-
1
-
-
0036030609
-
Temporal synchronization in video watermarking
-
January 21-24, San Jose, CA
-
E. Lin and E. Delp, "Temporal synchronization in video watermarking," Proceedings of the SPIE Security and Watermarking of Multimedia Contents IV, vol. 4675, January 21-24, 2002, San Jose, CA, pp. 478-490.
-
(2002)
Proceedings of the SPIE Security and Watermarking of Multimedia Contents IV
, vol.4675
, pp. 478-490
-
-
Lin, E.1
Delp, E.2
-
2
-
-
0032072064
-
Watermarking of uncompressed and compressed video
-
May
-
F. Hartung and B. Girod, "Watermarking of uncompressed and compressed video," Signal Processing, vol. 66, no. 3, pp. 283-301, May 1998.
-
(1998)
Signal Processing
, vol.66
, Issue.3
, pp. 283-301
-
-
Hartung, F.1
Girod, B.2
-
3
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
December
-
I. Cox, J. Killian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673-1687, December 1997.
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.1
Killian, J.2
Leighton, T.3
Shamoon, T.4
-
4
-
-
0032664574
-
Perceptual Watermarks for Digital Images and Video
-
July
-
R. Wolfgang, C. Podilchuk, and E. Delp, "Perceptual Watermarks for Digital Images and Video," Proceedings of the IEEE, vol. 87, no. 7, pp. 1108-1126, July 1999.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1108-1126
-
-
Wolfgang, R.1
Podilchuk, C.2
Delp, E.3
-
5
-
-
84957877979
-
Attacks on copyright marking systems
-
April 14-17, Portland, OR
-
F. Petitcolas, R. Anderson, and M. Kuhn, "Attacks on copyright marking systems," Proceedings of the Second International Workshop in Information Hiding, April 14-17, 1998, Portland, OR, pp. 218-238.
-
(1998)
Proceedings of the Second International Workshop in Information Hiding
, pp. 218-238
-
-
Petitcolas, F.1
Anderson, R.2
Kuhn, M.3
-
6
-
-
0033685986
-
Automatic recovery of invisible image watermarks from geometrically distorted images
-
January 24-26, San Jose, CA
-
G. Braudaway and F. Mintzer, "Automatic recovery of invisible image watermarks from geometrically distorted images," Proceedings of the SPIE Security and Watermarking of Multimedia Contents II, January 24-26, 2000, San Jose, CA, vol. 3971, pp. 74-81.
-
(2000)
Proceedings of the SPIE Security and Watermarking of Multimedia Contents II
, vol.3971
, pp. 74-81
-
-
Braudaway, G.1
Mintzer, F.2
-
7
-
-
0034769537
-
Streaming video and rate scalable compression: What are the challenges for watermarking?
-
January 22-25, San Jose, CA
-
E. Lin, C. Podilchuk, T. Kalker, and E. Delp, "Streaming video and rate scalable compression: What are the challenges for watermarking?", Proceedings of the SPIE Security and Watermarking of Multimedia Contents III, January 22-25, 2001, San Jose, CA, vol. 4314, pp. 116-127.
-
(2001)
Proceedings of the SPIE Security and Watermarking of Multimedia Contents III
, vol.4314
, pp. 116-127
-
-
Lin, E.1
Podilchuk, C.2
Kalker, T.3
Delp, E.4
-
8
-
-
84961795068
-
An overview of security issues in streaming video
-
April 2-4, Las Vegas, NV
-
E. Lin, G. Cook, P. Salama, and E. Delp, "An overview of security issues in streaming video," Proceedings of the International Conference on Information Technology: Coding and Computing, April 2-4, 2001, Las Vegas, NV, pp. 345-348.
-
(2001)
Proceedings of the International Conference on Information Technology: Coding and Computing
, pp. 345-348
-
-
Lin, E.1
Cook, G.2
Salama, P.3
Delp, E.4
-
9
-
-
0035311789
-
An Overview of Multimedia Content Protection in Consumer Electronics Devices
-
A. Eskicioglu and E. Delp, "An Overview of Multimedia Content Protection in Consumer Electronics Devices," Signal Processing: Image Communication, vol. 16, pp. 681-699, 2000.
-
(2000)
Signal Processing: Image Communication
, vol.16
, pp. 681-699
-
-
Eskicioglu, A.1
Delp, E.2
-
10
-
-
0242660411
-
Exhaustive geometrical search and the false positive watermark detection probability
-
January, Santa Clara, CA
-
J. Lichtenauer, I. Setyawan, T. Kalker, and R. Lagendijk, "Exhaustive geometrical search and the false positive watermark detection probability," to appear in the Proceedings of the SPIE Security and Watermarking of Multimedia Contents V, January 2003, Santa Clara, CA.
-
(2003)
Proceedings of the SPIE Security and Watermarking of Multimedia Contents V
-
-
Lichtenauer, J.1
Setyawan, I.2
Kalker, T.3
Lagendijk, R.4
-
11
-
-
0033601673
-
Robust 3D DFT video watermarking
-
January 25-27, San Jose, CA
-
F. Deguillamue, G. Csurka, J. Ruanaidh, and T. Pun, "Robust 3D DFT video watermarking," Proceedings of the SPIE Security and Watermarking of Multimedia Contents, January 25-27, 1999, San Jose, CA, vol. 3657, pp. 113-124.
-
(1999)
Proceedings of the SPIE Security and Watermarking of Multimedia Contents
, vol.3657
, pp. 113-124
-
-
Deguillamue, F.1
Csurka, G.2
Ruanaidh, J.3
Pun, T.4
-
12
-
-
0034775170
-
The watermark template attack
-
January 22-25, San Jose, CA
-
A. Herrigel, S. Voloshynovskiy, and Y. Rytsar, "The watermark template attack," Proceedings of the SPIE Security and Watermarking of Multimedia Contents III, January 22-25, 2001, San Jose, CA, vol. 4314, pp. 394-405.
-
(2001)
Proceedings of the SPIE Security and Watermarking of Multimedia Contents III
, vol.4314
, pp. 394-405
-
-
Herrigel, A.1
Voloshynovskiy, S.2
Rytsar, Y.3
-
13
-
-
0033601661
-
A video watermarking system for broadcast monitoring
-
January 25-27, San Jose, CA
-
T. Kalker, G. Depovere, J. Haitsma, and M. Maes, "A video watermarking system for broadcast monitoring," Proceedings of the SPIE Security and Watermarking of Multimedia Contents, January 25-27, 1999, San Jose, CA, vol. 3657, pp. 103-112.
-
(1999)
Proceedings of the SPIE Security and Watermarking of Multimedia Contents
, vol.3657
, pp. 103-112
-
-
Kalker, T.1
Depovere, G.2
Haitsma, J.3
Maes, M.4
-
14
-
-
0005314588
-
Cryptographic hash functions: A survey
-
Department of Computer Science, University of Wollongong, July
-
S. Bakhtiari, R. Safavi-Naini, and J. Pieprzyk, Cryptographic hash functions: A survey, Technical Report 95-09, Department of Computer Science, University of Wollongong, July 1995.
-
(1995)
Technical Report
, vol.95
, Issue.9
-
-
Bakhtiari, S.1
Safavi-Naini, R.2
Pieprzyk, J.3
-
15
-
-
0003855464
-
-
New York, NY: John Wiley and Sons, Inc.
-
B. Schneier, Applied Cryptography, 2nd ed., New York, NY: John Wiley and Sons, Inc., 1996.
-
(1996)
Applied Cryptography, 2nd Ed.
-
-
Schneier, B.1
-
16
-
-
0003629991
-
-
National Institute of Standards and Technology FIPS 180-1, April 17
-
National Institute of Standards and Technology FIPS 180-1, Secure Hash Standard, April 17, 1995.
-
(1995)
Secure Hash Standard
-
-
|