-
1
-
-
84997769409
-
A digital watermark
-
R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, "A digital watermark," in Proceedings of International Conference on Image Processing, 1994, pp. 86-90.
-
(1994)
Proceedings of International Conference on Image Processing
, pp. 86-90
-
-
Van Schyndel, R.G.1
Tirkel, A.Z.2
Osborne, C.F.3
-
2
-
-
0030384775
-
Techniques for data hiding
-
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM Systems Journal, vol. 35, no. 3-4, pp. 313-336, 1996.
-
(1996)
IBM Systems Journal
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
3
-
-
84947937393
-
A secure, robust watermark for multimedia
-
Information Hiding
-
I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "A secure, robust watermark for multimedia," in Information Hiding, 1996, vol. 1174 of Springer Lecture notes in Computer Science, pp. 183-206.
-
(1996)
Springer Lecture Notes in Computer Science
, vol.1174
, pp. 183-206
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
4
-
-
0029394108
-
Electronic marking and identification techniques to discourage document copying
-
Oct
-
J. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman, "Electronic marking and identification techniques to discourage document copying," IEEE Journal on Selected Areas of Communications, vol. 13, no. 8, pp. 1495-1504, Oct 1995.
-
(1995)
IEEE Journal on Selected Areas of Communications
, vol.13
, Issue.8
, pp. 1495-1504
-
-
Brassil, J.1
Low, S.2
Maxemchuk, N.3
O'Gorman, L.4
-
5
-
-
0032664574
-
Perceptual watermarks for digital images and video
-
R. B. Wolfgang, C. I. Podilchuk, and E. J. Delp, "Perceptual watermarks for digital images and video," Proceedings of the IEEE, vol. 87, no. 7, pp. 1108-1126, 1999.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1108-1126
-
-
Wolfgang, R.B.1
Podilchuk, C.I.2
Delp, E.J.3
-
7
-
-
0032074580
-
Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
-
S. Craver, N. Memon, B.-L. Yeo, and M. M. Yeung, "Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications," IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 573-586, 1998.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 573-586
-
-
Craver, S.1
Memon, N.2
Yeo, B.-L.3
Yeung, M.M.4
-
11
-
-
84957886335
-
Modeling the security of steganographic systems
-
J. Zöllner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. wick, and G. Wolf, "Modeling the security of steganographic systems," in Proceedings of the Second Internation Workshop on Information Hiding, 1998, pp. 344-354.
-
(1998)
Proceedings of the Second Internation Workshop on Information Hiding
, pp. 344-354
-
-
Zöllner, J.1
Federrath, H.2
Klimant, H.3
Pfitzmann, A.4
Piotraschke, R.5
Westfeld, A.6
Wick, G.7
Wolf, G.8
-
13
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Systems Technical Journal, vol. 28, pp. 656-715, 1949.
-
(1949)
Bell Systems Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
14
-
-
0016079335
-
The effects of a visual fidelity criterion on the encoding of images
-
July
-
J. L. Mannos and D. J. Sakrison, "The effects of a visual fidelity criterion on the encoding of images," IEEE Transactions on Information Theory, vol. 20, no. 4, pp. 525-536, July 1974.
-
(1974)
IEEE Transactions on Information Theory
, vol.20
, Issue.4
, pp. 525-536
-
-
Mannos, J.L.1
Sakrison, D.J.2
-
15
-
-
0023422157
-
The cortex transform: Rapid computation of simulated neural images
-
A. B. Watson, "The cortex transform: Rapid computation of simulated neural images," Computer Vision, Graphics and Image Processing, vol. 39, pp. 311-327, 1987.
-
(1987)
Computer Vision, Graphics and Image Processing
, vol.39
, pp. 311-327
-
-
Watson, A.B.1
-
19
-
-
85062232414
-
Automata on a 2-dimensional tape
-
Austin, Texas, 18-20 Oct. IEEE
-
M. Blum and C. Hewitt, "Automata on a 2-dimensional tape," in Conference Record of 1967 Eighth Annual Symposium on Switching and Automata Theory, Austin, Texas, 18-20 Oct. 1967, IEEE, pp. 155-160.
-
(1967)
Conference Record of 1967 Eighth Annual Symposium on Switching and Automata Theory
, pp. 155-160
-
-
Blum, M.1
Hewitt, C.2
-
21
-
-
0026177621
-
A survey of two-dimensional automata theory
-
June
-
K. Inoue and I. Takanami, "A survey of two-dimensional automata theory," Information Sciences, vol. 55, no. 1-3, pp. 99-121, June 1991.
-
(1991)
Information Sciences
, vol.55
, Issue.1-3
, pp. 99-121
-
-
Inoue, K.1
Takanami, I.2
-
22
-
-
0032680807
-
Information hiding - A survey
-
July
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding - a survey," Proceedings of the IEEE, vol. 87, no. 7, pp. 1062-1078, July 1999.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
24
-
-
79958946158
-
-
W. H. Freeman
-
D. Marr, Vision, W. H. Freeman, 1983.
-
(1983)
Vision
-
-
Marr, D.1
|