-
1
-
-
0033718747
-
Robust watermarking based on the warping of pre-defined triangular patterns
-
P. Bas, J-M. Chassery and B. Macq, "Robust Watermarking Based on the Warping of Pre-Defined Triangular Patterns", in Proceedings of SPIE: Security and Watermarking of Multimedia contents II, 24-26 January 2000, San Jose, California, Vol. 3971, pp. 99-109, 2000.
-
(2000)
Proceedings of SPIE: Security and Watermarking of Multimedia Contents II, 24-26 January 2000, San Jose, California
, vol.3971
, pp. 99-109
-
-
Bas, P.1
Chassery, J.-M.2
Macq, B.3
-
2
-
-
84995728783
-
Watermarking: The ticket concept
-
in Steinmetz, Ralf; Dittmann, Jana; Steinebach, Martin (Eds.):; Kluver, ISBN 0-7923-7365-0; April
-
S. Craver, S. Katzenbeisser: Watermarking: The Ticket Concept, in Steinmetz, Ralf; Dittmann, Jana; Steinebach, Martin (Eds.): Communications and Multimedia Security Issues of the New Century, Volume 192, Kluver, ISBN 0-7923-7365-0, pp. 53-65, April 2001
-
(2001)
Communications and Multimedia Security Issues of the New Century
, vol.192
, pp. 53-65
-
-
Craver, S.1
Katzenbeisser, S.2
-
3
-
-
0003557723
-
Protection of intellectual property of images by perceptual watermarking
-
PhD-Thesis at LABORATOIRE DE TELECOMMUNICATIONS ET TELEDETECTION, UCL, Belgium, September
-
J. F. Delaigle: Protection of Intellectual Property of Images by Perceptual Watermarking, PhD-Thesis at LABORATOIRE DE TELECOMMUNICATIONS ET TELEDETECTION, UCL, Belgium, September 2000
-
(2000)
-
-
Delaigle, J.F.1
-
4
-
-
0035767713
-
Advanced multimedia security solutions for data and owner authentication; Applications of digital image processing XXIV
-
29 July - 3 August 2001, San Diego, California, USA
-
Dittmann, J.; Steinebach, M.; Croce Ferri, L.; Mayerhöfer, A.; Vielhauer, C.: Advanced multimedia security solutions for data and owner authentication; Applications of Digital Image Processing XXIV, Proceedings of SPIE Vol. #4472, (2001), 29 July - 3 August 2001, San Diego, California, USA
-
(2001)
Proceedings of SPIE
, vol.4472
-
-
Dittmann, J.1
Steinebach, M.2
Croce Ferri, L.3
Mayerhöfer, A.4
Vielhauer, C.5
-
5
-
-
84961833529
-
Hologram watermarks for document authentications
-
Dittmann, J.; Croce Ferri, L.; Vielhauer, C.: Hologram Watermarks for Document Authentications; IEEE International Conference on Information Technology: Coding and Computing; IEEE Computer Society; Las Vegas, NV, USA, April 2-4, 2001; p.60-64.
-
IEEE International Conference on Information Technology: Coding and Computing; IEEE Computer Society; Las Vegas, NV, USA, April 2-4, 2001
, pp. 60-64
-
-
Dittmann, J.1
Croce Ferri, L.2
Vielhauer, C.3
-
6
-
-
0034516979
-
Approaches to multimedia and security
-
ISBN 0 - 7803 - 6536 - 4
-
Dittmann, Jana; Nahrstedt, Klara; Wohlmacher, Petra: Approaches to Multimedia and Security, in Proceedings of IEEE International Conference on Multimedia and Expo, 30 July - 2 August 2000, New York, USA, ISBN 0 - 7803 - 6536 - 4, pp. 1275 - 1278, 2000
-
(2000)
Proceedings of IEEE International Conference on Multimedia and Expo, 30 July - 2 August 2000, New York, USA
, pp. 1275-1278
-
-
Dittmann, J.1
Nahrstedt, K.2
Wohlmacher, P.3
-
7
-
-
0034769478
-
Content-fragile watermarking for image authentication
-
Dittman, Jana: Content-fragile Watermarking for Image Authentication, to appear in Proceedings of SPIE: Security and Watermarking of Multimedia Contents III, 21 - 26 January, San Jose, California, USA, vol. 4314, 2001
-
(2001)
Proceedings of SPIE: Security and Watermarking of Multimedia Contents III, 21 - 26 January, San Jose, California, USA
, vol.4314
-
-
Dittman, J.1
-
8
-
-
0033713854
-
Combined video and audio watermarking: Embedding content information in multimedia data, in
-
J. Dittmann, M. Steinebach, I. Rimac, S. Fischer, R. Steinmetz: Combined video and audio watermarking: Embedding content information in multimedia data, in, In Proc. of the SPIE Conference on Electronic Imaging '99, Security and Watermarking of Multimedia Contents II, 24-26 January 2000, San Jose USA, Proceedings of SPIE Vol. 3971, pp. 176-185, 2000
-
(2000)
Proc. of the SPIE Conference on Electronic Imaging '99, Security and Watermarking of Multimedia Contents II, 24-26 January 2000, San Jose USA, Proceedings of SPIE
, vol.3971
, pp. 176-185
-
-
Dittmann, J.1
Steinebach, M.2
Rimac, I.3
Fischer, S.4
Steinmetz, R.5
-
9
-
-
84962731896
-
Media-independent watermarking classification and the need for combining digital video and audio watermarking for media authentication
-
IEEE Computer Society, ISBN 0-7695-0540-6
-
J. Dittmann, A. Mukherjee, M. Steinebach, "Media-independent Watermarking Classification and the need for combining digital video and audio watermarking for media authentication", Proceedings of the International Conference on Information Technology: Coding and Computing, 27 - 29 March, Las Vegas, Nevada, USA, pp. 62-7, IEEE Computer Society, ISBN 0-7695-0540-6, 2000
-
(2000)
Proceedings of the International Conference on Information Technology: Coding and Computing, 27 - 29 March, Las Vegas, Nevada, USA
, pp. 62-67
-
-
Dittmann, J.1
Mukherjee, A.2
Steinebach, M.3
-
10
-
-
0003429885
-
-
Springer Verlag, ISBN 3-540-66661-3
-
Dittmann (2000). Digitale Wasserzeichen. Springer Verlag, ISBN 3-540-66661-3
-
(2000)
Digitale Wasserzeichen.
-
-
Dittmann1
-
11
-
-
0000753867
-
Content-based digital signature for motion pictures authentication and content-fragile watermarking
-
J. Dittmann, A Steinmetz, R. Steinmetz: Content-based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking, In Proc. of IEEE Multimedia Systems, Multimedia Computing and Systems, June 7-11, 1999, Florence, Italy, Volume 1, pp. 574-579, 1999
-
(1999)
Proc. of IEEE Multimedia Systems, Multimedia Computing and Systems, June 7-11, 1999, Florence, Italy
, vol.1
, pp. 574-579
-
-
Dittmann, J.1
Steinmetz, A.2
Steinmetz, R.3
-
12
-
-
38049186824
-
Asymmetric watermarking schemes
-
Springer Verlag, ISBN 3-540-67926-X
-
J.J. Eggers, J.K. Su, B. Girod: Asymmetric Watermarking Schemes, in Sicherheit in Netzen und Medienströmen, Tagungsband des GI-Workshops "Sicherheit in Mediendaten", Berlin, 19. September 2000, Springer Verlag, ISBN 3-540-67926-X, pp. 107 - 123, 2000
-
(2000)
Sicherheit in Netzen und Medienströmen, Tagungsband des GI-Workshops "Sicherheit in Mediendaten", Berlin, 19. September 2000
, pp. 107-123
-
-
Eggers, J.J.1
Su, J.K.2
Girod, B.3
-
13
-
-
0034765589
-
Invertible authentication
-
J. Fridrich, M. Goljan, R. Du, "Invertible authentication", to appear in Proceedings of SPIE: Security and Watermarking of Multimedia Contents III, 21 - 26 January, San Jose, California, USA, Vol. 4314, 2001.
-
(2001)
Proceedings of SPIE: Security and Watermarking of Multimedia Contents III, 21 - 26 January, San Jose, California, USA
, vol.4314
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
14
-
-
0002321371
-
Methods for tamper detection of digital images
-
in J. Dittmann, K. Nahrstedt, P. Wohlmacher (Eds.)
-
J. Fridrich: Methods for Tamper Detection of Digital Images, in J. Dittmann, K. Nahrstedt, P. Wohlmacher (Eds.), Multimedia and Security, Workshop at ACM Multimedia'99, Orlando, Florida, USA, Oct. 30 - Nov 5 1999, pp. 29-34, 1999
-
(1999)
Multimedia and Security, Workshop at ACM Multimedia'99, Orlando, Florida, USA, Oct. 30 - Nov 5 1999
, pp. 29-34
-
-
Fridrich, J.1
-
17
-
-
0010480845
-
Information technology - Open systems interconnection - The directory. Part 8: Authentication framework
-
ISO/IEC 9594-8
-
ISO/IEC 9594-8 ITU-T Recommendation X.509: Information technology - Open Systems Interconnection - The Directory. Part 8: Authentication Framework, 1993.
-
(1993)
-
-
-
18
-
-
0010892084
-
1991 information technology - security techniques - digital signature scheme giving message recovery
-
ISO/IEC 9796
-
ISO/IEC 9796: 1991 Information technology - Security techniques - Digital signature scheme giving message recovery.
-
-
-
-
19
-
-
0003765593
-
Information technology - security techniques - entity authentication. Part 1: General. Part 2: Mechanisms using encipherment algorithms. Part 3: Mechanisms using a public-key algorithm
-
ISO/IEC 9798
-
ISO/IEC 9798: Information technology - Security techniques - Entity authentication. Part 1: General. Part 2: Mechanisms using encipherment algorithms. Part 3: Mechanisms using a public-key algorithm.
-
-
-
-
20
-
-
0032304995
-
Towards a telltale watermarking technique for tamper proofing
-
D. Kundur and D. Hatzinakos: Towards a Telltale Watermarking Technique for Tamper Proofing, Proc. ICIP, Chicago, Illinois, Oct 4-7, 1998, vol 2.
-
Proc. ICIP, Chicago, Illinois, Oct 4-7, 1998
, vol.2
-
-
Kundur, D.1
Hatzinakos, D.2
-
21
-
-
85076090605
-
Robust labeling methods for copy protection of images
-
G.C. Langelaar, J.C.A. van der Lubbe, R.L. Langendijk, "Robust Labeling Methods for Copy Protection of Images", Proceedings of SPIE Electronic Imaging '97, Storage and Retrieval for Image and Video Databases V, February 1997, San Jose (CA), USA
-
Proceedings of SPIE Electronic Imaging '97, Storage and Retrieval for Image and Video Databases V, February 1997, San Jose (CA), USA
-
-
Langelaar, G.C.1
Van Der Lubbe, J.C.A.2
Langendijk, R.L.3
-
22
-
-
0000102050
-
A review of fragile image watermarks
-
in J. Dittmann, K. Nahrstedt, P. Wohlmacher (Eds.)
-
E. Lin, E. Delp: A review of fragile image watermarks, in J. Dittmann, K. Nahrstedt, P. Wohlmacher (Eds.), Multimedia and Security, Workshop at ACM Multimedia'99, Orlando, Florida, USA, Oct. 30 - Nov 5 1999, pp. 35-40, 1999
-
(1999)
Multimedia and Security, Workshop at ACM Multimedia'99, Orlando, Florida, USA, Oct. 30 - Nov 5 1999
, pp. 35-40
-
-
Lin, E.1
Delp, E.2
-
23
-
-
0003456805
-
A wavelet tour of signal processing. A short presentation by F. Chaplais
-
in: Academic Press, 1998
-
Mallat, Stephane (1998). A Wavelet Tour of Signal Processing. A Short Presentation by F. Chaplais. in: Academic Press, 1998. http://cas.ensmp.fr/%7Echaplais/Wavetour_presentation/Wavetour_presentation_US.h tml
-
(1998)
-
-
Mallat, S.1
-
24
-
-
84936893490
-
Vital signs of identity
-
February
-
B. Miller, Vital signs of identity. IEEE Spectrum, 31(2):22-30, February 1994
-
(1994)
IEEE Spectrum
, vol.31
, Issue.2
, pp. 22-30
-
-
Miller, B.1
-
25
-
-
0033601667
-
Content-based integrity protection of digital images
-
P. W. Wong, E. J. Delp, Eds.; San Jose, California, U.S.A., 25-27 Jan., The Society for Imaging Science and Technology (IS&T) and the International Society for Optical
-
M. P. Queluz: Content-based integrity protection of digital images, in Security and Watermarking of Multimedia Contents, P. W. Wong, E. J. Delp, Eds., vol. 3657, San Jose, California, U.S.A., 25-27 Jan., The Society for Imaging Science and Technology (IS&T) and the International Society for Optical Engineering (SPIE), SPIE. ISBN 0-8194-3128-1, ISSN 0277-786X, pp., 1999
-
(1999)
Security and Watermarking of Multimedia Contents
, vol.3657
-
-
Queluz, M.P.1
-
26
-
-
0030409375
-
A content-based approach to image signature generation and authentication
-
M. Schneider and S.F. Chang: A Content-Based Approach to Image Signature Generation and Authentication, Proc. ICIP '96 vol. III, pp. 227-230, 1996.
-
(1996)
Proc. ICIP '96
, vol.3
, pp. 227-230
-
-
Schneider, M.1
Chang, S.F.2
-
27
-
-
0034780035
-
Approaches to biometric watermarks for owner authentication
-
Claus Vielhauer, Ralf Steinmetz: "Approaches to biometric watermarks for owner authentication", to appear in Proceedings of SPIE: Security and Watermarking of Multimedia Contents III, 21 - 26 January, San Jose, California, USA, Vol. 4314, 2001
-
(2001)
Proceedings of SPIE: Security and Watermarking of Multimedia Contents III, 21 - 26 January, San Jose, California, USA
, vol.4314
-
-
Vielhauer, C.1
Steinmetz, R.2
|