-
1
-
-
0033319097
-
Signature-based image identification
-
Boston
-
M. Abdel-Mottaleb, G. Vaithilingam, and S. Krishnamachari, "Signature-Based Image Identification", in Proceedings of SPIE 3845, Multimedia Systems and Applications II, pp. 22-28, Boston, 1999.
-
(1999)
Proceedings of SPIE 3845, Multimedia Systems and Applications II
, pp. 22-28
-
-
Abdel-Mottaleb, M.1
Vaithilingam, G.2
Krishnamachari, S.3
-
2
-
-
0010813194
-
-
ACNielsen, http://www.acnielsen.com
-
-
-
-
3
-
-
0010812880
-
AudioID: Towards content-based identification of audio material
-
E. Allamanche, J. Herre, O. Helmuth, B. Fröba and M. Cremer, "AudioID: Towards Content-Based Identification Of Audio Material", in Proceedings of the 110th Audio Engineering Society, Amsterdam, The Netherlands, May 2000.
-
Proceedings of the 110th Audio Engineering Society, Amsterdam, The Netherlands, May 2000.
-
-
Allamanche, E.1
Herre, J.2
Helmuth, O.3
Fröba, B.4
Cremer, M.5
-
4
-
-
0010891349
-
-
AudibleMagic, http:\\www.audiblemagic.com
-
-
-
-
5
-
-
0010930842
-
-
Arbitron, http://www.arbitron.com
-
-
-
-
6
-
-
0010812881
-
-
BDSOnline, http://www.bdsonline.com
-
-
-
-
7
-
-
0029464112
-
Techniques for data hiding
-
W. Bender, D. Gruhl, and N. Morimoto, "Techniques for Data Hiding", in Proceedings of the SPIE 2420, Storage and Retrieval for Image and Video Databases III, 1995, pp. 164-173.
-
Proceedings of the SPIE 2420, Storage and Retrieval for Image and Video Databases III, 1995
, pp. 164-173
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
-
8
-
-
0010876148
-
Method and article of manufacture for content-based analysis, storage, retrieval, and segmentation of audio information
-
July
-
Blum et al.., Patent US 5918223 "Method And Article Of Manufacture For Content-Based Analysis, Storage, Retrieval, And Segmentation Of Audio Information", July 1997.
-
(1997)
Patent US 5918223
-
-
Blum1
-
9
-
-
0010939716
-
-
Cantametrix, http://www.cantametrix.com
-
-
-
-
10
-
-
0031362116
-
Secure spread spectrum watermaking for multimedia
-
Dec.
-
I. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermaking for multimedia", IEEE Transactions on Image Processing, vol. 6, no. 12, p. 1673-87, Dec. 1997.
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
11
-
-
0032650557
-
Content-based digital signature for motion pictures authentication and content-fragile watermarking
-
Florence
-
J. Dittmann, A. Steintmetz, and R. Steinmetz, "Content-Based Digital Signature For Motion Pictures Authentication And Content-Fragile Watermarking", in Proceedings International Conference on Multimedia Computing and Systems, vol. 2, pp. 209-213, Florence, 1999.
-
(1999)
Proceedings International Conference on Multimedia Computing and Systems
, vol.2
, pp. 209-213
-
-
Dittmann, J.1
Steintmetz, A.2
Steinmetz, R.3
-
12
-
-
0010808271
-
Finding similar types of music. Based on extracting features and dividing this feature space in different regions by using human internation and neural networks
-
September
-
Dhillon et al., Patent Application WO0120483, "Finding Similar Types of Music. Based On Extracting Features And Dividing This Feature Space In Different Regions By Using Human Internation And Neural Networks", September 1999.
-
(1999)
Patent Application WO0120483
-
-
Dhillon1
-
13
-
-
0010817950
-
-
DVD-CCA, http://www.dvdcca.org/video.html
-
-
-
-
14
-
-
0010938209
-
Method and apparatus for producing a signature characterizing an interval of a video signal while compensating for picture edge shift
-
November
-
Ellis et al., Patent US5572246, "Method And Apparatus For Producing A Signature Characterizing An Interval Of A Video Signal While Compensating For Picture Edge Shift", November 1995.
-
(1995)
Patent US5572246
-
-
Ellis1
-
15
-
-
0033701079
-
Countermeasures for unintentional and intentional video watermarking attacks
-
January
-
F. Deguillame, G. Csurka, and G. Csurka, and T. Pun, "Countermeasures for Unintentional and Intentional Video Watermarking Attacks", in Proceedings of SPIE 3971, Security and Watermarking of Multimedia Content II, vol. 3971, pp. 346 - 357, January 2000.
-
(2000)
Proceedings of SPIE 3971, Security and Watermarking of Multimedia Content II
, vol.3971
, pp. 346-357
-
-
Deguillame, F.1
Csurka, G.2
Csurka, G.3
Pun, T.4
-
16
-
-
0035305446
-
On the automated recognition of seriously distorted musical recordings
-
April
-
D. Fragoulis, G. Rousopoulos, T. Panagopoulos, C. Alexiou, and C. Papaodysseus, "On the Automated Recognition of Seriously Distorted Musical Recordings", IEEE Transactions on Signal Processing, vol.49, no.4, p.898-908, April 2001.
-
(2001)
IEEE Transactions on Signal Processing
, vol.49
, Issue.4
, pp. 898-908
-
-
Fragoulis, D.1
Rousopoulos, G.2
Panagopoulos, T.3
Alexiou, C.4
Papaodysseus, C.5
-
17
-
-
0032667318
-
Robust bit extraction from images
-
Florence
-
J. Fridrich, "Robust Bit Extraction From Images", in Proceedings IEEE ICMCS 99, vol. 2, pp. 536-540, Florence, 1999
-
(1999)
Proceedings IEEE ICMCS 99
, vol.2
, pp. 536-540
-
-
Fridrich, J.1
-
18
-
-
84962762130
-
Robust hash functions for digital watermarking
-
Las Vegas, March
-
J. Fridrich and M. Goljan, "Robust Hash Functions For Digital Watermarking", in Proceedings ITCC 2000, pp. 178-183, Las Vegas, March 2000.
-
(2000)
Proceedings ITCC 2000
, pp. 178-183
-
-
Fridrich, J.1
Goljan, M.2
-
20
-
-
4244079877
-
Generaal requirements and interoperability
-
Imprimatur Report on the Watermarking Technology for Copyright Protection, IMP/14062/A
-
"Generaal Requirements and Interoperability", Imprimatur Report on the Watermarking Technology for Copyright Protection, IMP/14062/A, 1998.
-
(1998)
-
-
-
21
-
-
0010932048
-
Method and apparatus for the automatic identification and verification of commercial broadcast programs
-
March
-
Greenberg, Patent US4547804 "Method And Apparatus For The Automatic Identification And Verification Of Commercial Broadcast Programs", March 1983.
-
(1983)
Patent US4547804
-
-
Greenberg1
-
22
-
-
0038764835
-
Robust audio Hashing for content identification
-
(accepted).
-
J. Haitsma, T. Kalker, and J. Oostveen, "Robust Audio Hashing For Content Identification", in Proceedings of the International Workshop on Content-Based Multimedia Indexing, Brescia, Italy, 2001 (accepted).
-
Proceedings of the International Workshop on Content-Based Multimedia Indexing, Brescia, Italy, 2001
-
-
Haitsma, J.1
Kalker, T.2
Oostveen, J.3
-
24
-
-
4243352840
-
Call for information on fingerprinting technology
-
IFPI
-
IFPI, "Call For Information On Fingerprinting Technology", http://www.ifpi.org/press/20010615.html
-
-
-
-
25
-
-
0033601661
-
A video watermarking system for broadcast monitoring
-
T. Kalker, G. Depovere, J. Haitsman and M. Maes, "A Video Watermarking System for Broadcast Monitoring", in Proceedings of the SPIE 3657, Security and Watermarking of Multimedia Content, vol. 3657, p. 103-12, 1999.
-
(1999)
Proceedings of the SPIE 3657, Security and Watermarking of Multimedia Content
, vol.3657
, pp. 103-112
-
-
Kalker, T.1
Depovere, G.2
Haitsman, J.3
Maes, M.4
-
26
-
-
0033701078
-
Watermark copy attack
-
January
-
M. Kutter, S. Voloshynovskiy and A. Herrigel, "Watermark Copy Attack", in Proceedings of SPIE 3971, Security and Watermarking of Multimedia Content II, vol. 3971, pp. 371-380, January 2000.
-
(2000)
Proceedings of SPIE 3971, Security and Watermarking of Multimedia Content II
, vol.3971
, pp. 371-380
-
-
Kutter, M.1
Voloshynovskiy, S.2
Herrigel, A.3
-
27
-
-
0010879186
-
A tool for robust audio information hiding: A perceptual audio hashing algorithm
-
M. Kivanc Mihcak and R. Venkatesan, "A Tool for Robust Audio Information Hiding: A Perceptual Audio Hashing Algorithm", in Proceedings of the Information Hiding Workshop 2001, Pittsburgh, USA, 2001.
-
Proceedings of the Information Hiding Workshop 2001, Pittsburgh, USA, 2001.
-
-
Mihcak M., K.1
Venkatesan, R.2
-
31
-
-
0003039773
-
Applying signatures on digital images
-
October
-
I. Pitas and T. Kaskalis, "Applying Signatures on Digital Images", in IEEE Workshop on Nonlinear Signal Processing, Thessaloniki, Greece, pp. 460-463, October 1995.
-
(1995)
IEEE Workshop on Nonlinear Signal Processing, Thessaloniki, Greece
, pp. 460-463
-
-
Pitas, I.1
Kaskalis, T.2
-
32
-
-
26144475176
-
Recognition and analysis of audio
-
RAA
-
RAA, "Recognition and Analysis of Audio", http://raa.joanneum.ac.at
-
-
-
-
33
-
-
0010939132
-
-
Relatable
-
Relatable, http://www.relatable.com
-
-
-
-
34
-
-
0030409375
-
A robust content based digital signature for image authentication
-
Laussane, September
-
M. Schneider, S.-F. Chang, "A Robust Content Based Digital Signature For Image Authentication", in Proceedings of IEEE ICIP 1996, vol.3,pp.227-230, Laussane, September 1996.
-
(1996)
Proceedings of IEEE ICIP 1996
, vol.3
, pp. 227-230
-
-
Schneider, M.1
Chang, S.-F.2
-
35
-
-
0010815397
-
-
SDMI http://www.sdmi.org
-
-
-
-
36
-
-
0010809132
-
-
Shazam, http://www.shazamentertainment.com
-
-
-
-
37
-
-
0010878515
-
DeSDMI
-
J. Stern, "DeSDMI", http://www.julienstern.org/sdmi
-
-
-
Stern, J.1
-
38
-
-
0032069486
-
Robust audio watermarking using perceptual masking
-
M. D. Swanson, B. Zhu, A.H. Tewfik and L. Boney, "Robust Audio Watermarking using Perceptual Masking", Signal Processing, Vol. 66, pp. 337-355, 1998.
-
(1998)
Signal Processing
, vol.66
, pp. 337-355
-
-
Swanson, M.D.1
Zhu, B.2
Tewfik, A.H.3
Boney, L.4
-
39
-
-
0034444578
-
Robust image hashing
-
Vancouver, September
-
R. Venkatesan, S.-M. Koon, M. Jakubowski and P. Moulin, "Robust Image hashing", in Proceedings of IEEE ICIP 2000, vol. 3, pp. 664-666, Vancouver, September 2000.
-
(2000)
Proceedings of IEEE ICIP 2000
, vol.3
, pp. 664-666
-
-
Venkatesan, R.1
Koon, S.-M.2
Jakubowski, M.3
Moulin, P.4
-
40
-
-
0010810166
-
Image hashing
-
R. Venkatesan and M. Jakuboswki, "Image Hashing", in Proceedings of DIMACS Conference on Intellectual Property Protection, Piscataway, NJ, USA, 2000.
-
Proceedings of DIMACS Conference on Intellectual Property Protection, Piscataway, NJ, USA, 2000.
-
-
Venkatesan, R.1
Jakubowski, M.2
-
41
-
-
0035369792
-
Attack modeling: Towards a second generation benchmark
-
June
-
S. Voloshynovskiy, S. Pereira, V. Iquise and T. Pun, "Attack modeling: Towards a Second Generation Benchmark", Signal Processing, Special Issue: Information Theoretic Issues in Digital Watermarking, vol. 81, no. 6, pp. 1177-1214, June 2001.
-
(2001)
Signal Processing, Special Issue: Information Theoretic Issues in Digital Watermarking
, vol.81
, Issue.6
, pp. 1177-1214
-
-
Voloshynovskiy, S.1
Pereira, S.2
Iquise, V.3
Pun, T.4
-
42
-
-
84905827819
-
A signature for content-based image retrieval using a geometrical transform
-
Bristol, UK
-
H. Wang, F. Guo, D. Feng and J. Jin, "A Signature for Content-Based Image Retrieval using a Geometrical Transform", in Proceedings of the Multimedia and Security Workshop at ACM Multimedia, pp. 229-234, Bristol, UK, 1998.
-
(1998)
Proceedings of the Multimedia and Security Workshop at ACM Multimedia
, pp. 229-234
-
-
Wang, H.1
Guo, F.2
Feng, D.3
Jin, J.4
|