-
2
-
-
20744448335
-
-
[Online]
-
B. Cohen. (2001) BitTorrent. [Online]. Available: http://bitconjurer.org/ BitTorrent/index.html
-
(2001)
BitTorrent
-
-
Cohen, B.1
-
5
-
-
0346959880
-
Morpheus falling?
-
Dec
-
R. Parloff, "Morpheus falling?," IEEE Spectr., vol. 40, no. 12, pp. 18-19, Dec. 2003.
-
(2003)
IEEE Spectr.
, vol.40
, Issue.12
, pp. 18-19
-
-
Parloff, R.1
-
6
-
-
0032656890
-
Copy protection for DVD video
-
Jul.
-
J. A. Bloom, I. J. Cox, T. Kalker, J.-P. M. G. Linnartz, M. L. Miller, and C. B. S. Traw, "Copy protection for DVD video," in Proc. IEEE, vol. 87, Jul. 1999, pp. 1267-1276.
-
(1999)
Proc. IEEE
, vol.87
, pp. 1267-1276
-
-
Bloom, J.A.1
Cox, I.J.2
Kalker, T.3
Linnartz, J.-P.M.G.4
Miller, M.L.5
Traw, C.B.S.6
-
10
-
-
85084163188
-
Reading between the lines: Lessons from the SDMI challenge
-
Washington, DC
-
S. A. Graver, M. Wu, B. Liu, A. Stubblefield, B. Swartzlander, D. W. Wallach, D. Dean, and E. W. Felten, "Reading between the lines: Lessons from the SDMI challenge," presented at the 10th USENIX Security Symp., Washington, DC, 2001.
-
(2001)
10th USENIX Security Symp.
-
-
Graver, S.A.1
Wu, M.2
Liu, B.3
Stubblefield, A.4
Swartzlander, B.5
Wallach, D.W.6
Dean, D.7
Felten, E.W.8
-
11
-
-
20744441056
-
-
School of Elect. Comput. Eng., Purdue Univ., West Lafayette, IN. [Online]
-
E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk, and E. J. Delp. (2004) Advances in video content protection (technical report). School of Elect. Comput. Eng., Purdue Univ., West Lafayette, IN. [Online]. Available: http://dynamo.ecn.purdue.edu/~ace/vid-content/
-
(2004)
Advances in Video Content Protection (Technical Report)
-
-
Lin, E.T.1
Eskicioglu, A.M.2
Lagendijk, R.L.3
Delp, E.J.4
-
12
-
-
20744452308
-
-
[Online]
-
International Intellectual Property Alliance [Online]. Available: http://www.iipa.com
-
-
-
-
13
-
-
20744432280
-
-
[Online]
-
Advanced Television Systems Committee [Online], Available: http://www.atsc.org
-
-
-
-
14
-
-
20744452729
-
-
[Online]
-
Consumers Electronics Association [Online]. Available: http://www.ce.org
-
-
-
-
15
-
-
20744444974
-
-
[Online]
-
Copy Protection Technical Working Group [Online]. Available: http://www.cptwg.org
-
-
-
-
16
-
-
20744458812
-
-
[Online]
-
DVD forum [Online]. Available: http://www.dvdforum.org
-
-
-
-
17
-
-
20744458975
-
-
[Online]
-
Soc. Cable Telecommun. Eng. [Online]. Available: http://www.scte.org
-
-
-
-
18
-
-
20744442680
-
-
[Online]
-
Motion Picture Association of America [Online]. Available: http://www.mpaa.org
-
-
-
-
19
-
-
20744444057
-
-
[Online]
-
Internet Engineering Task Force [Online], Available: http://www.ietf.org/ overview.html
-
-
-
-
20
-
-
20744443441
-
-
[Online]
-
Moving Pictures Expert Group [Online]. Available: http://mpeg. telecomitalialab.com
-
-
-
-
22
-
-
20744457982
-
-
[Online]
-
TV-Anytime forum [Online]. Available: http://www.tv-anytime.org
-
-
-
-
23
-
-
0037399649
-
Security of digital entertainment content from creation to consumption
-
Apr.
-
A. M. Eskicioglu, J. Town, and E. J. Delp, "Security of digital entertainment content from creation to consumption," Signal Process. Image Commun. (Special Issue on Image Security), vol. 18, no. 4, pp. 237-262, Apr. 2003.
-
(2003)
Signal Process. Image Commun. (Special Issue on Image Security)
, vol.18
, Issue.4
, pp. 237-262
-
-
Eskicioglu, A.M.1
Town, J.2
Delp, E.J.3
-
24
-
-
0042349627
-
Protecting intellectual property in digital multimedia networks
-
Jul.
-
A. M. Eskicioglu, "Protecting intellectual property in digital multimedia networks," IEEE Comput., vol. 36, pp. 39-45, Jul. 2003.
-
(2003)
IEEE Comput.
, vol.36
, pp. 39-45
-
-
Eskicioglu, A.M.1
-
25
-
-
0034316289
-
Watermarking of multimedia content for m-commerce applications
-
Nov.
-
F. Hartung and F. Ramme, "Watermarking of multimedia content for m-commerce applications," IEEE Commun. Mag., vol. 38, pp. 78-84, Nov. 2000.
-
(2000)
IEEE Commun. Mag.
, vol.38
, pp. 78-84
-
-
Hartung, F.1
Ramme, F.2
-
26
-
-
0041848575
-
Preventing piracy, reverse engineering, and tampering
-
Jul.
-
G. Naumovich and N. Memon, "Preventing piracy, reverse engineering, and tampering," IEEE Comput., vol. 36, pp. 64-71, Jul. 2003.
-
(2003)
IEEE Comput.
, vol.36
, pp. 64-71
-
-
Naumovich, G.1
Memon, N.2
-
30
-
-
0035279811
-
Streaming video over the internet: Approaches and directions
-
Mar.
-
D. Wu, Y. T. Hou, W. Zhu, Y.-Q. Zhang, and J. M. Peha, "Streaming video over the internet: Approaches and directions," IEEE Trans. Circuits Syst. Video Technol., vol. 11, pp. 282-300, Mar. 2001.
-
(2001)
IEEE Trans. Circuits Syst. Video Technol.
, vol.11
, pp. 282-300
-
-
Wu, D.1
Hou, Y.T.2
Zhu, W.3
Zhang, Y.-Q.4
Peha, J.M.5
-
32
-
-
20744453636
-
-
[Online]
-
World Intellectual Property Organization [Online]. Available: http://www.wipo.org
-
-
-
-
33
-
-
20744442965
-
-
Digital Millennium Copyright Act of 1998
-
Digital Millennium Copyright Act of 1998, U.S. Copyright Office summary [Online]. Available: http://www.loc.gov/copyright/legislation/dmca.pdf
-
U.S. Copyright Office Summary [Online]
-
-
-
34
-
-
20744449257
-
-
[Online]
-
European Copyright Directive [Online]. Available: http://www.eurorights. org/eudmca/CopyrightDirective.html
-
-
-
-
39
-
-
20744457831
-
-
[Online]
-
Digital Transmission Content Protection [Online]. Available: http://www.dtcp.com
-
-
-
-
40
-
-
20744452155
-
-
[Online]
-
High-Bandwidth Digital Content Protection [Online]. Available: http://www.digital-CP.com
-
-
-
-
47
-
-
20744435851
-
-
Windows Media DRM [Online]. Available: http://www.rnicrosoft.com/windows/ windowsmedia/drm.aspx
-
Windows Media DRM [Online]
-
-
-
48
-
-
20744444056
-
-
Helix DRM [Online]. Available: http://www.realnetworks.com/products/dnn/ index.html
-
Helix DRM [Online]
-
-
-
49
-
-
1442284162
-
Multimedia security in group communications: Recent progress in key management, authentication, and watermarking
-
Sep.
-
A. M. Eskicioglu, "Multimedia security in group communications: Recent progress in key management, authentication, and watermarking," ACM Multimedia Syst. J. (Special Issue on Multimedia Security), pp. 239-248, Sep. 2003.
-
(2003)
ACM Multimedia Syst. J. (Special Issue on Multimedia Security)
, pp. 239-248
-
-
Eskicioglu, A.M.1
-
50
-
-
20744437073
-
-
[Online]
-
Internet Digital Rights Management (IDRM) Research Group [Online]. Available: http://www.idrm.org
-
-
-
-
51
-
-
1942433797
-
DRM {And, Or, Vs.} the law
-
Apr.
-
P. Samuelson, "DRM {And, Or, Vs.} the law," Commun. ACM: Special Issue Digital Rights Management and Fair Use by Design, vol. 46, no. 4, pp. 41-45, Apr. 2003.
-
(2003)
Commun. ACM: Special Issue Digital Rights Management and Fair Use by Design
, vol.46
, Issue.4
, pp. 41-45
-
-
Samuelson, P.1
-
52
-
-
2442601764
-
A skeptical view of DRM and fair use
-
Apr.
-
E. W. Felten, "A skeptical view of DRM and fair use," Commun. ACM: Special Issue Digital Rights Management Fair Use by Design, vol. 46, no. 4, pp. 56-59, Apr. 2003.
-
(2003)
Commun. ACM: Special Issue Digital Rights Management Fair Use by Design
, vol.46
, Issue.4
, pp. 56-59
-
-
Felten, E.W.1
-
55
-
-
11144292628
-
How DRM-based content delivery systems disrupt expectations of "personal use"
-
D. K. Mulligan, J. Han, and A. J. Burstein, "How DRM-based content delivery systems disrupt expectations of "personal use"," in Proc. ACM Workshop Digital Rights Management, 2003, pp. 77-89.
-
(2003)
Proc. ACM Workshop Digital Rights Management
, pp. 77-89
-
-
Mulligan, D.K.1
Han, J.2
Burstein, A.J.3
-
58
-
-
1842526611
-
Streaming video and rate scalable compression: What are the challenges for watermarking?
-
Jan.
-
E. T. Lin, C. I. Podilchuk, T. Kalker, and E. J. Delp, "Streaming video and rate scalable compression: What are the challenges for watermarking?," J. Electron. Imaging, vol. 13, no. 1, pp. 198-205, Jan. 2004.
-
(2004)
J. Electron. Imaging
, vol.13
, Issue.1
, pp. 198-205
-
-
Lin, E.T.1
Podilchuk, C.I.2
Kalker, T.3
Delp, E.J.4
-
60
-
-
0036612601
-
Adaptive motion-compensation fine-granular-scalability (AMC-FGS) for wireless video
-
Jun.
-
M. van der Schaar and H. Radha, "Adaptive motion-compensation fine-granular-scalability (AMC-FGS) for wireless video," IEEE Trans. Circuits Syst. Video Technol., vol. 12, pp. 360-371, Jun. 2002.
-
(2002)
IEEE Trans. Circuits Syst. Video Technol.
, vol.12
, pp. 360-371
-
-
Van Der Schaar, M.1
Radha, H.2
-
61
-
-
0035279160
-
Video multicast using layered FEC and scalable compression
-
Mar.
-
W.-T. Tan and A. Zakhor, "Video multicast using layered FEC and scalable compression," IEEE Trans. Circuits Syst. Video Technol., vol. 11, pp. 373-386, Mar. 2001.
-
(2001)
IEEE Trans. Circuits Syst. Video Technol.
, vol.11
, pp. 373-386
-
-
Tan, W.-T.1
Zakhor, A.2
-
62
-
-
0035279159
-
Overview of fine granularity scalability in MPEG-4 video standard
-
Mar.
-
W. Li, "Overview of fine granularity scalability in MPEG-4 video standard," IEEE Trans. Circuits Syst. Video Technol., vol. 11, pp. 301-317, Mar. 2001.
-
(2001)
IEEE Trans. Circuits Syst. Video Technol.
, vol.11
, pp. 301-317
-
-
Li, W.1
-
64
-
-
1542538812
-
Selective encryption of multimedia content in distribution networks: Challenges and new directions
-
Scottsdale, AZ, Nov. 17-19
-
X. Liu and A. M. Eskicioglu, "Selective encryption of multimedia content in distribution networks: Challenges and new directions," presented at the 2nd Int. Conf. Communications, Internet, and Information Technology, Scottsdale, AZ, Nov. 17-19, 2003.
-
(2003)
2nd Int. Conf. Communications, Internet, and Information Technology
-
-
Liu, X.1
Eskicioglu, A.M.2
-
65
-
-
0042522792
-
SCAN-based compression-encryption-hiding for video on demand
-
Jul.-Sep.
-
N. Bourbakis and A. Dollas, "SCAN-based compression-encryption- hiding for video on demand," IEEE Trans. Multimedia, pp. 79-87, Jul.-Sep. 2003.
-
(2003)
IEEE Trans. Multimedia
, pp. 79-87
-
-
Bourbakis, N.1
Dollas, A.2
-
67
-
-
84936892450
-
Cryptology for digital TV broadcasting
-
Jun.
-
B. Macq and J.-J. Quisquater, "Cryptology for digital TV broadcasting," Proc. IEEE, vol. 83, no. 6, pp. 944-957, Jun. 1995.
-
(1995)
Proc. IEEE
, vol.83
, Issue.6
, pp. 944-957
-
-
Macq, B.1
Quisquater, J.-J.2
-
69
-
-
18544395678
-
Evaluation of selective encryption techniques for secure transmission of MPEG-compressed bit-streams
-
A. M. Alattar and G. I. Al-Regib, "Evaluation of selective encryption techniques for secure transmission of MPEG-compressed bit-streams," in Proc. IEEE Int. Symp. Circuits and Systems, 1999, pp. 340-343.
-
(1999)
Proc. IEEE Int. Symp. Circuits and Systems
, pp. 340-343
-
-
Alattar, A.M.1
Al-Regib, G.I.2
-
70
-
-
0038273965
-
Efficient frequency domain selective scrambling of digital video
-
Mar.
-
W. Zeng and S. Lei, "Efficient frequency domain selective scrambling of digital video," IEEE Trans. Multimedia, vol. 5, pp. 118-129, Mar. 2003.
-
(2003)
IEEE Trans. Multimedia
, vol.5
, pp. 118-129
-
-
Zeng, W.1
Lei, S.2
-
71
-
-
0036612847
-
A format-compliant configurable encryption framework for access control of video
-
Jun.
-
J. G. Wen, M. Severa, W. Zeng, M. H. Luttrell, and W. Jin, "A format-compliant configurable encryption framework for access control of video," IEEE Trans. Circuits Syst. Video Technol., vol. 12, pp. 545-557, Jun. 2002.
-
(2002)
IEEE Trans. Circuits Syst. Video Technol.
, vol.12
, pp. 545-557
-
-
Wen, J.G.1
Severa, M.2
Zeng, W.3
Luttrell, M.H.4
Jin, W.5
-
72
-
-
0034249821
-
Partial encryption of compressed images and videos
-
Aug.
-
H. Cheng and X. Li, "Partial encryption of compressed images and videos," IEEE Trans. Signal Process., vol. 48, pp. 2439-2451, Aug. 2000.
-
(2000)
IEEE Trans. Signal Process
, vol.48
, pp. 2439-2451
-
-
Cheng, H.1
Li, X.2
-
73
-
-
1542489185
-
Transporting real-time video over the internet: Challenges and approaches
-
Dec.
-
D. Wu, Y. T. Hou, and Y.-Q. Zhang, "Transporting real-time video over the internet: Challenges and approaches," Proc. IEEE, vol. 88, no. 12, pp. 1855-1875, Dec. 2000.
-
(2000)
Proc. IEEE
, vol.88
, Issue.12
, pp. 1855-1875
-
-
Wu, D.1
Hou, Y.T.2
Zhang, Y.-Q.3
-
74
-
-
84925680300
-
Video transcoding architectures and techniques: An overview
-
Mar.
-
A. Vetro, C. Christopoulos, and H. Sun, "Video transcoding architectures and techniques: An overview," IEEE Signal Process. Mag., vol. 20, pp. 18-29, Mar. 2003.
-
(2003)
IEEE Signal Process. Mag.
, vol.20
, pp. 18-29
-
-
Vetro, A.1
Christopoulos, C.2
Sun, H.3
-
76
-
-
0033908479
-
MPEG-4 natural video coding-An overview
-
T. Ebrahimi and C. Home, "MPEG-4 natural video coding-An overview," Signal Process. Image Commun., vol. 15, no. 4, pp. 365-385, 2000.
-
(2000)
Signal Process. Image Commun.
, vol.15
, Issue.4
, pp. 365-385
-
-
Ebrahimi, T.1
Home, C.2
-
77
-
-
0032202836
-
H.263+: Video coding at low bit rates
-
Nov.
-
G. Cote, B. Erol, M. Gallant, and F. Kossentini, "H.263+: Video coding at low bit rates," IEEE Trans. Circuits Syst. Video Technol., vol. 8, pp. 849-866, Nov. 1998.
-
(1998)
IEEE Trans. Circuits Syst. Video Technol.
, vol.8
, pp. 849-866
-
-
Cote, G.1
Erol, B.2
Gallant, M.3
Kossentini, F.4
-
78
-
-
0036612630
-
A robust fine granularity scalability using trellis-based predictive leak
-
Jun.
-
H.-C. Huang, C.-N. Wang, and T. Chiang, "A robust fine granularity scalability using trellis-based predictive leak," IEEE Trans. Circuits Syst. Video Technol., vol. 12, no. 6, pp. 372-385, Jun. 2002.
-
(2002)
IEEE Trans. Circuits Syst. Video Technol.
, vol.12
, Issue.6
, pp. 372-385
-
-
Huang, H.-C.1
Wang, C.-N.2
Chiang, T.3
-
79
-
-
0037745868
-
Efficient and fully scalable encryption for MPEG-4 FGS
-
C. Yuan, B. B. Zhu, Y. Wang, S. Li, and Y. Zhong, "Efficient and fully scalable encryption for MPEG-4 FGS," in Proc. Int. Symp. Circuits Syst., vol. 2, 2003, pp. 620-623.
-
(2003)
Proc. Int. Symp. Circuits Syst.
, vol.2
, pp. 620-623
-
-
Yuan, C.1
Zhu, B.B.2
Wang, Y.3
Li, S.4
Zhong, Y.5
-
81
-
-
0035163793
-
Secure scalable streaming enabling transcoding without decryption
-
S. J. Wee and J. G. Apostolopoulos, "Secure scalable streaming enabling transcoding without decryption," in Proc. Int. Conf. Image Processing, vol. 1, 2001, pp. 437-440.
-
(2001)
Proc. Int. Conf. Image Processing
, vol.1
, pp. 437-440
-
-
Wee, S.J.1
Apostolopoulos, J.G.2
-
82
-
-
85032752384
-
Digital watermarking for DVD video copy protection
-
Sep.
-
M. Maes, T. Kalker, J.-P. M. G. Linnartz, J. Talstra, G. F. G. Depovere, and J. Haitsma, "Digital watermarking for DVD video copy protection," IEEE Signal Process. Mag., vol. 17, pp. 47-57, Sep. 2000.
-
(2000)
IEEE Signal Process. Mag.
, vol.17
, pp. 47-57
-
-
Maes, M.1
Kalker, T.2
Linnartz, J.-P.M.G.3
Talstra, J.4
Depovere, G.F.G.5
Haitsma, J.6
-
83
-
-
0037399652
-
A guide tour of video watermarking
-
Apr.
-
G. Doërr and J.-L. Dugelay, "A guide tour of video watermarking," Signal Process. Image Commun., vol. 18, no. 4, pp. 263-282, Apr. 2003.
-
(2003)
Signal Process. Image Commun.
, vol.18
, Issue.4
, pp. 263-282
-
-
Doërr, G.1
Dugelay, J.-L.2
-
85
-
-
0035391983
-
Digital watermarking: Algorithms and applications
-
Jul.
-
C. I. Podilchuk and E. J. Delp, "Digital watermarking: Algorithms and applications," IEEE Signal Process. Mag., vol. 18, pp. 33-46, Jul. 2001.
-
(2001)
IEEE Signal Process. Mag.
, vol.18
, pp. 33-46
-
-
Podilchuk, C.I.1
Delp, E.J.2
-
86
-
-
0035416648
-
Watermark embedding: Hiding a signal within a cover image
-
Aug.
-
M. Barni, C. I. Podilchuk, F. Bartolini, and E. J. Delp, "Watermark embedding: Hiding a signal within a cover image," IEEE Commun. Mag., pp. 102-108, Aug. 2001.
-
(2001)
IEEE Commun. Mag.
, pp. 102-108
-
-
Barni, M.1
Podilchuk, C.I.2
Bartolini, F.3
Delp, E.J.4
-
87
-
-
0034266804
-
Watermarking digital image and video data: A state-of-the-art overview
-
Sep.
-
G. Langelaar, I. Setyawan, and R. Lagendijk, "Watermarking digital image and video data: A state-of-the-art overview," IEEE Signal Process. Mag., vol. 17, pp. 20-46, Sep. 2000.
-
(2000)
IEEE Signal Process. Mag.
, vol.17
, pp. 20-46
-
-
Langelaar, G.1
Setyawan, I.2
Lagendijk, R.3
-
89
-
-
0032634857
-
Multimedia watermarking techniques
-
Jul.
-
F. Hartung and M. Kutter, "Multimedia watermarking techniques," Proc. IEEE, vol. 87, no. 7, pp. 1079-1107, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1079-1107
-
-
Hartung, F.1
Kutter, M.2
-
90
-
-
0032664574
-
Perceptual watermarks for digital images and video
-
Jul.
-
R. Wolfgang, C. Podilchuk, and E. Delp, "Perceptual watermarks for digital images and video," Proc. IEEE, vol. 87, no. 7, pp. 1108-1126, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1108-1126
-
-
Wolfgang, R.1
Podilchuk, C.2
Delp, E.3
-
91
-
-
0242660404
-
Advantages and drawbacks of multiplicative spread spectrum watermarking
-
Jan.
-
M. Barni, F. Bartolini, and A. D. Rosa, "Advantages and drawbacks of multiplicative spread spectrum watermarking," Proc. SPIE Security Watermarking of Multimedia Contents V, pp. 290-299, Jan. 2003.
-
(2003)
Proc. SPIE Security Watermarking of Multimedia Contents V
, pp. 290-299
-
-
Barni, M.1
Bartolini, F.2
Rosa, A.D.3
-
92
-
-
0037737759
-
Scalar costa scheme for information embedding
-
Apr.
-
J. J. Eggers, R. Bäuml, R. Tzschoppe, and B. Girod, "Scalar costa scheme for information embedding," IEEE Trans. Signal Process., vol. 15, pp. 1003-1019, Apr. 2003.
-
(2003)
IEEE Trans. Signal Process
, vol.15
, pp. 1003-1019
-
-
Eggers, J.J.1
Bäuml, R.2
Tzschoppe, R.3
Girod, B.4
-
93
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
May
-
B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inform. Theory, vol. 47, pp. 1423-1443, May 2001.
-
(2001)
IEEE Trans. Inform. Theory
, vol.47
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
94
-
-
0036030420
-
Synchronization-insensitive video watermarking using structured noise pattern
-
Jan.
-
I. Setyawan, G. Kakes, and R. L. Lagendijk, "Synchronization- insensitive video watermarking using structured noise pattern," Proc. SPIE Security Watermarking of Multimedia Contents IV, pp. 520-530, Jan. 2002.
-
(2002)
Proc. SPIE Security Watermarking of Multimedia Contents IV
, pp. 520-530
-
-
Setyawan, I.1
Kakes, G.2
Lagendijk, R.L.3
-
95
-
-
0033705373
-
A new approach for transformation invariant image and video watermarking in the spatial domain: SSP-Self spanning patterns
-
Jan.
-
J. Dittmann, T. Fiebig, and R. Steinmetz, "A new approach for transformation invariant image and video watermarking in the spatial domain: SSP-Self spanning patterns," Proc. SPIE Security Watermarking of Multimedia Contents II, vol. 3971, pp. 176-185, Jan. 2000.
-
(2000)
Proc. SPIE Security Watermarking of Multimedia Contents II
, vol.3971
, pp. 176-185
-
-
Dittmann, J.1
Fiebig, T.2
Steinmetz, R.3
-
96
-
-
0033601661
-
A video watermarking system for broadcast monitoring
-
Jan.
-
T. Kalker, G. Depovere, J. Haitsma, and M. Maes, "A video watermarking system for broadcast monitoring," Proc. SPIE Security Watermarking of Multimedia Contents, vol. 3657, pp. 103-112, Jan. 1999.
-
(1999)
Proc. SPIE Security Watermarking of Multimedia Contents
, vol.3657
, pp. 103-112
-
-
Kalker, T.1
Depovere, G.2
Haitsma, J.3
Maes, M.4
-
97
-
-
0033601673
-
Robust 3D DFT video watermarking
-
Jan.
-
F. Deguillaume, G. Csurka, J. O'Ruanaidh, and T. Pun, "Robust 3D DFT video watermarking," Proc. SPIE Security Watermarking Multimedia Contents I, vol. 3657, pp. 113-124, Jan. 1999.
-
(1999)
Proc. SPIE Security Watermarking Multimedia Contents I
, vol.3657
, pp. 113-124
-
-
Deguillaume, F.1
Csurka, G.2
O'Ruanaidh, J.3
Pun, T.4
-
98
-
-
0141638482
-
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression
-
Aug.
-
X. Kang, J. Huang, Y. Q. Shi, and Y. Lin, "A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression," IEEE Trans. Circuits Syst. Video Technol., vol. 13, pp. 776-786, Aug. 2003.
-
(2003)
IEEE Trans. Circuits Syst. Video Technol.
, vol.13
, pp. 776-786
-
-
Kang, X.1
Huang, J.2
Shi, Y.Q.3
Lin, Y.4
-
99
-
-
0141750478
-
Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video
-
Aug.
-
A. M. Alattar, E. T. Lin, and M. U. Celik, "Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video," IEEE Trans. Circuits Syst. Video Technol., vol. 13, pp. 787-800, Aug. 2003.
-
(2003)
IEEE Trans. Circuits Syst. Video Technol.
, vol.13
, pp. 787-800
-
-
Alattar, A.M.1
Lin, E.T.2
Celik, M.U.3
-
100
-
-
0035127750
-
Optimal differential energy watermarking of DCT encoded images and video
-
Jan.
-
G. C. Langelaar and R. L. Lagendijk, "Optimal differential energy watermarking of DCT encoded images and video," IEEE Trans. Image Process., vol. 10, pp. 148-158, Jan. 2001.
-
(2001)
IEEE Trans. Image Process.
, vol.10
, pp. 148-158
-
-
Langelaar, G.C.1
Lagendijk, R.L.2
-
101
-
-
0032072064
-
Watermarking of uncompressed and compressed video
-
May
-
F. Hartung and B. Girod, "Watermarking of uncompressed and compressed video," Signal Process., vol. 66, no. 3, pp. 283-301, May 1998.
-
(1998)
Signal Process
, vol.66
, Issue.3
, pp. 283-301
-
-
Hartung, F.1
Girod, B.2
-
102
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Dec.
-
I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process., vol. 6, pp. 1673-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Process
, vol.6
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
103
-
-
0037303377
-
DWT-based high capacity blind video watermarking, invariant to geometrical attacks
-
C. V. Serdean, M. A. Ambroze, M. Tomlinson, and J. G. Wade, "DWT-based high capacity blind video watermarking, invariant to geometrical attacks," in Proc. IEEE Vision, Image Signal Processing, vol. 150, 2003, pp. 51-58.
-
(2003)
Proc. IEEE Vision, Image Signal Processing
, vol.150
, pp. 51-58
-
-
Serdean, C.V.1
Ambroze, M.A.2
Tomlinson, M.3
Wade, J.G.4
-
104
-
-
0032070304
-
Multiresolution scene-based video watermarking using perceptual models
-
May
-
M. D. Swanson, B. Zhu, and A. H. Tewfik, "Multiresolution scene-based video watermarking using perceptual models," IEEE J. Sel. Areas Commun., vol. 16, pp. 540-550, May 1998.
-
(1998)
IEEE J. Sel. Areas Commun.
, vol.16
, pp. 540-550
-
-
Swanson, M.D.1
Zhu, B.2
Tewfik, A.H.3
-
105
-
-
0033713854
-
Combined video and audio watermarking: Embedding content information in multimedia data
-
Jan.
-
J. Dittmann, M. Steinebach, I. Rimac, S. Fischer, and R. Steinmetz, "Combined video and audio watermarking: Embedding content information in multimedia data," Proc. SPIE Security Watermarking Multimedia Contents II, vol. 3971, pp. 455-464, Jan. 2000.
-
(2000)
Proc. SPIE Security Watermarking Multimedia Contents II
, vol.3971
, pp. 455-464
-
-
Dittmann, J.1
Steinebach, M.2
Rimac, I.3
Fischer, S.4
Steinmetz, R.5
-
106
-
-
84908159241
-
Human visual system features enabling watermarking
-
J. F. Delaigle, C. Devleeschouwer, B. Macq, and I. Lagendijk, "Human visual system features enabling watermarking," in Proc. IEEE Int. Conf. Multimedia Expo, vol. 2, 2002, pp. 489-492.
-
(2002)
Proc. IEEE Int. Conf. Multimedia Expo
, vol.2
, pp. 489-492
-
-
Delaigle, J.F.1
Devleeschouwer, C.2
Macq, B.3
Lagendijk, I.4
-
108
-
-
0036999125
-
Power-spectrum condition for energy-efficient watermarking
-
Dec.
-
J. K. Su and B. Girod, "Power-spectrum condition for energy-efficient watermarking," IEEE Trans. Multimedia, vol. 4, pp. 551-560, Dec. 2002.
-
(2002)
IEEE Trans. Multimedia
, vol.4
, pp. 551-560
-
-
Su, J.K.1
Girod, B.2
-
109
-
-
0034780384
-
Optimal adaptive diversity watermarking with channel state estimation
-
Jan.
-
S. Voloshynovskiy, F. Deguillaume, S. Pereira, and T. Pun, "Optimal adaptive diversity watermarking with channel state estimation," Proc. SPIE Security Watermarking Multimedia Contents III, vol. 4314, pp. 673-685, Jan. 2001.
-
(2001)
Proc. SPIE Security Watermarking Multimedia Contents III
, vol.4314
, pp. 673-685
-
-
Voloshynovskiy, S.1
Deguillaume, F.2
Pereira, S.3
Pun, T.4
-
110
-
-
0035369792
-
Attack modeling: Toward a second generation watermarking benchmark
-
Jun.
-
S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun, "Attack modeling: Toward a second generation watermarking benchmark," Signal Process., vol. 81, no. 6, pp. 1177-1214, Jun. 2001.
-
(2001)
Signal Process
, vol.81
, Issue.6
, pp. 1177-1214
-
-
Voloshynovskiy, S.1
Pereira, S.2
Iquise, V.3
Pun, T.4
-
111
-
-
0035417219
-
Attacks on digital watermarks: Classification, estimation-based attacks, and benchmarks
-
Aug.
-
S. Voloshynovskiy, S. Pereira, T. Pun, J. J. Eggers, and J. K. Su, "Attacks on digital watermarks: Classification, estimation-based attacks, and benchmarks," IEEE Commun. Mag., vol. 39, pp. 118-126, Aug. 2001.
-
(2001)
IEEE Commun. Mag.
, vol.39
, pp. 118-126
-
-
Voloshynovskiy, S.1
Pereira, S.2
Pun, T.3
Eggers, J.J.4
Su, J.K.5
-
112
-
-
0000230675
-
Attacks on copyright marking systems
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Attacks on copyright marking systems," in Proc. 2nd Int. Workshop Information Hiding, 1998, pp. 219-239.
-
(1998)
Proc. 2nd Int. Workshop Information Hiding
, pp. 219-239
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
113
-
-
0345565901
-
Watermarking video, hierarchical embedding in motion vectors
-
Y. Bodo, N. Laurent, and J.-L. Dugelay, "Watermarking video, hierarchical embedding in motion vectors," in Proc. IEEE Int. Conf. Image Processing, vol. 2, 2003, pp. 739-742.
-
(2003)
Proc. IEEE Int. Conf. Image Processing
, vol.2
, pp. 739-742
-
-
Bodo, Y.1
Laurent, N.2
Dugelay, J.-L.3
-
114
-
-
84949452797
-
Video watermark technique in motion vector
-
J. Zhang, J. Li, and L. Zhang, "Video watermark technique in motion vector," in Proc. 14th Brazilian Symp. Computer Graphics and Image Processing, 2001, pp. 179-182.
-
(2001)
Proc. 14th Brazilian Symp. Computer Graphics and Image Processing
, pp. 179-182
-
-
Zhang, J.1
Li, J.2
Zhang, L.3
-
115
-
-
0032288716
-
Real-time labeling of MPEG-2 compressed video
-
Dec.
-
G. C. Langelaar, R. L. Lagendijk, and J. Biemond, "Real-time labeling of MPEG-2 compressed video," J. Visual Commun. Image Representat., vol. 9, no. 4, pp. 256-270, Dec. 1998.
-
(1998)
J. Visual Commun. Image Representat.
, vol.9
, Issue.4
, pp. 256-270
-
-
Langelaar, G.C.1
Lagendijk, R.L.2
Biemond, J.3
-
117
-
-
0027612497
-
Principles of key management
-
Jun.
-
W. Fumy and P. Landrock, "Principles of key management," IEEE J. Sel. Areas Commun., vol. 11, pp. 785-793, Jun. 1993.
-
(1993)
IEEE J. Sel. Areas Commun.
, vol.11
, pp. 785-793
-
-
Fumy, W.1
Landrock, P.2
-
118
-
-
0017018484
-
New directions in cryptography
-
Nov.
-
W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inform. Theory, vol. IT-22, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Inform. Theory
, vol.IT-22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
119
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Dec.
-
R. M. Needham and M. D. Schroeder, "Using encryption for authentication in large networks of computers," Commun. ACM, vol. 21, no. 12, pp. 993-999, Dec. 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
120
-
-
0037250819
-
Security issues and solutions in multicast content distribution: A survey
-
Jan./Feb.
-
P. Judge and M. Ammar, "Security issues and solutions in multicast content distribution: A survey," IEEE Network, vol. 17, no. 1, pp. 30-36, Jan./Feb. 2003.
-
(2003)
IEEE Network
, vol.17
, Issue.1
, pp. 30-36
-
-
Judge, P.1
Ammar, M.2
-
121
-
-
0344395626
-
Key management and distribution for secure multimedia multicast
-
Dec.
-
W. Trappe, J. Song, R. Poovendran, and K. J. R. Liu, "Key management and distribution for secure multimedia multicast," IEEE Trans. Multimedia, vol. 5, pp. 544-557, Dec. 2003.
-
(2003)
IEEE Trans. Multimedia
, vol.5
, pp. 544-557
-
-
Trappe, W.1
Song, J.2
Poovendran, R.3
Liu, K.J.R.4
-
123
-
-
0242414397
-
Key management approaches to offer data confidentiality for secure multicast
-
Sep./Oct.
-
K.-C. Chan and S.-H. G. Chan, "Key management approaches to offer data confidentiality for secure multicast," IEEE Network, vol. 17, no. 5, pp. 30-39, Sep./Oct. 2003.
-
(2003)
IEEE Network
, vol.17
, Issue.5
, pp. 30-39
-
-
Chan, K.-C.1
Chan, S.-H.G.2
-
124
-
-
0345565893
-
A survey of key management for secure group communication
-
Sep.
-
S. Rafaeli and D. Hutchison, "A survey of key management for secure group communication," ACM Comput. Surveys, vol. 35, no. 3, pp. 309-329, Sep. 2003.
-
(2003)
ACM Comput. Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
125
-
-
84975035144
-
Key management for encrypted broadcast
-
May
-
A. Wool, "Key management for encrypted broadcast," ACM Trans. Inform. Syst. Security, vol. 3, no. 2, pp. 107-134, May 2000.
-
(2000)
ACM Trans. Inform. Syst. Security
, vol.3
, Issue.2
, pp. 107-134
-
-
Wool, A.1
-
126
-
-
0033356116
-
A survey of security issues in multicast communications
-
Nov./Dec.
-
M. J. Moyer, J. R. Rao, and P. Rohatgi, "A survey of security issues in multicast communications," IEEE Network, vol. 13, no. 6, pp. 12-23, Nov./Dec. 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 12-23
-
-
Moyer, M.J.1
Rao, J.R.2
Rohatgi, P.3
-
127
-
-
0033601690
-
A secure multicast protocol with copyright protection
-
Jan.
-
H. hua Chu, L. Qiao, and K. Nahrstedt, "A secure multicast protocol with copyright protection," Proc. SPIE Security Watermarking of Multimedia Contents, vol. 3657, pp. 460-471, Jan. 1999.
-
(1999)
Proc. SPIE Security Watermarking of Multimedia Contents
, vol.3657
, pp. 460-471
-
-
Hua Chu, H.1
Qiao, L.2
Nahrstedt, K.3
-
130
-
-
84873648175
-
Enabling hierarchical and bulk-distribution for watermarked content
-
New Orleans, LA
-
G. Caronni and C. Schuba, "Enabling hierarchical and bulk-distribution for watermarked content," presented at the 17th Annu. Computer Security Applications Conf., New Orleans, LA, 2001.
-
(2001)
17th Annu. Computer Security Applications Conf.
-
-
Caronni, G.1
Schuba, C.2
-
131
-
-
0038104797
-
Blind pattern matching attack on watermarking systems
-
Apr.
-
D. Kirovski and F. A. P. Petitcolas, "Blind pattern matching attack on watermarking systems," IEEE Trans. Signal Process., vol. 51, pp. 1045-1053, Apr. 2003.
-
(2003)
IEEE Trans. Signal Process
, vol.51
, pp. 1045-1053
-
-
Kirovski, D.1
Petitcolas, F.A.P.2
-
132
-
-
0033688391
-
Generalized watermarking attack based on watermark estimation and perceptual remodulation
-
Jan.
-
S. Voloshynovskiy, S. Pereira, A. Herrigel, N. Baumgartner, and T. Pun, "Generalized watermarking attack based on watermark estimation and perceptual remodulation," Proc. SPIE Security Watermarking Multimedia Contents II, vol. 3971, pp. 358-370, Jan. 2000.
-
(2000)
Proc. SPIE Security Watermarking Multimedia Contents II
, vol.3971
, pp. 358-370
-
-
Voloshynovskiy, S.1
Pereira, S.2
Herrigel, A.3
Baumgartner, N.4
Pun, T.5
-
133
-
-
4744374963
-
Temporal synchronization in video watermarking
-
Oct.
-
E. T. Lin and E. J. Delp, "Temporal synchronization in video watermarking," IEEE Trans. Signal Process., vol. 52, no. 10, pp. 3007-3022, Oct. 2004.
-
(2004)
IEEE Trans. Signal Process
, vol.52
, Issue.10
, pp. 3007-3022
-
-
Lin, E.T.1
Delp, E.J.2
-
134
-
-
0036287492
-
A robust DWT-based video watermarking algorithm
-
H. Liu, N. Chen, J. Huang, X. Huang, and Y. Q. Shi, "A robust DWT-based video watermarking algorithm," in Proc. IEEE Int. Symp. Circuits Systems, vol. 3, 2002, pp. 631-634.
-
(2002)
Proc. IEEE Int. Symp. Circuits Systems
, vol.3
, pp. 631-634
-
-
Liu, H.1
Chen, N.2
Huang, J.3
Huang, X.4
Shi, Y.Q.5
-
135
-
-
0035335388
-
Rotation, scale, and translation resilient watermarking for images
-
May
-
C.-Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller, and Y. M. Lui, "Rotation, scale, and translation resilient watermarking for images," IEEE Trans. Image Process., vol. 10, pp. 767-782, May 2001.
-
(2001)
IEEE Trans. Image Process
, vol.10
, pp. 767-782
-
-
Lin, C.-Y.1
Wu, M.2
Bloom, J.A.3
Cox, I.J.4
Miller, M.L.5
Lui, Y.M.6
-
136
-
-
0032074148
-
Rotation, scale and translation invariant spread spectrum digital image watermarking
-
May
-
J. J. O'Ruanaidh and T. Pun, "Rotation, scale and translation invariant spread spectrum digital image watermarking," Signal Process., vol. 66, no. 3, pp. 303-317, May 1998.
-
(1998)
Signal Process
, vol.66
, Issue.3
, pp. 303-317
-
-
O'Ruanaidh, J.J.1
Pun, T.2
-
137
-
-
0036029954
-
Video watermarking resisting to rotation, scale, and translation
-
Jan.
-
X. Niu, M. Schmucker, and C. Busch, "Video watermarking resisting to rotation, scale, and translation," Proc. SPIE Security Watermarking of Multimedia Contents IV, vol. 4675, pp. 512-519, Jan. 2002.
-
(2002)
Proc. SPIE Security Watermarking of Multimedia Contents IV
, vol.4675
, pp. 512-519
-
-
Niu, X.1
Schmucker, M.2
Busch, C.3
-
138
-
-
0141695212
-
Self-synchronizing watermark detection for MPEG-4 objects
-
N. V. Boulgouris, F. D. Koravos, and M. G. Strintzis, "Self-synchronizing watermark detection for MPEG-4 objects," in Proc. 8th lEEE Int. Conf. Electronics, Circuits, Systems 2001, vol. 3, 2001, pp. 1371-1374.
-
(2001)
Proc. 8th LEEE Int. Conf. Electronics, Circuits, Systems 2001
, vol.3
, pp. 1371-1374
-
-
Boulgouris, N.V.1
Koravos, F.D.2
Strintzis, M.G.3
-
139
-
-
0034441174
-
Generalized 2-D cyclic patterns for secret watermark generation
-
D. Delannay and B. Macq, "Generalized 2-D cyclic patterns for secret watermark generation," in Proc. IEEE Int. Conf. Image Processing, vol. 2, 2000, pp. 77-79.
-
(2000)
Proc. IEEE Int. Conf. Image Processing
, vol.2
, pp. 77-79
-
-
Delannay, D.1
Macq, B.2
-
140
-
-
0036709226
-
Geometrically invariant watermarking using feature points
-
Sep.
-
P. Bas, J.-M. Chassery, and B. Macq, "Geometrically invariant watermarking using feature points," IEEE Trans. Image Process., vol. 11, pp. 1014-1028, Sep. 2002.
-
(2002)
IEEE Trans. Image Process
, vol.11
, pp. 1014-1028
-
-
Bas, P.1
Chassery, J.-M.2
Macq, B.3
-
142
-
-
0345528997
-
Collusion-resilient fingerprinting using random pre-warping
-
M. U. Celik, G. Sharma, and A. M. Tekalp, "Collusion-resilient fingerprinting using random pre-warping," in Proc. IEEE Int. Conf. Image Processing, 2003, pp. 509-512.
-
(2003)
Proc. IEEE Int. Conf. Image Processing
, pp. 509-512
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
-
143
-
-
0036451747
-
Anti-collusion codes: Multi-user and multimedia perspectives
-
W. Trappe, M. Wu, and K. J. R. Liu, "Anti-collusion codes: Multi-user and multimedia perspectives," in Proc. IEEE Int. Conf. Image Processing, vol. 2, 2002, pp. 149-152.
-
(2002)
Proc. IEEE Int. Conf. Image Processing
, vol.2
, pp. 149-152
-
-
Trappe, W.1
Wu, M.2
Liu, K.J.R.3
-
144
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
Sep.
-
D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," IEEE Trans. Inf. Theory, vol. 44, pp. 1897-1905, Sep. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
145
-
-
18844370638
-
Watermarking schemes provably secure against copy and ambiguity attacks
-
A. Adelsbach, S. Katzenbeisser, and H. Veith, "Watermarking schemes provably secure against copy and ambiguity attacks," in Proc. ACM Workshop Digital Rights Management, 2003, pp. 111-119.
-
(2003)
Proc. ACM Workshop Digital Rights Management
, pp. 111-119
-
-
Adelsbach, A.1
Katzenbeisser, S.2
Veith, H.3
-
146
-
-
0041320695
-
A general framework for robust watermark security
-
Oct.
-
M. Barni, F. Bartolini, and T. Furon, "A general framework for robust watermark security," Signal Process., vol. 83, no. 10, pp. 2069-2084, Oct. 2003.
-
(2003)
Signal Process
, vol.83
, Issue.10
, pp. 2069-2084
-
-
Barni, M.1
Bartolini, F.2
Furon, T.3
-
147
-
-
0042823352
-
Secure hybrid robust watermarking resistant against tampering and copy attack
-
Oct.
-
F. Deguillaume, S. Voloshynovskiy, and T. Pun, "Secure hybrid robust watermarking resistant against tampering and copy attack," Signal Process., vol. 83, no. 10, pp. 2133-2170, Oct. 2003.
-
(2003)
Signal Process
, vol.83
, Issue.10
, pp. 2133-2170
-
-
Deguillaume, F.1
Voloshynovskiy, S.2
Pun, T.3
-
148
-
-
0036504565
-
Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector
-
Mar.
-
C.-S. Lu, H.-Y. M. Liao, and M. Kutter, "Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector," IEEE Trans. Image Process., vol. 11, pp. 280-292, Mar. 2002.
-
(2002)
IEEE Trans. Image Process
, vol.11
, pp. 280-292
-
-
Lu, C.-S.1
Liao, H.-Y.M.2
Kutter, M.3
-
149
-
-
0033701078
-
The watermark copy attack
-
Jan.
-
M. Kutter, S. Voloshynovskiy, and A. Herrigel, "The watermark copy attack," Proc. SPIE Security Watermarking Multimedia Contents II, vol. 3971, pp. 371-380, Jan. 2000.
-
(2000)
Proc. SPIE Security Watermarking Multimedia Contents II
, vol.3971
, pp. 371-380
-
-
Kutter, M.1
Voloshynovskiy, S.2
Herrigel, A.3
-
150
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
Mar.
-
M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Trans. Image Process., vol. 9, pp. 432-441, Mar. 2000.
-
(2000)
IEEE Trans. Image Process
, vol.9
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
-
151
-
-
8844263220
-
Benchmarking of image watermarking algorithms for digital rights management
-
Jun.
-
B. Macq, J. Dittmann, and E. J. Delp, "Benchmarking of image watermarking algorithms for digital rights management," Proc. IEEE, vol. 92, no. 6, pp. 971-984, Jun. 2004.
-
(2004)
Proc. IEEE
, vol.92
, Issue.6
, pp. 971-984
-
-
Macq, B.1
Dittmann, J.2
Delp, E.J.3
-
152
-
-
20744437393
-
The watermark evaluation testbed
-
Steganography, Watermarking VI, San Jose, CA
-
H. C. Kim, H. Ogunley, O. Guitart, and E. J. Delp, "The watermark evaluation testbed," presented at the SPIE Int. Conf. Security, Steganography, Watermarking VI, San Jose, CA, 2004.
-
(2004)
SPIE Int. Conf. Security
-
-
Kim, H.C.1
Ogunley, H.2
Guitart, O.3
Delp, E.J.4
|