-
1
-
-
0033601666
-
Watermarking with quadratic residues
-
San Jose, CA, USA, January 1999
-
Atallah M, Wagstaff S (1999) Watermarking with quadratic residues. In: Proceedings of IS&T/SPIE conference on security and watermarking of multimedia contents, San Jose, CA, USA, January 1999
-
(1999)
Proceedings of IS&T/SPIE Conference on Security and Watermarking of Multimedia Contents
-
-
Atallah, M.1
Wagstaff, S.2
-
2
-
-
0029464112
-
Techniques for data hiding
-
storage and retrieval for image and video databases III, San Jose, CA, USA, February 1995
-
Bender W, Gruhl D, Morimoto N (1995) Techniques for data hiding. In: Proceedings of the SPIE 2420 (storage and retrieval for image and video databases III), San Jose, CA, USA, February 1995, pp 164-173
-
(1995)
Proceedings of the SPIE
, vol.2420
, pp. 164-173
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
-
4
-
-
0041916251
-
Watermarking, tamper-proofing, and obfuscation - Tools for software protection
-
University of Arizona
-
Collberg CS, Thomborson C (2000) Watermarking, tamper-proofing, and obfuscation - tools for software protection. Technical report 2000-03, University of Arizona
-
(2000)
Technical Report
, vol.2000
, Issue.3
-
-
Collberg, C.S.1
Thomborson, C.2
-
5
-
-
58849141394
-
A review of watermarking and the importance of perceptual modeling
-
Human Vision and Electronic Imaging II, San Jose, CA, USA, February 1997
-
Cox IJ, Miller ML (1997) A review of watermarking and the importance of perceptual modeling. In: Proceedings of SPIE (Human Vision and Electronic Imaging II, San Jose, CA, USA, February 1997
-
(1997)
Proceedings of SPIE
-
-
Cox, I.J.1
Miller, M.L.2
-
7
-
-
0032074580
-
Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
-
Craver S, Memon N, Yeo BL, Yeung MM (1998) Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications. IEEE J Selected Areas Commun 16(4):573-586
-
(1998)
IEEE J Selected Areas Commun
, vol.16
, Issue.4
, pp. 573-586
-
-
Craver, S.1
Memon, N.2
Yeo, B.L.3
Yeung, M.M.4
-
8
-
-
0042417324
-
A survey of current watermarking techniques
-
Katzenbeisser S, Petitcolas FA (eds). Artech House, Norwood, MA
-
Dugelay JL, Roche S (2000) A survey of current watermarking techniques. In: Katzenbeisser S, Petitcolas FA (eds) Information hiding techniques for steganography and digital watermarking. Artech House, Norwood, MA, pp 121-148
-
(2000)
Information Hiding Techniques for Steganography and Digital Watermarking
, pp. 121-148
-
-
Dugelay, J.L.1
Roche, S.2
-
9
-
-
0032072064
-
Watermarking of uncompressed and compressed video
-
Hartung F, Girod B (1998) Watermarking of uncompressed and compressed video. Signal Process 66(3):283-301
-
(1998)
Signal Process
, vol.66
, Issue.3
, pp. 283-301
-
-
Hartung, F.1
Girod, B.2
-
13
-
-
0003185688
-
La cryptographie militaire
-
Kerckhoffs A (1883) La cryptographie militaire. J Sci Militaires 9:5-38
-
(1883)
J Sci Militaires
, vol.9
, pp. 5-38
-
-
Kerckhoffs, A.1
-
14
-
-
0003245845
-
Seminumerical algorithms
-
Addison-Wesley, Reading, MA
-
Knuth D (1981) Seminumerical algorithms. In: The art of computer programming, vol 2. Addison-Wesley, Reading, MA
-
(1981)
The Art of Computer Programming
, vol.2
-
-
Knuth, D.1
-
16
-
-
84947930048
-
Twin peaks: The histogram attack on fixed depth image watermarks
-
Proceedings of the 2nd international workshop on information hiding. Springer, Berlin Heidelberg New York
-
Maes M (1998) Twin peaks: the histogram attack on fixed depth image watermarks. In: Proceedings of the 2nd international workshop on information hiding, Lecture notes in computer science, vol 1525. Springer, Berlin Heidelberg New York, pp 290-305
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 290-305
-
-
Maes, M.1
-
17
-
-
0028496330
-
Electronic document distribution
-
AT&T Labs
-
Maxemchuk N (1994) Electronic document distribution. Technical journal, AT&T Labs
-
(1994)
Technical Journal
-
-
Maxemchuk, N.1
|