-
1
-
-
0033687081
-
Virtualized architectural heritage: New tools and techniques
-
April-June
-
A. C. Addison and M. Gaiani, "Virtualized architectural heritage: New tools and techniques," IEEE Multimedia, vol. 7, no. 2, pp. 26-31, April-June 2000.
-
(2000)
IEEE Multimedia
, vol.7
, Issue.2
, pp. 26-31
-
-
Addison, A.C.1
Gaiani, M.2
-
2
-
-
1242283326
-
Copyright protection for CH multimedia data through digital watermarking techniques
-
V. Cappellini, F. Bartolini, R. Caldelli, A. De Rosa, A. Piva, M. Barni, and M. Wada, "Copyright protection for CH multimedia data through digital watermarking techniques," in Proc. 11th IEEE Int. Workshop on Database and Expert Systems Applications, September 2000, pp. 935-939.
-
Proc. 11th IEEE Int. Workshop on Database and Expert Systems Applications, September 2000
, pp. 935-939
-
-
Cappellini, V.1
Bartolini, F.2
Caldelli, R.3
De Rosa, A.4
Piva, A.5
Barni, M.6
Wada, M.7
-
5
-
-
25944478731
-
Dual domain semi-fragile watermarking for image authentication
-
M.A.Sc. thesis, Univ. Toronto. Toronto, ON, Canada
-
Y. Zhao, "Dual Domain Semi-Fragile Watermarking for Image Authentication," M.A.Sc. thesis, Univ. Toronto. Toronto, ON, Canada, 2003.
-
(2003)
-
-
Zhao, Y.1
-
6
-
-
0036488364
-
Compressive data hiding: An unconventional approach for improved color image coding
-
Feb.
-
P. Campisi, D. Kundur, D. Hatzinakos, and A. Neri, "Compressive data hiding: An unconventional approach for improved color image coding," EURASIP J. Appl. Signal Process. Special Issue on Emerging Applications of Multimedia Data Hiding, vol. 2002, no. 2, pp. 152-163, Feb. 2002.
-
(2002)
EURASIP J. Appl. Signal Process. Special Issue on Emerging Applications of Multimedia Data Hiding
, vol.2002
, Issue.2
, pp. 152-163
-
-
Campisi, P.1
Kundur, D.2
Hatzinakos, D.3
Neri, A.4
-
9
-
-
0038636389
-
Combining low frequency and spread spectrum watermarking
-
July
-
J. Fridrich, "Combining low frequency and spread spectrum watermarking," in Proc. SPIE, Mathematics of Data/Image Coding, Compression, and Encryption, vol. 3456, July 1998, pp. 2-12.
-
(1998)
Proc. SPIE, Mathematics of Data/Image Coding, Compression, and Encryption
, vol.3456
, pp. 2-12
-
-
Fridrich, J.1
-
10
-
-
0032292847
-
Image watermarking for tamper detection
-
October
-
____, "Image watermarking for tamper detection," Proc. IEEE Int. Conf. on Image Processing, vol. 2, pp. 404-408, October 1998.
-
(1998)
Proc. IEEE Int. Conf. on Image Processing
, vol.2
, pp. 404-408
-
-
Fridrich, J.1
-
12
-
-
0032291652
-
Joint wavelet compression and authentication watermarking
-
October
-
L. Xie and G. R. Arce, "Joint wavelet compression and authentication watermarking," Proc. IEEE Int. Conf. on Image Processing, vol. 2, pp. 427-431, October 1998.
-
(1998)
Proc. IEEE Int. Conf. on Image Processing
, vol.2
, pp. 427-431
-
-
Xie, L.1
Arce, G.R.2
-
14
-
-
0035509773
-
A class of authentication digital watermarks for secure multimedia communication
-
November
-
____, "A class of authentication digital watermarks for secure multimedia communication," IEEE Transactions on Image Processing, vol. 10, no. 11, pp. 1754-1764, November 2001.
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.11
, pp. 1754-1764
-
-
Xie, L.1
Arce, G.R.2
-
15
-
-
0034769478
-
Content-fragile watermarking for image authentication
-
Jan.
-
J. Dittmann, "Content-fragile watermarking for image authentication," in Proc. SPIE, Security and Watermarking of Multimedia Content III, vol. 4314, Jan. 2001, pp. 175-184.
-
(2001)
Proc. SPIE, Security and Watermarking of Multimedia Content III
, vol.4314
, pp. 175-184
-
-
Dittmann, J.1
-
16
-
-
0031378592
-
An invisible watermark technique for image verification
-
October
-
M. Yeung and F. Mintzer, "An invisible watermark technique for image verification," Proc. IEEE Int. Conf. on Image Processing, vol. 2, pp. 680-683, October 1997.
-
(1997)
Proc. IEEE Int. Conf. on Image Processing
, vol.2
, pp. 680-683
-
-
Yeung, M.1
Mintzer, F.2
-
17
-
-
0034443602
-
New fragile authentication watermark for images
-
September
-
J. Fridrich, M. Goljan, and A. C. Baldoza, "New fragile authentication watermark for images," Proc. IEEE Int. Conf. on Image Processing, vol. 1, pp. 446-49, September 2000.
-
(2000)
Proc. IEEE Int. Conf. on Image Processing
, vol.1
, pp. 446-449
-
-
Fridrich, J.1
Goljan, M.2
Baldoza, A.C.3
-
19
-
-
0032312612
-
A public key watermark for image verification and authentication
-
October
-
P. W. Wong, "A public key watermark for image verification and authentication," Proc. IEEE Int. Conf. on Image Processing, vol. 1, pp. 455-459, October 1998.
-
(1998)
Proc. IEEE Int. Conf. on Image Processing
, vol.1
, pp. 455-459
-
-
Wong, P.W.1
-
20
-
-
0003356542
-
Watermarking for image integrity and ownership verification
-
____, "Watermarking for image integrity and ownership verification," in Proc. IS&T PIC Conf., May 1998.
-
Proc. IS&T PIC Conf., May 1998
-
-
Wong, P.W.1
-
21
-
-
0001038665
-
A blind watermark scheme based on structured codebooks
-
J. J. Eggers, J. K. Su, and B. Girod, "A blind watermark scheme based on structured codebooks," in IEE Conf. on Secure Images and Image Authentication, April 2000, pp. 4/1-4/21.
-
IEE Conf. on Secure Images and Image Authentication, April 2000
-
-
Eggers, J.J.1
Su, J.K.2
Girod, B.3
-
22
-
-
0034848594
-
Blind watermarking applied to image authentication
-
May
-
J. J. Eggers and B. Girod, "Blind watermarking applied to image authentication," Proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing, vol. 3, pp. 1977-1980, May 2001.
-
(2001)
Proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing
, vol.3
, pp. 1977-1980
-
-
Eggers, J.J.1
Girod, B.2
-
23
-
-
0033706181
-
Compression compatible fragile and semi-fragile tamper detection
-
January
-
J. C. Boncelet, L. M. Marvel, and G. W. Hartwig, "Compression compatible fragile and semi-fragile tamper detection," in Proc. SPIE, Security and Watermarking of Multimedia Contents II, vol. 3971, January 2000.
-
(2000)
Proc. SPIE, Security and Watermarking of Multimedia Contents II
, vol.3971
-
-
Boncelet, J.C.1
Marvel, L.M.2
Hartwig, G.W.3
-
24
-
-
0032682054
-
Spread spectrum image steganography
-
August
-
L. M. Marvel, C. G. Boncelet Jr, and C. T. Retter, "Spread spectrum image steganography," IEEE Transactions on Image Processing, vol. 8, no. 8, pp. 1075-1083, August 1999.
-
(1999)
IEEE Transactions on Image Processing
, vol.8
, Issue.8
, pp. 1075-1083
-
-
Marvel, L.M.1
Boncelet Jr., C.G.2
Retter, C.T.3
-
25
-
-
0032304995
-
Toward a telltale watermarking technique for tamper-proofing
-
October
-
D. Kundur and D. Hatzinakos, "Toward a telltale watermarking technique for tamper-proofing," Proc. IEEE Int. Conf. on Image Processing, vol. 2, pp. 409-13, October 1998.
-
(1998)
Proc. IEEE Int. Conf. on Image Processing
, vol.2
, pp. 409-413
-
-
Kundur, D.1
Hatzinakos, D.2
-
26
-
-
0034509441
-
Combined watermarking for image authentication and protection
-
August
-
C.-S. Lu, H.-Y. M. Liao, and C.-J. Sze, "Combined watermarking for image authentication and protection," Proc. IEEE Int. Conf. on Multimedia and Expo., vol. 3, pp. 1415-1418, August 2000.
-
(2000)
Proc. IEEE Int. Conf. on Multimedia and Expo.
, vol.3
, pp. 1415-1418
-
-
Lu, C.-S.1
Liao, H.-Y.M.2
Sze, C.-J.3
-
27
-
-
1942466224
-
Structural digital signature for image authentication: An incidental distortion resistant scheme
-
C. S. Liu and H. Y. M. Liao, "Structural digital signature for image authentication: An incidental distortion resistant scheme," in Proc. ACM Multimedia and Security Workshop, 2000.
-
Proc. ACM Multimedia and Security Workshop, 2000
-
-
Liu, C.S.1
Liao, H.Y.M.2
-
28
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
December
-
I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673-1687, December 1997.
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
29
-
-
0030173121
-
A new, fast, and efficient image codec based on set partitioning in hierarchical trees
-
June
-
A. Said and W. A. Pearlman, "A new, fast, and efficient image codec based on set partitioning in hierarchical trees," IEEE Transactions on Circuits and System for Video Technology, vol. 6, no. 3, pp. 243-250, June 1996.
-
(1996)
IEEE Transactions on Circuits and System for Video Technology
, vol.6
, Issue.3
, pp. 243-250
-
-
Said, A.1
Pearlman, W.A.2
-
30
-
-
0029453439
-
A wavelet transform approach to video compression
-
April
-
J. Li, P.-Y. Cheng, and C.-C. J. Kuo, "A wavelet transform approach to video compression," in Proc. SPIE, Wavelet Applications II, vol. 2491, April 1995, pp. 1107-1118.
-
(1995)
Proc. SPIE, Wavelet Applications II
, vol.2491
, pp. 1107-1118
-
-
Li, J.1
Cheng, P.-Y.2
Kuo, C.-C.J.3
-
32
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
February
-
C. Lin and S. F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation," IEEE Transactions on Circuits and Systems of Video Technology, vol. 11, no. 2, pp. 153-168, February 2001.
-
(2001)
IEEE Transactions on Circuits and Systems of Video Technology
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.1
Chang, S.F.2
-
33
-
-
0035763305
-
Comparative assessment of semi-fragile watermarking techniques
-
August
-
O. Ekici, B. Coskin, U. Naci, and B. Sankur, "Comparative assessment of semi-fragile watermarking techniques," in Proc. SPIE, Multimedia Systems and Applications IV, vol. 4518, August 2001.
-
(2001)
Proc. SPIE, Multimedia Systems and Applications IV
, vol.4518
-
-
Ekici, O.1
Coskin, B.2
Naci, U.3
Sankur, B.4
-
34
-
-
85076054853
-
DCT quantization matrices optimized for individual images
-
A. B. Watson, "DCT quantization matrices optimized for individual images," in Proc. SPIE, Human Vision, Visual Processing, and Digital Display IV, vol. 1913, 1993.
-
(1993)
Proc. SPIE, Human Vision, Visual Processing, and Digital Display IV
, vol.1913
-
-
Watson, A.B.1
|