-
1
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox, I.J., J. Killian, F. Thomson Leighton and T. Shamoon (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6, 1673-1687.
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, pp. 1673-1687
-
-
Cox, I.J.1
Killian, J.2
Leighton, F.T.3
Shamoon, T.4
-
2
-
-
0032167014
-
Visual querying by color perceptive regions
-
del Bimbo, A., M. Mugnaini, P. Pala, F. Turco (1998). Visual querying by color perceptive regions. Pattern Recognition, 31(9), 1241-1253.
-
(1998)
Pattern Recognition
, vol.31
, Issue.9
, pp. 1241-1253
-
-
Del Bimbo, A.1
Mugnaini, M.2
Pala, P.3
Turco, F.4
-
3
-
-
35248829262
-
Zero knowledge watermarking detection
-
A. Pfitzmann, ed. Robustness of an Asymmetric Watermarking Technique, Information Hiding '99, Springer-Verlag, Dresden, Germany
-
Craver, S. (1999). Zero knowledge watermarking detection. In A. Pfitzmann, ed. Robustness of an Asymmetric Watermarking Technique, Information Hiding '99, Vol. 1768 of Lectures Notes in Computer Science (LNCS). Springer-Verlag, Dresden, Germany, pp. 101-116.
-
(1999)
Lectures Notes in Computer Science (LNCS)
, vol.1768
, pp. 101-116
-
-
Craver, S.1
-
5
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
A.M. Odlyzko (Ed.), Advances in Cryptology - CRYPTO '86, Springer-Verlag
-
Fiat, A., and A. Shamir (1987). How to prove yourself: Practical solutions to identification and signature problems. In A.M. Odlyzko (Ed.), Advances in Cryptology - CRYPTO '86, Vol. 263 of Lectures Notes in Computer Science (LNCS). Springer-Verlag, pp. 186-196.
-
(1987)
Lectures Notes in Computer Science (LNCS)
, vol.263
, pp. 186-196
-
-
Fiat, A.1
Shamir, A.2
-
6
-
-
84944403312
-
An asymmetric public detection watermarking technique
-
A. Pfitzmann(Ed.), Robustness of an Asymmetric Watermarking Technique, Information Hiding '99, Springer-Verlag, Dresden, Germany
-
Furon, T., and P. Duhamel (2000). An asymmetric public detection watermarking technique. In A. Pfitzmann(Ed.), Robustness of an Asymmetric Watermarking Technique, Information Hiding '99, Vol. 1768 of Lectures Notes in Computer Science (LNCS). Springer-Verlag, Dresden, Germany, pp. 88-100.
-
(2000)
Lectures Notes in Computer Science (LNCS)
, vol.1768
, pp. 88-100
-
-
Furon, T.1
Duhamel, P.2
-
10
-
-
0034266804
-
Watermarking digital image and video data
-
Langelaar, G.C., I. Setyawan, R.L. Lagenadijk (2000). Watermarking digital image and video data. IEEE Signal Processing Magazine, 9, 20-46.
-
(2000)
IEEE Signal Processing Magazine
, vol.9
, pp. 20-46
-
-
Langelaar, G.C.1
Setyawan, I.2
Lagenadijk, R.L.3
-
11
-
-
21144443873
-
Bit-plane decomposition steganography combined with Jpeg2000 compression
-
F.A.F. Petitcolas (Ed.), IH 2002, Springer-Verlag, Berlin, Heidelberg
-
Noda, H., J. Spaulding, M.N. Shirazi, M. Niimi and E. Kawaguchi (2003). Bit-plane decomposition steganography combined with Jpeg2000 compression. In F.A.F. Petitcolas (Ed.), IH 2002, LNCS 2578. Springer-Verlag, Berlin, Heidelberg, pp. 295-309.
-
(2003)
LNCS
, vol.2578
, pp. 295-309
-
-
Noda, H.1
Spaulding, J.2
Shirazi, M.N.3
Niimi, M.4
Kawaguchi, E.5
-
16
-
-
0003313852
-
Image watermarking for copyright protection and authentication
-
Al Bovik (Ed.), Academic Press
-
Voyatzis, G., and I. Pitas (2000). Image watermarking for copyright protection and authentication. In Al Bovik (Ed.), Handbook of Image and Video Processing. Academic Press, pp. 773-745.
-
(2000)
Handbook of Image and Video Processing
, pp. 773-1745
-
-
Voyatzis, G.1
Pitas, I.2
-
17
-
-
0032687726
-
WaveMark: Digital image watermarking using daubechies' wavelets and error correcting coding
-
Multimedia satellite networks: issues and challenges
-
Wang, J.Z., G. Wiederhold (1998). WaveMark: digital image watermarking using daubechies' wavelets and error correcting coding. In Proceedings of SPIE, Vol. 3528 Multimedia satellite networks: issues and challenges.
-
(1998)
Proceedings of SPIE
, vol.3528
-
-
Wang, J.Z.1
Wiederhold, G.2
|