-
3
-
-
0019532104
-
Untraceable electronic mail, return addresses and digital pseudonyms
-
D. Chaum, "Untraceable electronic mail, return addresses and digital pseudonyms," Commun. ACM, vol. 24, no. 2, pp. 84-88, Feb. 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
5
-
-
84884551851
-
Image watermarking based on the fractal transform
-
S. Roche and J.-L. Dugelay, "Image watermarking based on the fractal transform," in Proc. Workshop Multimedia Signal Processing, Los Angeles, CA, 1998, pp. 358-363.
-
(1998)
Proc. Workshop Multimedia Signal Processing, Los Angeles, CA
, pp. 358-363
-
-
Roche, S.1
Dugelay, J.-L.2
-
6
-
-
84958747967
-
The ticket concept for copy control based on embedded signalling
-
J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, Eds. Berlin, Germany: Springer, 1998
-
J.-P. M. G. Linnartz, "The "ticket" concept for copy control based on embedded signalling," in Computer Security - 5th Europ. Symp. Research in Computer Security, (ESORICS'98) (Lecture Notes in Computer Science), vol. 1485, J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, Eds. Berlin, Germany: Springer, 1998, pp. 257-274.
-
Computer Security - 5th Europ. Symp. Research in Computer Security, (ESORICS'98) (Lecture Notes in Computer Science)
, vol.1485
, pp. 257-274
-
-
Linnartz, J.-P.M.G.1
-
7
-
-
0005019117
-
Watermarking in the real world: An application to DVD
-
J. Dittmann, P. Wohlmacher, P. Horster, and R. Steinmetz, Eds. Bristol, U.K.: ACM, GMD - Forschungszentrum Informationstechnik GmbH
-
M. L. Miller, I. J. Cox, and J. A. Bloom, "Watermarking in the real world: An application to DVD," in Multimedia and Security - Workshop at ACM Multimedia'98 (GMD Report), vol. 41, J. Dittmann, P. Wohlmacher, P. Horster, and R. Steinmetz, Eds. Bristol, U.K.: ACM, GMD - Forschungszentrum Informationstechnik GmbH, 1998, pp. 71-76.
-
(1998)
Multimedia and Security - Workshop at ACM Multimedia'98 (GMD Report)
, vol.41
, pp. 71-76
-
-
Miller, M.L.1
Cox, I.J.2
Bloom, J.A.3
-
8
-
-
0003945449
-
-
Ph.D. dissertation, Yale University, New Haven, CT, YALEU/DCS/TR-561
-
J. C. Benaloh, Verifiable Secret-Ballot Elections, Ph.D. dissertation, Yale University, New Haven, CT, YALEU/DCS/TR-561, 1987.
-
(1987)
Verifiable Secret-Ballot Elections
-
-
Benaloh, J.C.1
-
9
-
-
0001187269
-
Information hiding terminology
-
Berlin, Germany: Springer-Verlag
-
B. Pfitzmann, "Information hiding terminology," in Lecture Notes in Computer Science, vol. 1174. Berlin, Germany: Springer-Verlag, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1174
-
-
Pfitzmann, B.1
-
11
-
-
0029777872
-
Protecting publicly-available images with a visible image watermark
-
R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE
-
G. W. Braudaway, K. A. Magerlein, and F. Mintzer, "Protecting publicly-available images with a visible image watermark," in Optical Security and Counterfeit Deterrence Techniques, vol. 2659, R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE, 1996, pp. 126-133.
-
(1996)
Optical Security and Counterfeit Deterrence Techniques
, vol.2659
, pp. 126-133
-
-
Braudaway, G.W.1
Magerlein, K.A.2
Mintzer, F.3
-
13
-
-
58849141394
-
A review of watermarking and the importance of perceptual modeling
-
E. Rogowitz and T. N. Pappas, Eds. San Jose, CA: IS&T and SPIE
-
I. J. Cox and M. L. Miller, "A review of watermarking and the importance of perceptual modeling," in Human Vision and Electronic Imaging II, vol. 3016B, E. Rogowitz and T. N. Pappas, Eds. San Jose, CA: IS&T and SPIE, 1997.
-
(1997)
Human Vision and Electronic Imaging II
, vol.3016
-
-
Cox, I.J.1
Miller, M.L.2
-
14
-
-
0002152920
-
Assuring ownership rights for digital images
-
H. Brüggermann and W. Gerhardt-Häckl, Eds. Germany: Vieweg
-
G. Caronni, "Assuring ownership rights for digital images," in Reliable IT Systems (VIS'95), H. Brüggermann and W. Gerhardt-Häckl, Eds. Germany: Vieweg, 1995, pp. 251-263.
-
(1995)
Reliable IT Systems (VIS'95)
, pp. 251-263
-
-
Caronni, G.1
-
15
-
-
84947937393
-
A secure, robust watermark for multimedia
-
R. J. Anderson, Ed., Information hiding: First international workshop Berlin, Germany: Springer-Verlag
-
I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "A secure, robust watermark for multimedia," in R. J. Anderson, Ed., "Information hiding: First international workshop," in Lec-ture Notes in Computer Science, vol. 1174. Berlin, Germany: Springer-Verlag, 1996, pp. 183-206.
-
(1996)
Lec-ture Notes in Computer Science
, vol.1174
, pp. 183-206
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
16
-
-
58749110701
-
Digital image watermarking using visual models
-
B. E. Rogowitz and T. N. Pappas, Eds. San Jose, CA: IS&T and SPIE
-
C. I. Podilchuk and W. Zeng, "Digital image watermarking using visual models," in Human Vision and Electronic Imaging II, vol. 3016, B. E. Rogowitz and T. N. Pappas, Eds. San Jose, CA: IS&T and SPIE, 1997, pp. 100-111.
-
(1997)
Human Vision and Electronic Imaging II
, vol.3016
, pp. 100-111
-
-
Podilchuk, C.I.1
Zeng, W.2
-
17
-
-
0032072250
-
A DCT-domain system for robust image watermarking
-
M. Barni, F. Bartolini, V. Cappellini, and A. Piva, "A DCT-domain system for robust image watermarking," Signal Processing, vol. 66, no. 3, pp. 357-372, May 1998.
-
(1998)
Signal Processing
, vol.66
, Issue.3
, pp. 357-372
-
-
Barni, M.1
Bartolini, F.2
Cappellini, V.3
Piva, A.4
-
18
-
-
0031619127
-
Digital watermarking using multiresolution wavelet decomposition
-
Seattle, WA: IEEE
-
D. Kundur and D. Hatzinakos, "Digital watermarking using multiresolution wavelet decomposition," in Int. Conf. Acoustic, Speech and Signal Processing (ICASP), vol. 5. Seattle, WA: IEEE, 1998, pp. 2969-2972.
-
(1998)
Int. Conf. Acoustic, Speech and Signal Processing (ICASP)
, vol.5
, pp. 2969-2972
-
-
Kundur, D.1
Hatzinakos, D.2
-
19
-
-
85019629547
-
Non-invertible statistical wavelet watermarking
-
Rhodes, Greece, Sept. 8-11
-
G. Nicchiotti and E. Ottaviano, "Non-invertible statistical wavelet watermarking," in Proc. 9th Europ. Signal Processing Conf. (EUSIPCO'98), Rhodes, Greece, Sept. 8-11, 1998, pp. 2289-2292.
-
(1998)
Proc. 9th Europ. Signal Processing Conf. (EUSIPCO'98)
, pp. 2289-2292
-
-
Nicchiotti, G.1
Ottaviano, E.2
-
20
-
-
0032075445
-
Robust image watermarking in the spatial domain
-
N. Nikolaidis and I. Pitas, "Robust image watermarking in the spatial domain," Signal Processing, vol. 66, no. 3, pp. 385-403, May 1998.
-
(1998)
Signal Processing
, vol.66
, Issue.3
, pp. 385-403
-
-
Nikolaidis, N.1
Pitas, I.2
-
21
-
-
0002961841
-
Robust image watermarking in the subband or discrete cosine transform domain
-
Rhodes, Greece, Sept. 8-11
-
D. Tzovaras, N. Karagiannis, and M. G. Strintzis, "Robust image watermarking in the subband or discrete cosine transform domain," in Proc. 9th European Signal Processing Conf. (EUSIPCO'98), Rhodes, Greece, Sept. 8-11, 1998, pp. 2285-2288.
-
(1998)
Proc. 9th European Signal Processing Conf. (EUSIPCO'98)
, pp. 2285-2288
-
-
Tzovaras, D.1
Karagiannis, N.2
Strintzis, M.G.3
-
22
-
-
84997769409
-
A digital watermark
-
Austin, TX
-
R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, "A digital watermark," in Proc. IEEE Int. Conf. Image Processing, vol. 2, Austin, TX, 1994, pp. 86-90.
-
(1994)
Proc. IEEE Int. Conf. Image Processing
, vol.2
, pp. 86-90
-
-
Van Schyndel, R.G.1
Tirkel, A.Z.2
Osborne, C.F.3
-
23
-
-
0008779206
-
A watermarking technique for digital imagery: Further studies
-
Las Vegas, NV, June 30-July 3
-
R. B. Wolfgang and E. J. Delp, "A watermarking technique for digital imagery: Further studies," in Proc. IEEE Int. Conf. Imaging, Systems, and Technology, Las Vegas, NV, June 30-July 3, 1997, pp. 279-287.
-
(1997)
Proc. IEEE Int. Conf. Imaging, Systems, and Technology
, pp. 279-287
-
-
Wolfgang, R.B.1
Delp, E.J.2
-
24
-
-
0032072064
-
Watermarking of uncompressed and compressed video
-
F. Hartung and B. Girod, "Watermarking of uncompressed and compressed video," Signal Processing, vol. 66, no. 3, pp. 283-301, May 1998.
-
(1998)
Signal Processing
, vol.66
, Issue.3
, pp. 283-301
-
-
Hartung, F.1
Girod, B.2
-
25
-
-
84947900806
-
Secure copyright protection techniques for digital images
-
D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag
-
A. Herrigel, J. J. K. O'Ruanaidh, H. Petersen, S. Pereira, and T. Pun, "Secure copyright protection techniques for digital images," in Information Hiding: Second Int. Workshop (Lecture Notes in Computer Science), vol. 1525, D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag, 1998, pp. 169-190.
-
(1998)
Information Hiding: Second Int. Workshop (Lecture Notes in Computer Science)
, vol.1525
, pp. 169-190
-
-
Herrigel, A.1
O'Ruanaidh, J.J.K.2
Petersen, H.3
Pereira, S.4
Pun, T.5
-
26
-
-
0029767514
-
Robust data hiding for images
-
Loen, Norway, Sept.
-
M. D. Swanson, B. Zu, and A. H. Tewfik, "Robust data hiding for images," in Proc. IEEE 7th Digital Signal Processing Workshop (DSP 96), Loen, Norway, Sept. 1996, pp. 37-40.
-
(1996)
Proc. IEEE 7th Digital Signal Processing Workshop (DSP 96)
, pp. 37-40
-
-
Swanson, M.D.1
Zu, B.2
Tewfik, A.H.3
-
27
-
-
85076090605
-
Robust labeling methods for copy protection of images
-
I. K. Sethin and R. C. Jain, Eds. San Jose, CA: IS&T and SPIE
-
G. C. Langelaar, J. C. A. van der Lubbe, and R. L. Lagendijk, "Robust labeling methods for copy protection of images," in Storage and Retrieval for Image and Video Database V, vol. 3022, I. K. Sethin and R. C. Jain, Eds. San Jose, CA: IS&T and SPIE, pp. 298-309.
-
Storage and Retrieval for Image and Video Database V
, vol.3022
, pp. 298-309
-
-
Langelaar, G.C.1
Lagendijk, R.L.2
-
28
-
-
0001320242
-
Embedding robust labels into images for copyright protection
-
J. Zhao and E. Koch, "Embedding robust labels into images for copyright protection," in Int. Congr. Intellectual Property Rights for Specialised Information, Knowledge and New Technologies, Vienna, Austria, Aug. 1995.
-
(1995)
Int. Congr. Intellectual Property Rights for Specialised Information, Knowledge and New Technologies, Vienna, Austria, Aug.
-
-
Zhao, J.1
Koch, E.2
-
30
-
-
84867166654
-
Solved: The ciphers in book III of Trithemius' steganographia
-
Oct.
-
J. Reeds, "Solved: The ciphers in book III of Trithemius' steganographia," Cryptologia, vol. XXII, no. 4, pp. 291-317, Oct. 1998.
-
(1998)
Cryptologia
, vol.22
, Issue.4
, pp. 291-317
-
-
Reeds, J.1
-
32
-
-
0003185688
-
La cryptographie militaire
-
Jan.
-
A. Kerckhoffs, "La cryptographie militaire," J. Sciences Militaires, vol. 9, pp. 5-38, Jan. 1883.
-
(1883)
J. Sciences Militaires
, vol.9
, pp. 5-38
-
-
Kerckhoffs, A.1
-
33
-
-
3042816249
-
Liability and computer security: Nine principles
-
D. Gollmann, Ed. Berlin, Germany: Springer-Verlag
-
R. J. Anderson, "Liability and computer security: Nine principles," in Computer Security - 3rd Europ. Symp. Research in Computer Security (ESORICS'94) (Lecture Notes in Computer Science), vol. 875, D. Gollmann, Ed. Berlin, Germany: Springer-Verlag, pp. 231-245.
-
Computer Security - 3rd Europ. Symp. Research in Computer Security (ESORICS'94) (Lecture Notes in Computer Science)
, vol.875
, pp. 231-245
-
-
Anderson, R.J.1
-
35
-
-
33744642330
-
-
A. Seckel, "Your mind's eye: Illusions & paradoxes of the visual system," presented at National Science Week, Univ. Cambridge, Cambridge, U.K., Mar. 1998. [Online]. Available WWW: http://www.illusionworks.com/
-
(1998)
Your mind's eye: Illusions & paradoxes of the visual system, presented at National Science Week, Univ. Cambridge, Cambridge, U.K., Mar
-
-
Seckel, A.1
-
36
-
-
0003617369
-
-
London, U.K.: J. M. Dent & Sons, ch. 5 and 7.
-
Herodotus, The Histories. London, U.K.: J. M. Dent & Sons, 1992, ch. 5 and 7.
-
(1992)
The Histories
-
-
Herodotus1
-
38
-
-
33744582409
-
-
Apr.. Aliroo home page. [Online]. Available WWW
-
WitnesSoft and ScarLet security software. (1997, Apr.). Aliroo home page. [Online]. Available WWW: http://www.aliroo.com/.
-
(1997)
WitnesSoft and ScarLet Security Software.
-
-
-
39
-
-
0032224391
-
Technology approaches to currency security
-
R. L. van Renesse, Ed.. San Jose, CA: IS&T and SPIE
-
J. C. Murphy, D. Dubbel, and R. Benson, "Technology approaches to currency security," in Optical Security and Counterfeit Deterrence Techniques II, vol. 3314, R. L. van Renesse, Ed.. San Jose, CA: IS&T and SPIE, 1998, pp. 21-28.
-
(1998)
Optical Security and Counterfeit Deterrence Techniques II
, vol.3314
, pp. 21-28
-
-
Murphy, J.C.1
Dubbel, D.2
Benson, R.3
-
41
-
-
33744661362
-
Microscope
-
Edinburgh, U.K.: Britannica
-
D. Brewster, "Microscope," in Encyclopedia Britannica or the Dictionary of Arts, Sciences, and General Literature, vol. XIV, 8th ed. Edinburgh, U.K.: Britannica, 1857, pp. 801-802.
-
(1857)
Encyclopedia Britannica or the Dictionary of Arts, Sciences, and General Literature, Vol. XIV, 8th Ed.
, vol.14
, pp. 801-802
-
-
Brewster, D.1
-
42
-
-
33744636356
-
-
Paris, France: Librairie Hachette & Cie, 1874, ch. 6
-
G. Tissandier, Les Merveilles de la Photographie. Paris, France: Librairie Hachette & Cie, 1874, ch. 6, pp. 233-248.
-
Les Merveilles De La Photographie.
, pp. 233-248
-
-
Tissandier, G.1
-
44
-
-
0347422194
-
The enemy's masterpiece of espionage
-
May
-
J. E. Hoover, "The enemy's masterpiece of espionage," The Reader's Dig., vol. 48, pp. 49-53, May 1946.
-
(1946)
The Reader's Dig.
, vol.48
, pp. 49-53
-
-
Hoover, J.E.1
-
45
-
-
0032074501
-
Watermarking algorithm based on a human visual model
-
J. F. Delaigle, C. De Vleeschouwer, and B. Macq, "Watermarking algorithm based on a human visual model," Signal Processing, vol. 66, no. 3, pp. 319-335, May 1998.
-
(1998)
Signal Processing
, vol.66
, Issue.3
, pp. 319-335
-
-
Delaigle, J.F.1
De Vleeschouwer, C.2
Macq, B.3
-
46
-
-
0029694397
-
Digital watermarks for audio signals
-
L. Boney, A. H. Tewfik, and K. N. Hamdy, "Digital watermarks for audio signals," in Proc. 1996 IEEE Int. Conf. Multimedia Computing and Systems, Hiroshima, Japan, June 17-23, 1996, pp. 473-480.
-
(1996)
Proc. 1996 IEEE Int. Conf. Multimedia Computing and Systems, Hiroshima, Japan, June 17-23
, pp. 473-480
-
-
Boney, L.1
Tewfik, A.H.2
Hamdy, K.N.3
-
47
-
-
85019590801
-
A low cost perceptive digital picture watermarking method
-
I. K. Sethin and R. C. Jain, Eds. San Jose, CA: IS&T and SPIE
-
F. Goffin, J.-F. Delaigle, C. D. Vleeschouwer, B. Macq, and J.-J. Quisquater, "A low cost perceptive digital picture watermarking method," in Storage and Retrieval for Image and Video Database V, vol. 3022, I. K. Sethin and R. C. Jain, Eds. San Jose, CA: IS&T and SPIE, 1997, pp. 264-277.
-
(1997)
Storage and Retrieval for Image and Video Database V
, vol.3022
, pp. 264-277
-
-
Goffin, F.1
Delaigle, J.-F.2
Vleeschouwer, C.D.3
Macq, B.4
Quisquater, J.-J.5
-
48
-
-
0027684995
-
Signal compression based on models of human perception
-
Oct.
-
N. Jayant, J. Johnston, and R. Safranek, "Signal compression based on models of human perception," Proc. IEEE, vol. 81, pp. 1385-1422, Oct. 1993.
-
(1993)
Proc. IEEE
, vol.81
, pp. 1385-1422
-
-
Jayant, N.1
Johnston, J.2
Safranek, R.3
-
51
-
-
0029230330
-
A variable-bit-rate buried-data channel for compact disc
-
Jan./Feb.
-
A. Werner, J. Oomen, M. E. Groenewegen, R. G. van der Waal, and R. N. Veldhuis, "A variable-bit-rate buried-data channel for compact disc," J. Audio Eng. Soc., vol. 43, no. 1/2, pp. 23-28, Jan./Feb. 1995.
-
(1995)
J. Audio Eng. Soc.
, vol.43
, Issue.1-2
, pp. 23-28
-
-
Werner, A.1
Oomen, J.2
Groenewegen, M.E.3
Van Der Waal, R.G.4
Veldhuis, R.N.5
-
52
-
-
0032664574
-
-
R. B. Wolfgang, C. I. Podilchuk, and E. J. Delp, "Perceptual watermarks for digital images and videos," this issue, pp. 1108-1126.
-
Perceptual watermarks for digital images and videos, this issue
, pp. 1108-1126
-
-
Wolfgang, R.B.1
Podilchuk, C.I.2
Delp, E.J.3
-
54
-
-
0028532579
-
Why cryptosystems fail
-
R. J. Anderson, "Why cryptosystems fail," Commun. ACM, vol. 37, pp. 32-40, Nov. 1994.
-
(1994)
Commun. ACM
, vol.37
, pp. 32-40
-
-
Anderson, R.J.1
-
55
-
-
33744672005
-
-
Oxford, U.K.: Leon Lichfield, 1640
-
F. Bacon, Of the Advancement and Proficiencie of Learning or the Partitions of Sciences, vol. VI. Oxford, U.K.: Leon Lichfield, 1640, pp. 257-211.
-
Of the Advancement and Proficiencie of Learning or the Partitions of Sciences
, vol.6
, pp. 257-1211
-
-
Bacon, F.1
-
57
-
-
0020939201
-
Fingerprinting
-
Oakland, CA, Apr. 25-27
-
N. R. Wagner, "Fingerprinting," in IEEE Symp. Security and Privacy, Oakland, CA, Apr. 25-27, 1983, pp. 18-22.
-
(1983)
IEEE Symp. Security and Privacy
, pp. 18-22
-
-
Wagner, N.R.1
-
58
-
-
0028592391
-
Electronic marking and identification techniques to discourage document copying
-
J. Brassil, S. Low, N. Maxemchuk, and L. O'Garman, "Electronic marking and identification techniques to discourage document copying," in Proc. Infocom, Toronto, Canada, June 1994, pp. 1278-1287.
-
(1994)
Proc. Infocom, Toronto, Canada, June
, pp. 1278-1287
-
-
Brassil, J.1
Low, S.2
Maxemchuk, N.3
O'Garman, L.4
-
59
-
-
0030387424
-
A watermark for digital images
-
R. B. Wolfgang and E. J. Delp, "A watermark for digital images," in Proc. IEEE Int. Conf. Images Processing, Lausanne, Switzerland, Sept. 1996, pp. 219-222.
-
(1996)
Proc. IEEE Int. Conf. Images Processing, Lausanne, Switzerland, Sept.
, pp. 219-222
-
-
Wolfgang, R.B.1
Delp, E.J.2
-
60
-
-
0029292158
-
Image authentication for a slippery new age
-
Apr.
-
S. Walton, "Image authentication for a slippery new age," Dr. Dobb's J. Software Tools, vol. 20, no. 4, pp. 18-26, Apr. 1995.
-
(1995)
Dr. Dobb's J. Software Tools
, vol.20
, Issue.4
, pp. 18-26
-
-
Walton, S.1
-
61
-
-
0000370347
-
Video-steganography: How to secretly embed a signature in a picture
-
K. Matsui and K. Tanaka, "Video-steganography: How to secretly embed a signature in a picture," J. Interactive Multimedia Association Intellectual Property Project, vol. 1, no. 1, pp. 187-205, Jan. 1994.
-
(1994)
J. Interactive Multimedia Association Intellectual Property Project
, vol.1
, Issue.1
, pp. 187-205
-
-
Matsui, K.1
Tanaka, K.2
-
62
-
-
84947921901
-
Chameleon - A new kind of stream cipher
-
E. Biham, Ed. Berlin, Germany: Springer-Verlag
-
R. J. Anderson and C. Manifavas, "Chameleon - A new kind of stream cipher," in Fast Software Encryption - 4th Int. Workshop (FSE'97) (Lecture Notes in Computer Science), vol. 1267, E. Biham, Ed. Berlin, Germany: Springer-Verlag, pp. 107-113, 1997.
-
(1997)
Fast Software Encryption - 4th Int. Workshop (FSE'97) (Lecture Notes in Computer Science)
, vol.1267
, pp. 107-113
-
-
Anderson, R.J.1
Manifavas, C.2
-
63
-
-
84955564864
-
Modulation and information hiding in images
-
R. J. Anderson, Ed. Berlin, Germany: Springer-Verlag
-
J. R. Smith and B. O. Comiskey, "Modulation and information hiding in images," in Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science), vol. 1174, R. J. Anderson, Ed. Berlin, Germany: Springer-Verlag, 1996, pp. 207-226.
-
(1996)
Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science)
, vol.1174
, pp. 207-226
-
-
Smith, J.R.1
Comiskey, B.O.2
-
64
-
-
0030384775
-
Techniques for data hiding
-
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM Syst. J., vol. 35, nos. 3, 4, pp. 313-336, 1996.
-
(1996)
IBM Syst. J.
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
65
-
-
0030409662
-
A method for signature casting on digital images
-
Sept.
-
I. Pitas, "A method for signature casting on digital images," in Proc. Int. Conf. Image Processing, vol. 3, Sept. 1996, pp. 215-218.
-
(1996)
Proc. Int. Conf. Image Processing
, vol.3
, pp. 215-218
-
-
Pitas, I.1
-
66
-
-
0347029289
-
Copy protection for multimedia data based on labeling techniques
-
Enschede, The Netherlands, May
-
G. C. Langelaar, J. C. van der Lubbe, and J. Biemond, "Copy protection for multimedia data based on labeling techniques," in Proc. 17th Symp. Information Theory in the Benelux, Enschede, The Netherlands, May 1996.
-
(1996)
Proc. 17th Symp. Information Theory in the Benelux
-
-
Langelaar, G.C.1
Biemond, J.2
-
68
-
-
0020126821
-
The origins of spread spectrum communications
-
R. A. Scholtz, "The origins of spread spectrum communications," IEEE Trans. Commun., vol. 30, pp. 822-853, May 1982.
-
(1982)
IEEE Trans. Commun.
, vol.30
, pp. 822-853
-
-
Scholtz, R.A.1
-
69
-
-
0020128340
-
Theory of spread spectrum communications - A tutorial
-
R. L. Pickholtz, D. L. Schilling, and L. B. Milstein, "Theory of spread spectrum communications - A tutorial," IEEE Trans. Commun., vol. 30, pp. 855-884, May 1982.
-
(1982)
IEEE Trans. Commun.
, vol.30
, pp. 855-884
-
-
Pickholtz, R.L.1
Schilling, D.L.2
Milstein, L.B.3
-
70
-
-
0002167987
-
Electronic watermark
-
Macquarie University, Sydney, Australia
-
A. Z. Tirkel, G. A. Rankin, R. M. van Schyndel, W. J. Ho, N. R. A. Mee, and C. F. Osborne, "Electronic watermark," in Digital Image Computing, Technology and Applications (DICTA'93), Macquarie University, Sydney, Australia, 1993, pp. 666-673.
-
(1993)
Digital Image Computing, Technology and Applications (DICTA'93)
, pp. 666-673
-
-
Tirkel, A.Z.1
Rankin, G.A.2
Van Schyndel, R.M.3
Ho, W.J.4
Mee, N.R.A.5
Osborne, C.F.6
-
71
-
-
0030388964
-
Secure spread spectrum watermarking for images, audio and video
-
Lausanne, Switzerland, Sept. 16-19
-
I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for images, audio and video," in Proc. IEEE Int. Conf. Image Processing (ICIP'96), Lausanne, Switzerland, Sept. 16-19, 1996, pp. 243-246.
-
(1996)
Proc. IEEE Int. Conf. Image Processing (ICIP'96)
, pp. 243-246
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
72
-
-
50049086657
-
Watermarking of MPEG-2 encoded video without decoding and re-encoding
-
M. Freeman, P. Jardetzky, and H. M. Vin, Eds. San Jose, CA: IS&T and SPIE
-
F. Hartung and B. Girod, "Watermarking of MPEG-2 encoded video without decoding and re-encoding," in Multimedia Computing and Networking 1997, vol. 3020, M. Freeman, P. Jardetzky, and H. M. Vin, Eds. San Jose, CA: IS&T and SPIE, 1997, pp. 264-273.
-
(1997)
Multimedia Computing and Networking 1997
, vol.3020
, pp. 264-273
-
-
Hartung, F.1
Girod, B.2
-
73
-
-
0029694397
-
Digital watermarks for audio signals
-
Hiroshima, Japan, June 17-23
-
L. Boney, A. H. Tewfik, and K. N. Hamdy, "Digital watermarks for audio signals," in Proc. IEEE Int. Conf. Multimedia Computing and Systems., Hiroshima, Japan, June 17-23, 1996, pp. 473-480.
-
(1996)
Proc. IEEE Int. Conf. Multimedia Computing and Systems.
, pp. 473-480
-
-
Boney, L.1
Tewfik, A.H.2
Hamdy, K.N.3
-
75
-
-
33744644065
-
-
G. Jagpal, "Steganoraphy in digital images," Ph.D. dissertation, Selwyn College, Cambridge Univ., Cambridge, U.K., May 1995.
-
(1995)
Steganoraphy in digital images, Ph.D. dissertation, Selwyn College, Cambridge Univ., Cambridge, U.K., May
-
-
Jagpal, G.1
-
76
-
-
33744688237
-
-
1998, Aug.. MP3Stego. [Online]. Available WWW
-
F. A. P. Petitcolas. (1998, Aug.). MP3Stego. [Online]. Available WWW: http://www.cl.cam.ac.uk/ ̃fapp2/steganography/mp3stego/.
-
-
-
Petitcolas, F.A.P.1
-
77
-
-
0000543038
-
Toward robust and hidden image copyright labeling
-
Neos Marmaras, Greece, June
-
E. Koch and J. Zhao, "Toward robust and hidden image copyright labeling," in Proc. IEEE Workshop Nonlinear Signal and Image Processing, Neos Marmaras, Greece, June 1995, pp. 452-455.
-
(1995)
Proc. IEEE Workshop Nonlinear Signal and Image Processing
, pp. 452-455
-
-
Koch, E.1
Zhao, J.2
-
78
-
-
0030205766
-
Watermarking digital images for copyright protection
-
J. J. K. O'Ruanaidh, W. J. Dowling, and F. M. Boland, "Watermarking digital images for copyright protection," Proc. Inst. Elect. Eng. Vision, Signal and Image Processing, vol. 143, no. 4, pp. 250-256, Aug. 1996.
-
(1996)
Proc. Inst. Elect. Eng. Vision, Signal and Image Processing
, vol.143
, Issue.4
, pp. 250-256
-
-
O'Ruanaidh, J.J.K.1
Dowling, W.J.2
Boland, F.M.3
-
79
-
-
0030407057
-
Transparent robust image watermarking
-
M. D. Swanson, B. Zhu, and A. H. Tewfik, "Transparent robust image watermarking," in Proc. IEEE Int. Conf. Image Processing, vol. III, 1996, pp. 211-214.
-
(1996)
Proc. IEEE Int. Conf. Image Processing, Vol. III
, pp. 211-214
-
-
Swanson, M.D.1
Zhu, B.2
Tewfik, A.H.3
-
80
-
-
0031381355
-
A robust digital image watermarking method using wavelet-based fusion,' in
-
D. Kundur and D. Hatzinakos, "A robust digital image watermarking method using wavelet-based fusion,' in Proc. IEEE Int. Conf. Image Processing, Santa Barbara, CA, Oct. 1997, pp. 544-547.
-
(1997)
Proc. IEEE Int. Conf. Image Processing, Santa Barbara, CA, Oct.
, pp. 544-547
-
-
Kundur, D.1
Hatzinakos, D.2
-
81
-
-
0032074148
-
Rotation, scale and translation invariant spread spectrum digital image watermarking
-
J. J. K. O'Ruanaidh and T. Pun, "Rotation, scale and translation invariant spread spectrum digital image watermarking," Signal Processing, vol. 66, no. 3, pp. 303-317, May 1998.
-
(1998)
Signal Processing
, vol.66
, Issue.3
, pp. 303-317
-
-
O'Ruanaidh, J.J.K.1
Pun, T.2
-
82
-
-
84955119830
-
Echo hiding
-
R. J. Anderson, Ed. Berlin, Germany: Springer-Verlag
-
D. Gruhl, W. Bender, and A. Lu, "Echo hiding," in Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science), vol. 1174, R. J. Anderson, Ed. Berlin, Germany: Springer-Verlag, 1996, pp. 295-315.
-
(1996)
Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science)
, vol.1174
, pp. 295-315
-
-
Gruhl, D.1
Bender, W.2
Lu, A.3
-
83
-
-
0002161311
-
The quefrency alanysis of time series for echoes: Cepstrum, pseudoautocovariance, cross-cepstrum and saphe cracking
-
M. Rosenblatt, Ed. New York: Wiley
-
B. P. Bogert, M. J. R. Healy, and J. W, Tukey, "The quefrency alanysis of time series for echoes: Cepstrum, pseudoautocovariance, cross-cepstrum and saphe cracking," in Symp. Time Series Analysis, M. Rosenblatt, Ed. New York: Wiley, 1963, pp. 209-243.
-
(1963)
Symp. Time Series Analysis
, pp. 209-243
-
-
Bogert, B.P.1
Healy, M.J.R.2
Tukey, J.W.3
-
85
-
-
21844476708
-
Information hiding to foil the casual counterfeiter
-
D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag
-
D. Gruhl and W. Bender, "Information hiding to foil the casual counterfeiter," in Information Hiding: Second Int. Workshop (Lecture Notes in Computer Science), vol. 1525, D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag, 1998, pp. 1-15.
-
(1998)
Information Hiding: Second Int. Workshop (Lecture Notes in Computer Science)
, vol.1525
, pp. 1-15
-
-
Gruhl, D.1
Bender, W.2
-
86
-
-
0029737178
-
Security design of valuable documents and products
-
San Jose, CA: IS&T and SPIE
-
R. L. van Renesse, "Security design of valuable documents and products," in Optical Security and Counterfeit Deterrence Techniques, vol. 2659. San Jose, CA: IS&T and SPIE, 1996, pp. 10-20.
-
(1996)
Optical Security and Counterfeit Deterrence Techniques
, vol.2659
, pp. 10-20
-
-
Van Renesse, R.L.1
-
90
-
-
0029772741
-
The new Dutch passport
-
R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE
-
D. van Lingen, "The new Dutch passport," in Optical Security and Counterfeit Deterrence Techniques, vol. 2659, R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE, 1996, pp. 67-73.
-
(1996)
Optical Security and Counterfeit Deterrence Techniques
, vol.2659
, pp. 67-73
-
-
Van Lingen, D.1
-
91
-
-
0029762580
-
Optically- And machine-detectable security elements
-
R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE
-
S. Spannenburg, "Optically- and machine-detectable security elements," in Optical Security and Counterfeit Deterrence Techniques, vol. 2659, R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE, 1996, pp. 76-96.
-
(1996)
Optical Security and Counterfeit Deterrence Techniques
, vol.2659
, pp. 76-96
-
-
Spannenburg, S.1
-
93
-
-
0032224344
-
Search for effective document security by 'inventioneering'
-
R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE
-
J. D. Brongers, "Search for effective document security by 'inventioneering'," in Optical Security and Counterfeit Deterrence Techniques 11, vol. 3314, R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE, 1998, pp. 29-38.
-
(1998)
Optical Security and Counterfeit Deterrence Techniques 11
, vol.3314
, pp. 29-38
-
-
Brongers, J.D.1
-
94
-
-
33744639170
-
Anti-counterfeit trials begin with watermark technology
-
"Anti-counterfeit trials begin with watermark technology," Financial Technol. Int. Bulletin, vol. 9, no. 2, pp. 6-7, Oct. 1993.
-
(1993)
Financial Technol. Int. Bulletin
, vol.9
, Issue.2
, pp. 6-7
-
-
-
95
-
-
33744588045
-
Progress in counterfeit deterrence: The contribution of information exchange
-
R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE
-
I. M. Lancaster and L. T. Konntnik, "Progress in counterfeit deterrence: The contribution of information exchange," in Optical Security and Counterfeit Deterrence Techniques II, vol. 3314, R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE, 1998, pp. 2-8.
-
(1998)
Optical Security and Counterfeit Deterrence Techniques II
, vol.3314
, pp. 2-8
-
-
Lancaster, I.M.1
Konntnik, L.T.2
-
96
-
-
0011710159
-
Vulnerability assessment of security seals
-
R. Johnson and A. Garcia, "Vulnerability assessment of security seals," J. Security Administration, vol. 20, no. 1, pp. 15-27, June 1997.
-
(1997)
J. Security Administration
, vol.20
, Issue.1
, pp. 15-27
-
-
Johnson, R.1
Garcia, A.2
-
97
-
-
33744707221
-
A guide to understanding covert channel analysis of trusted systems, National Computer Security Center, Ft. George G. Meade, MD
-
Nov.
-
V. Gligor, "A guide to understanding covert channel analysis of trusted systems," National Computer Security Center, Ft. George G. Meade, MD, Tech. Rep. NCSC-TG-030, Nov. 1993.
-
(1993)
Tech. Rep. NCSC-TG-030
-
-
Gligor, V.1
-
98
-
-
0015672289
-
A note on the confinement problem
-
Oct.
-
B. Lampson, "A note on the confinement problem," Commun. ACM, vol. 16, no. 10, pp. 613-615, Oct. 1973.
-
(1973)
Commun. ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.1
-
99
-
-
0022218742
-
Electromagnetic radiation from video display units: An eavesdropping risk?
-
W. van Eck, "Electromagnetic radiation from video display units: an eavesdropping risk?," Comput. Security, vol. 4, no. 4, pp. 269-286, Dec. 1985.
-
(1985)
Comput. Security
, vol.4
, Issue.4
, pp. 269-286
-
-
Van Eck, W.1
-
101
-
-
84859015303
-
Soft tempest: Hidden data transmission using electromagnetic emanations
-
D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag
-
M. G. Kuhn and R. J. Anderson, "Soft tempest: Hidden data transmission using electromagnetic emanations," in Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science), vol. 1525, D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag, 1998, pp. 124-142.
-
(1998)
Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science)
, vol.1525
, pp. 124-142
-
-
Kuhn, M.G.1
Anderson, R.J.2
-
102
-
-
0007751316
-
Analysis of the sensitivity attack against electronic watermarks in images
-
D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag
-
J.-P. M. G. Linnartz and M. van Dijk, "Analysis of the sensitivity attack against electronic watermarks in images," in Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science), vol. 1525, D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag, 1998, pp. 258-272.
-
(1998)
Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science)
, vol.1525
, pp. 258-272
-
-
Linnartz, J.-P.M.G.1
Van Dijk, M.2
-
103
-
-
84947930048
-
Twin peaks: The histogram attack on fixed depth image watermarks
-
D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag
-
M. Maes, "Twin peaks: The histogram attack on fixed depth image watermarks," in Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science), vol. 1525, D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag, 1998, pp. 290-305.
-
(1998)
Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science)
, vol.1525
, pp. 290-305
-
-
Maes, M.1
-
104
-
-
84957877979
-
Attacks on copyright marking systems
-
D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Attacks on copyright marking systems," in Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science), vol. 1525, D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag, 1998, pp. 218-238.
-
(1998)
Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science)
, vol.1525
, pp. 218-238
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
105
-
-
77952728684
-
Removing spatial spread spectrum watermarks by nonlinear filtering 9th
-
Rhodes, Greece, Sept. 8-11
-
G. C. Langelaar, R. L. Lagendijk, and J. Biemond, "Removing spatial spread spectrum watermarks by nonlinear filtering," in 9th European Signal Processing Conference (EUSIPCO'98), Rhodes, Greece, Sept. 8-11 1998, pp. 2281-2284.
-
(1998)
European Signal Processing Conference (EUSIPCO'98)
, pp. 2281-2284
-
-
Langelaar, G.C.1
Lagendijk, R.L.2
Biemond, J.3
-
106
-
-
0032166643
-
Frequency mode LR attack operator for digitally watermarked images
-
Sept.
-
R. Barnett and D. E. Pearson, "Frequency mode LR attack operator for digitally watermarked images," Electron. Lett., vol. 34, no. 19, pp. 1837-1839, Sept. 1998.
-
(1998)
Electron. Lett.
, vol.34
, Issue.19
, pp. 1837-1839
-
-
Barnett, R.1
Pearson, D.E.2
-
107
-
-
0032653659
-
Watermarking resisting to translation, rotation, and scaling
-
Boston, MA, Nov.
-
M. Kutter, "Watermarking resisting to translation, rotation, and scaling," in Proc. SPIE Multimedia Systems and Applications, vol. 3528, Boston, MA, Nov. 1998, pp. 423-431.
-
(1998)
Proc. SPIE Multimedia Systems and Applications
, vol.3528
, pp. 423-431
-
-
Kutter, M.1
-
108
-
-
0033601691
-
A fair benchmark for image watermarking systems
-
San Jose, CA: IS&T and SPIE, Jan. 25-27
-
M. Kutter and F. A. P. Petitcolas, "A fair benchmark for image watermarking systems," in 11th Int. Synip. Electronic Imaging, vol. 3657. San Jose, CA: IS&T and SPIE, Jan. 25-27, 1999.
-
(1999)
11th Int. Synip. Electronic Imaging
, vol.3657
-
-
Kutter, M.1
Petitcolas, F.A.P.2
-
109
-
-
84904224992
-
Steganalysis of images created using current steganography software
-
D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag
-
N. F. Johnson and S. Jajodia, "Steganalysis of images created using current steganography software," in Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science), vol. 1525, D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag, 1998, pp. 273-289.
-
(1998)
Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science)
, vol.1525
, pp. 273-289
-
-
Johnson, N.F.1
Jajodia, S.2
-
110
-
-
84947907875
-
Technical trials and legal tribulations
-
S. Craver, B.-L. Yeo, and M. Yeung, "Technical trials and legal tribulations," Commun. ACM, vol. 41, no. 7, pp. 44-54, July 1998.
-
(1998)
Commun. ACM
, vol.41
, Issue.7
, pp. 44-54
-
-
Craver, S.1
Yeo, B.-L.2
Yeung, M.3
-
111
-
-
0030647764
-
Time-scale modification of audio signals with combined harmonic and wavelet representations
-
Munich, Germany
-
K. N. Hamdy, A. H. Tewfik, T. Chen, and S. Takagi, "Time-scale modification of audio signals with combined harmonic and wavelet representations," in Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP'97), vol. 1, Munich, Germany, pp. 439-442.
-
Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP'97)
, vol.1
, pp. 439-442
-
-
Hamdy, K.N.1
Tewfik, A.H.2
Chen, T.3
Takagi, S.4
-
112
-
-
0031237840
-
Quadratic interpolation for image resampling
-
Sept.
-
N. A. Dodgson, "Quadratic interpolation for image resampling," IEEE Trans. Image Processing, vol. 6, pp. 1322-1326, Sept. 1997.
-
(1997)
IEEE Trans. Image Processing
, vol.6
, pp. 1322-1326
-
-
Dodgson, N.A.1
-
113
-
-
0032223846
-
Results of attacks on a claimed robust digital image watermark
-
R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE
-
G. W. Braudaway, "Results of attacks on a claimed robust digital image watermark," in Optical Security and Counterfeit Deterrence Techniques II, vol. 3314, R. L. van Renesse, Ed. San Jose, CA: IS&T and SPIE, 1998.
-
(1998)
Optical Security and Counterfeit Deterrence Techniques II
, vol.3314
-
-
Braudaway, G.W.1
-
114
-
-
0003513556
-
-
Int. ed. Englewood Cliffs, NJ: Prentice-Hall, ch. 12
-
A. V. Oppenheim and R. W. Schafer, Discrete-Time Signal Processing, Int. ed. Englewood Cliffs, NJ: Prentice-Hall, 1989, ch. 12, pp. 768-834.
-
(1989)
Discrete-Time Signal Processing
, pp. 768-834
-
-
Oppenheim, A.V.1
Schafer, R.W.2
-
115
-
-
85042246467
-
Echo removal by discrete generalized linear filtering, Massachusetts Inst. Technol., Cambridge, MA
-
Feb.
-
R. W. Schafer, "Echo removal by discrete generalized linear filtering," Massachusetts Inst. Technol., Cambridge, MA, Tech. Rep. 466, Feb. 1969.
-
(1969)
Tech. Rep. 466
-
-
Schafer, R.W.1
-
116
-
-
84978940128
-
Can invisible watermark resolve rightful ownerships?
-
I. K. Sethin and R. C. Jain, Eds. San Jose, CA: IS&T and SPIE
-
S. Craver, N. Memon, B.-L. Yeo, and M. M. Yeung, "Can invisible watermark resolve rightful ownerships?," in Storage and Retrieval for Image and Video Database V, vol. 3022, I. K. Sethin and R. C. Jain, Eds. San Jose, CA: IS&T and SPIE, 1997, pp. 310-321.
-
(1997)
Storage and Retrieval for Image and Video Database V
, vol.3022
, pp. 310-321
-
-
Craver, S.1
Memon, N.2
Yeo, B.-L.3
Yeung, M.M.4
-
117
-
-
0032074580
-
Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
-
"Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications," IEEE J. Select. Areas Commun., vol. 16, pp. 573-586, May 1998.
-
(1998)
IEEE J. Select. Areas Commun.
, vol.16
, pp. 573-586
-
-
-
118
-
-
84955621400
-
Tamper resistant software: An implementation
-
R. J. Anderson, Ed. Berlin, Germany: Springer-Verlag
-
D. Aucsmith, "Tamper resistant software: An implementation," in Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science), vol. 1174, R. J. Anderson, Ed. Berlin, Germany: Springer-Verlag, 1996, pp. 317-333.
-
(1996)
Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science)
, vol.1174
, pp. 317-333
-
-
Aucsmith, D.1
-
119
-
-
84955563192
-
Stretching the limits of steganography
-
R. J. Anderson, Ed. Berlin, Germany: Springer-Verlag
-
R. J. Anderson, "Stretching the limits of steganography," in Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science), vol. 1174, R. J. Anderson, Ed. Berlin, Germany: Springer-Verlag, 1996, pp. 39-48.
-
(1996)
Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science)
, vol.1174
, pp. 39-48
-
-
Anderson, R.J.1
-
120
-
-
0031335088
-
Fast public-key watermarking of compressed video
-
Santa Barbara, CA, Oct.
-
F. Hartung and B. Girod, "Fast public-key watermarking of compressed video," in Proc. IEEE Int. Conf. Image Processing (ICIP'97), vol. I, Santa Barbara, CA, Oct. 1997, pp. 528-531.
-
(1997)
Proc. IEEE Int. Conf. Image Processing (ICIP'97)
, vol.1
, pp. 528-531
-
-
Hartung, F.1
Girod, B.2
-
121
-
-
0003302360
-
Public watermarks and resistance to tampering
-
Santa Barbara, CA, Oct. 26-29
-
I. J. Cox and J.-P. M. G. Linnartz, "Public watermarks and resistance to tampering," in Proc. IEEE Int. Conf. Image Processing (ICIP'97), Santa Barbara, CA, Oct. 26-29, 1997.
-
(1997)
Proc. IEEE Int. Conf. Image Processing (ICIP'97)
-
-
Cox, I.J.1
Linnartz, J.-P.M.G.2
-
122
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
124
-
-
0001217738
-
The prisoners' problem and the subliminal channel
-
Santa Barbara, CA
-
"The prisoners' problem and the subliminal channel," in Proc. IEEE Workshop Communications Security CRYPTO'83, Santa Barbara, CA, 1983, pp. 51-67.
-
(1983)
Proc. IEEE Workshop Communications Security CRYPTO'83
, pp. 51-67
-
-
-
125
-
-
0032075057
-
The history of subliminal channels
-
May
-
"The history of subliminal channels," IEEE J. Select. Areas Commun., vol. 16, pp. 452-462, May 1998.
-
(1998)
IEEE J. Select. Areas Commun.
, vol.16
, pp. 452-462
-
-
-
126
-
-
84955579478
-
The Newton channel
-
R. J. Anderson, Ed. Berlin, Germany: Springer-Verlag
-
R. Anderson, S. Vaudenay, B. Preneel, and K. Nyberg, "The Newton channel," in Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science), vol. 1174, R. J. Anderson, Ed. Berlin, Germany: Springer-Verlag, 1996, pp. 151-156.
-
(1996)
Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science)
, vol.1174
, pp. 151-156
-
-
Anderson, R.1
Vaudenay, S.2
Preneel, B.3
Nyberg, K.4
-
127
-
-
0028463501
-
Subliminal channels: Past and present
-
July/Aug.
-
"Subliminal channels: Past and present," Europ. Trans. Telecommun., vol. 5, no. 4, pp. 459-473, July/Aug. 1994.
-
(1994)
Europ. Trans. Telecommun.
, vol.5
, Issue.4
, pp. 459-473
-
-
-
128
-
-
0032073886
-
Results concerning the bandwidth of subliminal channels
-
May
-
"Results concerning the bandwidth of subliminal channels," IEEE J. Select. Areas Commun., vol. 16, pp. 463-473, May 1998.
-
(1998)
IEEE J. Select. Areas Commun.
, vol.16
, pp. 463-473
-
-
-
130
-
-
14244254664
-
On public-key steganography in the presence of an active warden
-
IBM Res. Division, T. J. Watson Res. Center, Yorktown Heights, NY, July
-
S. Craver, "On public-key steganography in the presence of an active warden," IBM Res. Division, T. J. Watson Res. Center, Yorktown Heights, NY, Tech. Rep. RC20931, July 1997.
-
(1997)
Tech. Rep. RC20931
-
-
Craver, S.1
-
131
-
-
84957886335
-
Modeling the security of steganographic systems
-
D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag
-
J. Zöllner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, "Modeling the security of steganographic systems," in Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science), vol. 1525, D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag, 1998, pp. 344-354.
-
(1998)
Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science)
, vol.1525
, pp. 344-354
-
-
Zöllner, J.1
Federrath, H.2
Klimant, H.3
Pfitzmann, A.4
Piotraschke, R.5
Westfeld, A.6
Wicke, G.7
Wolf, G.8
-
132
-
-
0028566761
-
Covert channels - Here to stay?
-
I. Moskowitz and M. Kang, "Covert channels - Here to stay?," in Compass'94, 1994, pp. 235-243.
-
(1994)
Compass'
, vol.94
, pp. 235-243
-
-
Moskowitz, I.1
Kang, M.2
-
133
-
-
33744582938
-
-
Mar.. Hide and seek. [Online]. Available WWW
-
C. Maroney. (1997, Mar.). Hide and seek. [Online]. Available WWW: http://www.cypher.net/products/hideseek.html.
-
(1997)
-
-
Maroney, C.1
-
134
-
-
33744595250
-
-
(1997, Mar.). Stegodos. [Online]. Available WWW: ftp://ftp.funet.fi/pub/crypt/steganography/stegodos.zip.
-
-
-
-
135
-
-
84955601215
-
Computer based steganography: How it works and why therefore any restriction on cryptography are nonsense, at best
-
R. J. Anderson, Ed. Berlin, Germany: Springer-Verlag
-
E. Franz, A. Jerichow, S. Möller, A. Pfitzmann, and I. Stierand, "Computer based steganography: How it works and why therefore any restriction on cryptography are nonsense, at best," in Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science), vol. 1174, R. J. Anderson, Ed. Berlin, Germany: Springer-Verlag, 1996, pp. 7-21.
-
(1996)
Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science)
, vol.1174
, pp. 7-21
-
-
Franz, E.1
Jerichow, A.2
Möller, S.3
Pfitzmann, A.4
Stierand, I.5
-
137
-
-
84936892450
-
Cryptology for digital TV broadcasting
-
June
-
B. M. Macq and J.-J. Quisquater, "Cryptology for digital TV broadcasting," Proc. IEEE, vol. 83, pp. 944-956, June 1995.
-
(1995)
Proc. IEEE
, vol.83
, pp. 944-956
-
-
Macq, B.M.1
Quisquater, J.-J.2
-
138
-
-
0342492669
-
Comparing robustness of watermarking techniques
-
San Jose, CA: IS&T and SPIE
-
J. Fridrich and M. Goljan, "Comparing robustness of watermarking techniques," in 11th Int. Symp. Electronic Imaging, vol. 3657. San Jose, CA: IS&T and SPIE, 1999.
-
(1999)
11th Int. Symp. Electronic Imaging
, vol.3657
-
-
Fridrich, J.1
Goljan, M.2
-
139
-
-
33744557609
-
Request for proposals - Embedded signalling systems
-
London, U.K., June
-
Int. Federation of the Phonographic Industry, "Request for proposals - Embedded signalling systems," Int. Federation of the Phonographic Industry, London, U.K., June 1997.
-
(1997)
Int. Federation of the Phonographic Industry
-
-
-
141
-
-
33744572314
-
ICE (Identification Coding, Embedded)
-
Berlin, Germany, Mar. 16-19, Preprint 3516 (D2-3).
-
R. Willard, "ICE (Identification Coding, Embedded)," in 74th Conv. Audio Engineering Society Preprints, Berlin, Germany, Mar. 16-19, 1993, Preprint 3516 (D2-3).
-
(1993)
74th Conv. Audio Engineering Society Preprints
-
-
Willard, R.1
-
142
-
-
0001600507
-
-
W. Niblack and R. C. Jain, Eds., San Jose, CA: IS&T and SPIE
-
W. Niblack and R. C. Jain, Eds., Storage and Retrieval for Image and Video Database III, vol. 2420. San Jose, CA: IS&T and SPIE, 1995.
-
(1995)
Storage and Retrieval for Image and Video Database III
, vol.2420
-
-
-
143
-
-
1542377734
-
-
B. E. Rogowitz and T. N. Pappas, Eds., San Jose, CA: IS&T and SPIE
-
B. E. Rogowitz and T. N. Pappas, Eds., Human Vision and Electronic Imaging II, vol. 3016. San Jose, CA: IS&T and SPIE, 1997.
-
(1997)
Human Vision and Electronic Imaging II
, vol.3016
-
-
-
145
-
-
33744638483
-
-
M. Lomas, B. Crispo, B. Christianson, and M. Roe, Eds., Berlin, Germany: Springer-Verlag.
-
M. Lomas, B. Crispo, B. Christianson, and M. Roe, Eds., Security Protocols: Proc. 5th Int. Workshop (Lecture Notes in Computer Science), vol. 1361. Berlin, Germany: Springer-Verlag.
-
Security Protocols: Proc. 5th Int. Workshop (Lecture Notes in Computer Science)
, vol.1361
-
-
-
147
-
-
33744684358
-
-
J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, Eds., Berlin, Germany: Springer-Verlag
-
J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, Eds., Computer Security - 5th Europ. Symp. Research in Computer Security, (ESORICS'98) (Lecture Notes in Computer Science), vol. 1485. Berlin, Germany: Springer-Verlag, 1998.
-
(1998)
Computer Security - 5th Europ. Symp. Research in Computer Security, (ESORICS'98) (Lecture Notes in Computer Science)
, vol.1485
-
-
-
148
-
-
33744645635
-
-
J. Dittmann, P. Wohlmacher, P. Horster, and R. Steinmetz, Eds., Bristol, U.K.: ACM, GMD - Forschungszentrum Informationstechnik GmbH
-
J. Dittmann, P. Wohlmacher, P. Horster, and R. Steinmetz, Eds., Multimedia and Security - Workshop at ACM Multimedia'98 (GMD Report), vol. 41. Bristol, U.K.: ACM, GMD - Forschungszentrum Informationstechnik GmbH, 1998.
-
(1998)
Multimedia and Security - Workshop at ACM Multimedia'98 (GMD Report)
, vol.41
-
-
-
150
-
-
33744639169
-
-
I. K. Sethin and R. C. Jain, Eds., San Jose, CA: IS&T and SPIE
-
I. K. Sethin and R. C. Jain, Eds., Storage and Retrieval for Image and Video Database V, vol. 3022. San Jose, CA: IS&T and SPIE, 1997.
-
(1997)
Storage and Retrieval for Image and Video Database V
, vol.3022
-
-
-
151
-
-
0003815918
-
-
corrected reissue. Oxford, U.K.: Clarendon
-
The Oxford English Dictionary (corrected reissue). Oxford, U.K.: Clarendon, 1933.
-
(1933)
The Oxford English Dictionary
-
-
|