-
1
-
-
0032072279
-
Image adaptive watermarking using visual models
-
May
-
C.I. Podilchuk and W. Zeng, "Image adaptive watermarking using visual models," IEEE Journal on Selected Areas in Communications 16, no. 4, pp. 525-539, May 1998.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 525-539
-
-
Podilchuk, C.I.1
Zeng, W.2
-
2
-
-
0033601681
-
Dither modulation: A new approach to digital watermarking and information embedding
-
San Jose CA, Jan.
-
B. Chen and G.W. Wornell, "Dither modulation: A new approach to digital watermarking and information embedding," in Proc. SPIE: Security and Watermarking of Multimedia Contents, vol. 3657, pp. 342-353, San Jose CA, Jan. 1999.
-
(1999)
Proc. SPIE: Security and Watermarking of Multimedia Contents
, vol.3657
, pp. 342-353
-
-
Chen, B.1
Wornell, G.W.2
-
3
-
-
0032072064
-
Watermarking of uncompressed and compressed video
-
F. Hartung and B. Girod, "Watermarking of uncompressed and compressed video," Signal Processing 66, pp. 283-301, 1998.
-
(1998)
Signal Processing
, vol.66
, pp. 283-301
-
-
Hartung, F.1
Girod, B.2
-
4
-
-
0035250758
-
Quantization effects on digital watermarks
-
J.J. Eggers and B. Girod, "Quantization effects on digital watermarks," Signal Processing 81, no. 2, pp. 239-263.
-
Signal Processing
, vol.81
, Issue.2
, pp. 239-263
-
-
Eggers, J.J.1
Girod, B.2
-
5
-
-
0029767514
-
Robust data hiding for images
-
M.D. Swanson, B. Zhu, and A.H. Tewfik, "Robust data hiding for images," Proc. IEEE Digital Signal Processing Workshop, pp. 37-40, 1996.
-
(1996)
Proc. IEEE Digital Signal Processing Workshop
, pp. 37-40
-
-
Swanson, M.D.1
Zhu, B.2
Tewfik, A.H.3
-
6
-
-
85076054853
-
DCT quantization matrices visually optimized for individual images
-
Feb.
-
A.B. Watson, "DCT quantization matrices visually optimized for individual images," in Proc. SPIE: Human Vision, Visual Processing, and Digital Display, vol. 1913, pp. 202-216, Feb. 1993.
-
(1993)
Proc. SPIE: Human Vision, Visual Processing, and Digital Display
, vol.1913
, pp. 202-216
-
-
Watson, A.B.1
-
7
-
-
0033686485
-
Distortion bounded authentication techniques
-
San Jose CA, Jan.
-
N. Memon, P. Vora, B.-L. Yeo, and M. Yeung, "Distortion bounded authentication techniques," in Proc. SPIE: Security and Watermarking of Multimedia Contents, vol. 3971, pp. 164-174, San Jose CA, Jan. 2000.
-
(2000)
Proc. SPIE: Security and Watermarking of Multimedia Contents
, vol.3971
, pp. 164-174
-
-
Memon, N.1
Vora, P.2
Yeo, B.-L.3
Yeung, M.4
-
8
-
-
0033704682
-
Visual hash for oblivious watermarking
-
San Jose CA, Jan.
-
J. Fridrich, "Visual hash for oblivious watermarking," in Proc. SPIE: Security and Watermarking of Multimedia Contents, vol. 3971, pp. 286-294, San Jose CA, Jan. 2000.
-
(2000)
Proc. SPIE: Security and Watermarking of Multimedia Contents
, vol.3971
, pp. 286-294
-
-
Fridrich, J.1
-
9
-
-
0005060102
-
On the need for image-dependent keys for watermarking
-
Newark NJ, May
-
M. Holliman, N. Memon, and M.M. Yeung, "On the need for image-dependent keys for watermarking," in Proc. Content Security and Data Hiding in Digital Media, Newark NJ, May 1999.
-
(1999)
Proc. Content Security and Data Hiding in Digital Media
-
-
Holliman, M.1
Memon, N.2
Yeung, M.M.3
|