
    • Maes, M.1
  • 106
    • 0032166643 scopus 로고    scopus 로고
    • Frequency mode LR attack operator for digitally watermarked images
    • Sept.
    • R. Barnett and D. E. Pearson, "Frequency mode LR attack operator for digitally watermarked images," Electron. Lett., vol. 34, no. 19, pp. 1837-1839, Sept. 1998.
    • (1998) Electron. Lett. , vol.34 , Issue.19 , pp. 1837-1839
    • Barnett, R.1    Pearson, D.E.2
  • 107
    • 0032653659 scopus 로고    scopus 로고
    • Watermarking resisting to translation, rotation, and scaling
    • Boston, MA, Nov.
    • M. Kutter, "Watermarking resisting to translation, rotation, and scaling," in Proc. SPIE Multimedia Systems and Applications, vol. 3528, Boston, MA, Nov. 1998, pp. 423-431.
    • (1998) Proc. SPIE Multimedia Systems and Applications , vol.3528 , pp. 423-431
    • Kutter, M.1
  • 108
    • 0033601691 scopus 로고    scopus 로고
    • A fair benchmark for image watermarking systems
    • San Jose, CA: IS&T and SPIE, Jan. 25-27
    • M. Kutter and F. A. P. Petitcolas, "A fair benchmark for image watermarking systems," in 11th Int. Synip. Electronic Imaging, vol. 3657. San Jose, CA: IS&T and SPIE, Jan. 25-27, 1999.
    • (1999) 11th Int. Synip. Electronic Imaging , vol.3657
    • Kutter, M.1    Petitcolas, F.A.P.2
  • 109
    • 84904224992 scopus 로고    scopus 로고
    • Steganalysis of images created using current steganography software
    • D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag
    • N. F. Johnson and S. Jajodia, "Steganalysis of images created using current steganography software," in Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science), vol. 1525, D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag, 1998, pp. 273-289.
    • (1998) Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science) , vol.1525 , pp. 273-289
    • Johnson, N.F.1    Jajodia, S.2
  • 110
    • 84947907875 scopus 로고    scopus 로고
    • Technical trials and legal tribulations
    • S. Craver, B.-L. Yeo, and M. Yeung, "Technical trials and legal tribulations," Commun. ACM, vol. 41, no. 7, pp. 44-54, July 1998.
    • (1998) Commun. ACM , vol.41 , Issue.7 , pp. 44-54
    • Craver, S.1    Yeo, B.-L.2    Yeung, M.3
  • 112
    • 0031237840 scopus 로고    scopus 로고
    • Quadratic interpolation for image resampling
    • Sept.
    • N. A. Dodgson, "Quadratic interpolation for image resampling," IEEE Trans. Image Processing, vol. 6, pp. 1322-1326, Sept. 1997.
    • (1997) IEEE Trans. Image Processing , vol.6 , pp. 1322-1326
    • Dodgson, N.A.1
  • 113
    • 0032223846 scopus 로고    scopus 로고
    • Results of attacks on a claimed robust digital image watermark
    • R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE
    • G. W. Braudaway, "Results of attacks on a claimed robust digital image watermark," in Optical Security and Counterfeit Deterrence Techniques II, vol. 3314, R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE, 1998.
    • (1998) Optical Security and Counterfeit Deterrence Techniques II , vol.3314
    • Braudaway, G.W.1
  • 115
    • 85042246467 scopus 로고
    • Echo removal by discrete generalized linear filtering, Massachusetts Inst. Technol., Cambridge, MA
    • Feb.
    • R. W. Schafer, "Echo removal by discrete generalized linear filtering," Massachusetts Inst. Technol., Cambridge, MA, Tech. Rep. 466, Feb. 1969.
    • (1969) Tech. Rep. 466
    • Schafer, R.W.1
  • 116
    • 84978940128 scopus 로고    scopus 로고
    • Can invisible watermark resolve rightful ownerships?
    • I. K. Sethin and R. C. Jain, Eds. San Jose, CA: IS&T and SPIE
    • S. Craver, N. Memon, B.-L. Yeo, and M. M. Yeung, "Can invisible watermark resolve rightful ownerships?," in Storage and Retrieval for Image and Video Database V, vol. 3022, I. K. Sethin and R. C. Jain, Eds. San Jose, CA: IS&T and SPIE, 1997, pp. 310-321.
    • (1997) Storage and Retrieval for Image and Video Database V , vol.3022 , pp. 310-321
    • Craver, S.1    Memon, N.2    Yeo, B.-L.3    Yeung, M.M.4
  • 117
    • 0032074580 scopus 로고    scopus 로고
    • Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
    • "Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications," IEEE J. Select. Areas Commun., vol. 16, pp. 573-586, May 1998.
    • (1998) IEEE J. Select. Areas Commun. , vol.16 , pp. 573-586
  • 118
    • 84955621400 scopus 로고    scopus 로고
    • Tamper resistant software: An implementation
    • R. J. Anderson, Ed. Berlin, Germany: Springer-Verlag
    • D. Aucsmith, "Tamper resistant software: An implementation," in Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science), vol. 1174, R. J. Anderson, Ed. Berlin, Germany: Springer-Verlag, 1996, pp. 317-333.
    • (1996) Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science) , vol.1174 , pp. 317-333
    • Aucsmith, D.1
  • 119
  • 120
    • 0031335088 scopus 로고    scopus 로고
    • Fast public-key watermarking of compressed video
    • Santa Barbara, CA, Oct.
    • F. Hartung and B. Girod, "Fast public-key watermarking of compressed video," in Proc. IEEE Int. Conf. Image Processing (ICIP'97), vol. I, Santa Barbara, CA, Oct. 1997, pp. 528-531.
    • (1997) Proc. IEEE Int. Conf. Image Processing (ICIP'97) , vol.1 , pp. 528-531
    • Hartung, F.1    Girod, B.2
  • 122
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct.
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, Oct. 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 124
    • 0001217738 scopus 로고
    • The prisoners' problem and the subliminal channel
    • Santa Barbara, CA
    • "The prisoners' problem and the subliminal channel," in Proc. IEEE Workshop Communications Security CRYPTO'83, Santa Barbara, CA, 1983, pp. 51-67.
    • (1983) Proc. IEEE Workshop Communications Security CRYPTO'83 , pp. 51-67
  • 125
    • 0032075057 scopus 로고    scopus 로고
    • The history of subliminal channels
    • May
    • "The history of subliminal channels," IEEE J. Select. Areas Commun., vol. 16, pp. 452-462, May 1998.
    • (1998) IEEE J. Select. Areas Commun. , vol.16 , pp. 452-462
  • 127
    • 0028463501 scopus 로고
    • Subliminal channels: Past and present
    • July/Aug.
    • "Subliminal channels: Past and present," Europ. Trans. Telecommun., vol. 5, no. 4, pp. 459-473, July/Aug. 1994.
    • (1994) Europ. Trans. Telecommun. , vol.5 , Issue.4 , pp. 459-473
  • 128
    • 0032073886 scopus 로고    scopus 로고
    • Results concerning the bandwidth of subliminal channels
    • May
    • "Results concerning the bandwidth of subliminal channels," IEEE J. Select. Areas Commun., vol. 16, pp. 463-473, May 1998.
    • (1998) IEEE J. Select. Areas Commun. , vol.16 , pp. 463-473
  • 130
    • 14244254664 scopus 로고    scopus 로고
    • On public-key steganography in the presence of an active warden
    • IBM Res. Division, T. J. Watson Res. Center, Yorktown Heights, NY, July
    • S. Craver, "On public-key steganography in the presence of an active warden," IBM Res. Division, T. J. Watson Res. Center, Yorktown Heights, NY, Tech. Rep. RC20931, July 1997.
    • (1997) Tech. Rep. RC20931
    • Craver, S.1
  • 132
    • 0028566761 scopus 로고
    • Covert channels - Here to stay?
    • I. Moskowitz and M. Kang, "Covert channels - Here to stay?," in Compass'94, 1994, pp. 235-243.
    • (1994) Compass' , vol.94 , pp. 235-243
    • Moskowitz, I.1    Kang, M.2
  • 133
    • 33744582938 scopus 로고    scopus 로고
    • Mar.. Hide and seek. [Online]. Available WWW
    • C. Maroney. (1997, Mar.). Hide and seek. [Online]. Available WWW: http://www.cypher.net/products/hideseek.html.
    • (1997)
    • Maroney, C.1
  • 134
    • 33744595250 scopus 로고    scopus 로고
    • (1997, Mar.). Stegodos. [Online]. Available WWW: ftp://ftp.funet.fi/pub/crypt/steganography/stegodos.zip.
  • 135
    • 84955601215 scopus 로고    scopus 로고
    • Computer based steganography: How it works and why therefore any restriction on cryptography are nonsense, at best
    • R. J. Anderson, Ed. Berlin, Germany: Springer-Verlag
    • E. Franz, A. Jerichow, S. Möller, A. Pfitzmann, and I. Stierand, "Computer based steganography: How it works and why therefore any restriction on cryptography are nonsense, at best," in Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science), vol. 1174, R. J. Anderson, Ed. Berlin, Germany: Springer-Verlag, 1996, pp. 7-21.
    • (1996) Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science) , vol.1174 , pp. 7-21
    • Franz, E.1    Jerichow, A.2    Möller, S.3    Pfitzmann, A.4    Stierand, I.5
  • 137
    • 84936892450 scopus 로고
    • Cryptology for digital TV broadcasting
    • June
    • B. M. Macq and J.-J. Quisquater, "Cryptology for digital TV broadcasting," Proc. IEEE, vol. 83, pp. 944-956, June 1995.
    • (1995) Proc. IEEE , vol.83 , pp. 944-956
    • Macq, B.M.1    Quisquater, J.-J.2
  • 138
    • 0342492669 scopus 로고    scopus 로고
    • Comparing robustness of watermarking techniques
    • San Jose, CA: IS&T and SPIE
    • J. Fridrich and M. Goljan, "Comparing robustness of watermarking techniques," in 11th Int. Symp. Electronic Imaging, vol. 3657. San Jose, CA: IS&T and SPIE, 1999.
    • (1999) 11th Int. Symp. Electronic Imaging , vol.3657
    • Fridrich, J.1    Goljan, M.2
  • 139
    • 33744557609 scopus 로고    scopus 로고
    • Request for proposals - Embedded signalling systems
    • London, U.K., June
    • Int. Federation of the Phonographic Industry, "Request for proposals - Embedded signalling systems," Int. Federation of the Phonographic Industry, London, U.K., June 1997.
    • (1997) Int. Federation of the Phonographic Industry
  • 141
    • 33744572314 scopus 로고
    • ICE (Identification Coding, Embedded)
    • Berlin, Germany, Mar. 16-19, Preprint 3516 (D2-3).
    • R. Willard, "ICE (Identification Coding, Embedded)," in 74th Conv. Audio Engineering Society Preprints, Berlin, Germany, Mar. 16-19, 1993, Preprint 3516 (D2-3).
    • (1993) 74th Conv. Audio Engineering Society Preprints
    • Willard, R.1
  • 142
    • 0001600507 scopus 로고
    • W. Niblack and R. C. Jain, Eds., San Jose, CA: IS&T and SPIE
    • W. Niblack and R. C. Jain, Eds., Storage and Retrieval for Image and Video Database III, vol. 2420. San Jose, CA: IS&T and SPIE, 1995.
    • (1995) Storage and Retrieval for Image and Video Database III , vol.2420
  • 143
    • 1542377734 scopus 로고    scopus 로고
    • B. E. Rogowitz and T. N. Pappas, Eds., San Jose, CA: IS&T and SPIE
    • B. E. Rogowitz and T. N. Pappas, Eds., Human Vision and Electronic Imaging II, vol. 3016. San Jose, CA: IS&T and SPIE, 1997.
    • (1997) Human Vision and Electronic Imaging II , vol.3016
  • 148
    • 33744645635 scopus 로고    scopus 로고
    • J. Dittmann, P. Wohlmacher, P. Horster, and R. Steinmetz, Eds., Bristol, U.K.: ACM, GMD - Forschungszentrum Informationstechnik GmbH
    • J. Dittmann, P. Wohlmacher, P. Horster, and R. Steinmetz, Eds., Multimedia and Security - Workshop at ACM Multimedia'98 (GMD Report), vol. 41. Bristol, U.K.: ACM, GMD - Forschungszentrum Informationstechnik GmbH, 1998.
    • (1998) Multimedia and Security - Workshop at ACM Multimedia'98 (GMD Report) , vol.41
  • 150
    • 33744639169 scopus 로고    scopus 로고
    • I. K. Sethin and R. C. Jain, Eds., San Jose, CA: IS&T and SPIE
    • I. K. Sethin and R. C. Jain, Eds., Storage and Retrieval for Image and Video Database V, vol. 3022. San Jose, CA: IS&T and SPIE, 1997.
    • (1997) Storage and Retrieval for Image and Video Database V , vol.3022
  • 151
    • 0003815918 scopus 로고
    • corrected reissue. Oxford, U.K.: Clarendon
    • The Oxford English Dictionary (corrected reissue). Oxford, U.K.: Clarendon, 1933.
    • (1933) The Oxford English Dictionary


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.