-
1
-
-
0034251536
-
Repeating image watermarking technique by the visual cryptography
-
August
-
C.C.Wang, S.C.Tai, and C.S.Yu. Repeating image watermarking technique by the visual cryptography. IEICE Transaction on Fundamentals, E83-A(8), August 2000.
-
(2000)
IEICE Transaction on Fundamentals
, vol.E83-A
, Issue.8
-
-
Wang, C.C.1
Tai, S.C.2
Yu, C.S.3
-
2
-
-
0035251780
-
Implementations of quantization index modulation methods for digital watermarking and information embedding of multimedia
-
Feb.
-
B. Chen and G. W. Wornell. Implementations of quantization index modulation methods for digital watermarking and information embedding of multimedia. Journal of VLSI Signal Processing, 27:7-33, Feb. 2001.
-
(2001)
Journal of VLSI Signal Processing
, vol.27
, pp. 7-33
-
-
Chen, B.1
Wornell, G.W.2
-
3
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
May
-
B. Chen and G. W. Wornell. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Information Theory, 47(4): 1423-1443, May 2001.
-
(2001)
IEEE Trans. on Information Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
5
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I. J. Cox, J. Kilian, T. Leighton, and T. G. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Trans. on Image Processing, 6(12):1673-1687, 1997.
-
(1997)
IEEE Trans. on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.G.4
-
6
-
-
0032625842
-
Watermarking as communications with side information
-
I. J. Cox, M. L. Miller, and A. McKellips. Watermarking as communications with side information. Proc. of the IEEE, 87(7):1127-1141, 1999.
-
(1999)
Proc. of the IEEE
, vol.87
, Issue.7
, pp. 1127-1141
-
-
Cox, I.J.1
Miller, M.L.2
McKellips, A.3
-
8
-
-
0034483631
-
Cocktail watermarking for digital image protection
-
December
-
C.S.Lu, S.K.Huang, C.J.Sze, and H.Y.M.Liao. Cocktail watermarking for digital image protection. IEEE Trans. on Multimedia, 2(4):209-224, December 2000.
-
(2000)
IEEE Trans. on Multimedia
, vol.2
, Issue.4
, pp. 209-224
-
-
Lu, C.S.1
Huang, S.K.2
Sze, C.J.3
Liao, H.Y.M.4
-
10
-
-
0035250758
-
Quantization effects on digital watermarks
-
J. Eggers and B. Girod. Quantization effects on digital watermarks. Signal Processing, 81(2):239-263, 1999.
-
(1999)
Signal Processing
, vol.81
, Issue.2
, pp. 239-263
-
-
Eggers, J.1
Girod, B.2
-
12
-
-
0003317602
-
Using fractal compression scheme to embed a digital signature into an image
-
J.Puate and F.Jordan. Using fractal compression scheme to embed a digital signature into an image. In Proc. of SPIE Photonics East Symposium, 1996.
-
(1996)
Proc. of SPIE Photonics East Symposium
-
-
Puate, J.1
Jordan, F.2
-
14
-
-
0035335388
-
Rotation, scale, and translation resilient public watermarking for images
-
May
-
C. Y. Lin, M. Wu, Y. M. Lui, J. A. Bloom, M. L. Miller, and I. J. Cox. Rotation, scale, and translation resilient public watermarking for images. IEEE Trans. On Image Processing, 10(5):767-782, May 1999.
-
(1999)
IEEE Trans. On Image Processing
, vol.10
, Issue.5
, pp. 767-782
-
-
Lin, C.Y.1
Wu, M.2
Lui, Y.M.3
Bloom, J.A.4
Miller, M.L.5
Cox, I.J.6
-
17
-
-
0032070304
-
Multiresolution scene-based video watermarking using perceptual models
-
April
-
M.D.Swanson, B.Zhu, and A.H.Tewfik. Multiresolution scene-based video watermarking using perceptual models. IEEE Journal on Selected Areas in Communications, 16(4):540-550, April 1997.
-
(1997)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 540-550
-
-
Swanson, M.D.1
Zhu, B.2
Tewfik, A.H.3
-
20
-
-
0034797577
-
An image watermarking technique using pyramid transform
-
September
-
Q.Cheng and T. Huang. An image watermarking technique using pyramid transform. In Proc. of the ACM Multimedia, September 2001.
-
(2001)
Proc. of the ACM Multimedia
-
-
Cheng, Q.1
Huang, T.2
-
26
-
-
0018545449
-
How to share a secret
-
November
-
A. Shamir. How to share a secret. Communications of the ACM, 22(11), November 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
-
-
Shamir, A.1
-
28
-
-
0030384775
-
Techniques for data hiding
-
W.Bender, D.Gruhl, N.Morimoto, and A.Lu. Techniques for data hiding. IBM Systems Journal. 35(3/4):164 173, 1996.
-
(1996)
IBM Systems Journal
, vol.35
, Issue.3-4
, pp. 164-173
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
29
-
-
0033312461
-
Multilevel data hiding for digital image and video
-
M. Wu, H. Yu, and A. Gelman. Multilevel data hiding for digital image and video. In SPIE Photonics East, 1999.
-
(1999)
SPIE Photonics East
-
-
Wu, M.1
Yu, H.2
Gelman, A.3
-
31
-
-
0027969713
-
Reusing shares in secret sharing schemes
-
March
-
Y.Zheng, T. Hardjono, and J. Seberry. Reusing shares in secret sharing schemes. The Computer Journal, 37(3):199 205, March 1994.
-
(1994)
The Computer Journal
, vol.37
, Issue.3
, pp. 199-205
-
-
Zheng, Y.1
Hardjono, T.2
Seberry, J.3
|