-
2
-
-
0035330787
-
Digital steganography: Hiding data within data
-
Artz, D., 2001, Digital steganography: Hiding data within data. IEEE Internet Comput., 5(May/June), 75-80.
-
(2001)
IEEE Internet Comput.
, vol.5
, pp. 75-80
-
-
Artz, D.1
-
3
-
-
0030384775
-
Techniques for data hiding
-
Bender, W., Gruhl, D., Morimoto, N., Lu, A., 1996. Techniques for data hiding. IBM Syst. J., 35(3/4), 313-336.
-
(1996)
IBM Syst. J.
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
4
-
-
84962642939
-
Watermarking applications and their properties
-
Cox, I.J., Miller, M.L., Boom, J.A., 2000. Watermarking applications and their properties. In: Proc. Internat. Conf. on Information Technology: Coding and Computing, pp. 6-10
-
(2000)
Proc. Internat. Conf. on Information Technology: Coding and Computing
, pp. 6-10
-
-
Cox, I.J.1
Miller, M.L.2
Boom, J.A.3
-
5
-
-
0003782852
-
-
Morgan Kaufmann Publishers, San Francisco
-
Cox, I.J., Bloom, J., Miller, M., 2001. Digital Watermarking: Principles & Practice. Morgan Kaufmann Publishers, San Francisco.
-
(2001)
Digital Watermarking: Principles & Practice
-
-
Cox, I.J.1
Bloom, J.2
Miller, M.3
-
6
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T., 1997. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6, 1673-1687.
-
(1997)
IEEE Trans. Image Process.
, vol.6
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
7
-
-
84955596411
-
Fractal based image steganography
-
Berlin: Springer-Verlag
-
Davern, P., Scott, M., 1996. Fractal based image steganography. Proc. First Internat. Workshop Information Hiding, Springer-Verlag, Berlin Vol. 1174, 279-294.
-
(1996)
Proc. First Internat. Workshop Information Hiding
, vol.1174
, pp. 279-294
-
-
Davern, P.1
Scott, M.2
-
8
-
-
33745305741
-
Steganography secure against cover-stego-attacks
-
Springer-Verlag, Berlin
-
Franz, E., Pfitzmann, A., 2000. Steganography secure against cover-stego-attacks. Proc. Third Internat. Workshop Information Hiding, Springer-Verlag, Berlin: Vol. 1768 29-46.
-
(2000)
Proc. Third Internat. Workshop Information Hiding
, vol.1768
, pp. 29-46
-
-
Franz, E.1
Pfitzmann, A.2
-
9
-
-
0036034444
-
Practical steganalysis of digital images-state of the art
-
Conference on Security and Watermarking of Multimedia Contents
-
Fridrich, J., Goljan, M., 2002. Practical steganalysis of digital images-state of the art. In: Proc. SPIE Photonics West, Vol. 4675, Conference on Security and Watermarking of Multimedia Contents, pp. 1-13.
-
(2002)
Proc. SPIE Photonics West
, vol.4675
, pp. 1-13
-
-
Fridrich, J.1
Goljan, M.2
-
10
-
-
0034787093
-
Reliable detection of LSB steganography in grayscale and color images
-
Fridrich, J., Goljan, M., Du, R., 2001. Reliable detection of LSB steganography in grayscale and color images. In: Proc. ACM Workshop on Multimedia and Security, pp. 27-30.
-
(2001)
Proc. ACM Workshop on Multimedia and Security
, pp. 27-30
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
12
-
-
0348021302
-
Secure steganographic methods for palette images
-
Springer-Verlag, Berlin
-
Fridrich, J., Rui, D., 2000 Secure steganographic methods for palette images. Proc. Third Internat. Workshop Information Hiding, Vol. 1768, Springer-Verlag, Berlin 61-76.
-
(2000)
Proc. Third Internat. Workshop Information Hiding
, vol.1768
, pp. 61-76
-
-
Fridrich, J.1
Rui, D.2
-
13
-
-
0032634857
-
Multimedia watermarking techniques
-
Hartung, F., Kutter, M., 1999. Multimedia watermarking techniques. Proc. IEEE 87, pp. 1079-1107.
-
(1999)
Proc. IEEE'87
, pp. 1079-1107
-
-
Hartung, F.1
Kutter, M.2
-
14
-
-
0031996445
-
Exploring steganography: Seeing the unseen
-
February
-
Johnson, N.F., Jajodia, S., 1998. Exploring steganography: Seeing the unseen. IEEE Comput. (February), 26-64.
-
(1998)
IEEE Comput.
, pp. 26-64
-
-
Johnson, N.F.1
Jajodia, S.2
-
15
-
-
0000543038
-
Towards robust and hidden image copyright labeling
-
Thessaloniki, Greece
-
Koch, E., Zhao, J., 1995. Towards robust and hidden image copyright labeling. In: Proc. IEEE Nonlinear Signal and Image Processing Workshop, Thessaloniki, Greece, pp. 452-455.
-
(1995)
Proc. IEEE Nonlinear Signal and Image Processing Workshop
, pp. 452-455
-
-
Koch, E.1
Zhao, J.2
-
16
-
-
0028496330
-
Electronic document distribution
-
Maxemchuk, N.F., 1994. Electronic document distribution. AT & T Tech. J. 73, 73-80.
-
(1994)
AT & T Tech. J.
, vol.73
, pp. 73-80
-
-
Maxemchuk, N.F.1
-
17
-
-
0032075445
-
Robust image watermarking in the spatial domain
-
Nikolaidis, N., Pitas, I., 1998. Robust image watermarking in the spatial domain. Signal Process. 66, 385-403.
-
(1998)
Signal Process.
, vol.66
, pp. 385-403
-
-
Nikolaidis, N.1
Pitas, I.2
-
18
-
-
0029706672
-
Embedding a seal into a picture under orthogonal wavelet transform
-
IEEE Press, Piscataway, NJ
-
Ohnishi, J., Matsui, K., 1996. Embedding a seal into a picture under orthogonal wavelet transform. Proc. Multimedia'96. IEEE Press, Piscataway, NJ, pp. 514-521.
-
(1996)
Proc. Multimedia'96
, pp. 514-521
-
-
Ohnishi, J.1
Matsui, K.2
-
19
-
-
0032680807
-
Information hiding-a survey
-
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G., 1999. Information hiding--a survey. Proc. IEEE 87, pp. 1062-1078.
-
(1999)
Proc. IEEE' 87
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
20
-
-
0035391983
-
Digital watermarking: Algorithms and applications
-
Podilchuk, C.I., Delp, E.J., 2001. Digital watermarking: Algorithms and applications. IEEE Signal Process. Mag. 18 (4), 33-46.
-
(2001)
IEEE Signal Process. Mag.
, vol.18
, Issue.4
, pp. 33-46
-
-
Podilchuk, C.I.1
Delp, E.J.2
-
22
-
-
0035424886
-
Capacity estimates for data hiding in compressed images
-
Ramkumar, M., Akansu, A.N., 2001, Capacity estimates for data hiding in compressed images. IEEE Trans. Image Process. 10, 1252-1263.
-
(2001)
IEEE Trans. Image Process.
, vol.10
, pp. 1252-1263
-
-
Ramkumar, M.1
Akansu, A.N.2
-
23
-
-
0032095654
-
Multimedia data-embedding and watermarking technologies
-
Swanson, M.D., Kobayashi, M., Tewfik, A.H., 1998, Multimedia data-embedding and watermarking technologies. Proc. IEEE'86 1064-1087.
-
(1998)
Proc. IEEE
, vol.86
, pp. 1064-1087
-
-
Swanson, M.D.1
Kobayashi, M.2
Tewfik, A.H.3
-
25
-
-
0032633080
-
The use of watermarks in the protection of digital multimedia products
-
Voyatzis, G., Pitas, I., 1999. The use of watermarks in the protection of digital multimedia products. Proc. IEEE, 87 1197-1207.
-
(1999)
Proc. IEEE
, vol.87
, pp. 1197-1207
-
-
Voyatzis, G.1
Pitas, I.2
-
27
-
-
84892764719
-
Attacks on steganography systems
-
Springer-Verlag, Berlin
-
Westfeld, A., Pfitzmann, A., 2000. Attacks on steganography systems. Proc. Third Internat. Workshop Information Hiding. Vol. 1768. Springer-Verlag, Berlin pp. 61-75.
-
(2000)
Proc. Third Internat. Workshop Information Hiding
, vol.1768
, pp. 61-75
-
-
Westfeld, A.1
Pfitzmann, A.2
-
28
-
-
0032664574
-
Perceptual watermarks for digital images and video
-
Wolfgang, R.B., Podilchuk, C.I., Delp, E.J., 1999. Perceptual watermarks for digital images and video. Proc. IEEE 87, 1108-1126.
-
(1999)
Proc. IEEE
, vol.87
, pp. 1108-1126
-
-
Wolfgang, R.B.1
Podilchuk, C.I.2
Delp, E.J.3
-
29
-
-
0031378592
-
An invisible watermarking technique for image verification
-
Yeung, M.M., Mintzer, F., 1997. An invisible watermarking technique for image verification. In: Proc. IEEE Internat. Conf. on Image Processing, Vol. II, pp. 680-683.
-
(1997)
Proc. IEEE Internat. Conf. on Image Processing
, vol.2
, pp. 680-683
-
-
Yeung, M.M.1
Mintzer, F.2
-
30
-
-
0347468730
-
Digital watermarking in business today and tomorrow
-
Zhao, J., Koch, E., Luo, C., 1998. Digital watermarking in business today and tomorrow. Commun. ACM 41, 67-74.
-
(1998)
Commun. ACM
, vol.41
, pp. 67-74
-
-
Zhao, J.1
Koch, E.2
Luo, C.3
|