-
1
-
-
85009044298
-
An implementation of the JPEG2000 standard in java
-
An implementation of the JPEG2000 standard in java. http://jj2000.epfl.ch/index.html.
-
-
-
-
2
-
-
85009043126
-
The JPEG 2000 still-image compression standard
-
M. Rabbani and D. Santa-Cruz. The JPEG 2000 still-image compression standard. International Conference in Image Processing (ICIP), Thessaloniki, Greece, October 11, 2001.
-
International Conference in Image Processing (ICIP), Thessaloniki, Greece, October 11, 2001
-
-
Rabbani, M.1
Santa-Cruz, D.2
-
3
-
-
0034315180
-
The JPEG2000 still image coding system: An overview
-
November
-
C. Christopoulos, A. Skodras, and T. Ebrahimi. The JPEG2000 still image coding system: An overview. IEEE Transactions on Consumer Electronics, Vol. 46, No. 4, pp. 1103-1127, November 2000.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.4
, pp. 1103-1127
-
-
Christopoulos, C.1
Skodras, A.2
Ebrahimi, T.3
-
11
-
-
0032594123
-
Digital signatures for flows and multicasts
-
August
-
C. Wong and S. Lam. Digital signatures for flows and multicasts. 1999 IEEE/ACM Transaction on Networking, Vol. 7, No. 4, August
-
(1999)
IEEE/ACM Transaction on Networking
, vol.7
, Issue.4
-
-
Wong, C.1
Lam, S.2
-
12
-
-
79958074367
-
A forward-secure digital signature scheme
-
M. Bellare and S. Miner. A forward-secure digital signature scheme. pages 431-448, 1999, Crypto 99.
-
(1999)
Crypto 99
, pp. 431-448
-
-
Bellare, M.1
Miner, S.2
-
13
-
-
0001989185
-
A new family of authentication protocols
-
R. Anderson, F. Bergadano, B. Crispo, J.-H. Lee, C. Manifavas, and R. Needham. A new family of authentication protocols. ACMOSR: ACM Operating Systems Review, 32, 1998
-
(1998)
ACMOSR: ACM Operating Systems Review
, vol.32
-
-
Anderson, R.1
Bergadano, F.2
Crispo, B.3
Lee, J.-H.4
Manifavas, C.5
Needham, R.6
-
15
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
A. Perrig, R. Canetti, D. Song, and J. Tygar. Efficient and secure source authentication for multicast. 2001 Network and Distributed System Security Symposium, NDSS '01, February 2001.
-
(2001)
Network and Distributed System Security Symposium, NDSS '01, February 2001
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, J.4
-
16
-
-
0013316594
-
Safeguarding digital library contents and users. Digital watermarking
-
December
-
F. Mintzer, J. Lotspiech, and N. Morimoto. Safeguarding digital library contents and users. digital watermarking. D-Lib Magazine, December 1997
-
(1997)
D-Lib Magazine
-
-
Mintzer, F.1
Lotspiech, J.2
Morimoto, N.3
-
17
-
-
0038826879
-
Information hiding: An annotated bibliography
-
R. Anderson and F. Petitcolas. Information hiding: An annotated bibliography. http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/
-
-
-
Anderson, R.1
Petitcolas, F.2
-
19
-
-
0043201448
-
Digital watermarking
-
July
-
Digital watermarking. Communications of the ACM, Vol. 41 No. 7, July 1998
-
(1998)
Communications of the ACM
, vol.41
, Issue.7
-
-
-
20
-
-
0035417218
-
Digital watermarking for copyright protection: A communications perspective
-
August
-
Digital watermarking for copyright protection: A communications perspective. IEEE Communication Interactive August 2001 - Vol. 39. N.8
-
(2001)
IEEE Communication Interactive
, vol.39
, Issue.8
-
-
-
21
-
-
84957877979
-
Attacks on copyright marking systems. Second workshop on information hiding
-
F. Petitcolas, R. Anderson, and M. Kuhn. Attacks on copyright marking systems. Second workshop on information hiding. Lecture Notes in Computer Science., 1525 : 218-238, 1998
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 218-238
-
-
Petitcolas, F.1
Anderson, R.2
Kuhn, M.3
-
22
-
-
85009038685
-
Weakness of existing watermarking schemes. Stirmark-samples
-
F. Petitcolas, Weakness of existing watermarking schemes. stirmark-samples. http://www.cl.cam.ac.uk/~fapp2/watermarking/stirmark/samples.html.
-
-
-
Petitcolas, F.1
-
24
-
-
0035765561
-
Authentication and access control in the JPEG 2000 compressed domain
-
San Diego
-
R. Grosbois, P. Gerbelot, and T. Ebrahimi. Authentication and access control in the JPEG 2000 compressed domain. SPIE-46 Proceedings, Applications of Digital Image Processing XXIV, Vol. 4418, pp. 95-104, San Diego, 2001
-
(2001)
SPIE-46 Proceedings, Applications of Digital Image Processing XXIV
, vol.4472
, pp. 95-104
-
-
Grosbois, R.1
Gerbelot, P.2
Ebrahimi, T.3
-
25
-
-
85009039776
-
-
ISO/IEC JTC 1/SC 29/WG 1, coding of still pictures. JEPG 2000 Part I Final Committee Draft Version 1.0, ISO/IEC FCD15444-1: 2000 (V1.0, 16 March 2000)
-
ISO/IEC JTC 1/SC 29/WG 1, coding of still pictures. JEPG 2000 Part I Final Committee Draft Version 1.0, ISO/IEC FCD15444-1: 2000 (V1.0, 16 March 2000)
-
-
-
-
26
-
-
85009037230
-
-
JPEG 2000 related publications
-
JPEG 2000 related publications. http://jj2000.epfl.ch/jjpublications/.
-
-
-
-
27
-
-
0034229499
-
High performance scalable image compression with EBCOT
-
July
-
D. Taubman. High performance scalable image compression with EBCOT. IEEE Transactions on Image Processing, vol.9, no.7, July 2000
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, Issue.7
-
-
Taubman, D.1
-
28
-
-
0141807870
-
-
D. Taubman, E. Ordentlich, M. Weinberger, G. Seroussi, I. Ueno, and F. Ono. Embedded block coding in JPEG2000. 2000
-
(2000)
Embedded Block Coding in JPEG2000
-
-
Taubman, D.1
Ordentlich, E.2
Weinberger, M.3
Seroussi, G.4
Ueno, I.5
Ono, F.6
-
29
-
-
0036133177
-
File format technology in JPEG 2000 enables flexible use of still and motion sequences
-
Elsevier Science B.V.
-
J. Houchin and D. Singer. File format technology in JPEG 2000 enables flexible use of still and motion sequences. 2002 Signal Processing: Image Communication 17, p. 131-144, Elsevier Science B.V.
-
(2002)
Signal Processing: Image Communication
, vol.17
, pp. 131-144
-
-
Houchin, J.1
Singer, D.2
-
30
-
-
85009037533
-
-
ISO/IEC JTC 1/SC 29/WG 1, coding of still pictures. ISO/IEC 15444-3 (JEPG 2000, Part 3) Committee Draft
-
ISO/IEC JTC 1/SC 29/WG 1, coding of still pictures. ISO/IEC 15444-3 (JEPG 2000, Part 3) Committee Draft.
-
-
-
-
35
-
-
0013106830
-
Structural digital signature for image authentication: An incidental distortion resistant scheme
-
C. Lu and H. Liao. Structural digital signature for image authentication: An incidental distortion resistant scheme. 2000 pages 115-118, 2000. ACM Multimedia Workshop.
-
(2000)
ACM Multimedia Workshop
, pp. 115-118
-
-
Lu, C.1
Liao, H.2
-
36
-
-
0003456805
-
A wavelet tour of signal processing
-
Academic Press
-
S. Mallat. A wavelet tour of signal processing. Academic Press.
-
-
-
Mallat, S.1
-
39
-
-
85024290278
-
Group signatures
-
of LNCS; Springer-Verlag, 1991
-
Chaum and E. van Heyst. Group signatures. 1991. In Advances in Cryptology, EUROCRYPT'91, vol. 547 of LNCS, p. 257-265, Springer-Verlag, 1991.
-
(1991)
Advances in Cryptology, EUROCRYPT'91
, vol.547
, pp. 257-265
-
-
Chaum1
Van Heyst, E.2
-
40
-
-
0042199100
-
A practical and provably secure coalition-resistant group signature scheme
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and probably secure coalition-resistant group signature scheme. 2000
-
(2000)
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
41
-
-
84937441148
-
Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes
-
J. Camenisch and I. Damgšard. Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes. 2000 Asiacrypt 2000, p. 331-345
-
(2000)
Asiacrypt 2000
, pp. 331-345
-
-
Camenisch, J.1
Damgšard, I.2
-
42
-
-
84889084005
-
Understanding and integrating kodak picture authentication cameras
-
Eastman Kodak. Understanding and integrating kodak picture authentication cameras. http://www.kodak.com/global/en/digital/acrobat/software/authentication_ whitepaper.pdf
-
-
-
Kodak, E.1
-
45
-
-
84880879872
-
Forward-secure signatures with optimal signing and verifying
-
G. Itkis and L. Reyzin. Forward-secure signatures with optimal signing and verifying. p. 332-354, 2001. Crypto 01.
-
(2001)
Crypto 01
, pp. 332-354
-
-
Itkis, G.1
Reyzin, L.2
-
46
-
-
0007700726
-
Tamper resistance - A cautionary note
-
ISBN 1-880446-83-9
-
R. Anderson and M. Kuhn. Tamper resistance - a cautionary note. The Second USENIX Workshop on Electronic Commerce Proceedings, Oakland, California, November 18-21, 1996, pp 1-11, ISBN 1-880446-83-9
-
The Second USENIX Workshop on Electronic Commerce Proceedings, Oakland, California, November 18-21, 1996
, pp. 1-11
-
-
Anderson, R.1
Kuhn, M.2
-
48
-
-
85009044560
-
Tutorial on JPEG2000 and overview of the technology
-
Tutorial on JPEG2000 and overview of the technology. http://jj2000.epfl/ch/jj tutorials/JPEG2000 540 378/1.html.
-
-
-
-
51
-
-
85009041692
-
-
Internet digital rights management group charter (IDRM)
-
Internet digital rights management group charter (IDRM). http://www.idrm.org.
-
-
-
|