-
1
-
-
0842326424
-
-
San Francisco, CA: Morgan Kanfmann
-
I. Cox, M. Miller, and J. Bloom, Principles and Practice, San Francisco, CA: Morgan Kanfmann, 2001.
-
(2001)
Principles and Practice
-
-
Cox, I.1
Miller, M.2
Bloom, J.3
-
2
-
-
0032074148
-
"Rotation, scale and translation invariant spread spectrum digital image watermarking"
-
J. O'Ruanaidh and T. Pun, "Rotation, scale and translation invariant spread spectrum digital image watermarking," Signal Process., vol. 66, no. 3, pp. 303-17, 1998.
-
(1998)
Signal Process.
, vol.66
, Issue.3
, pp. 303-317
-
-
O'Ruanaidh, J.1
Pun, T.2
-
3
-
-
0000508830
-
"Fast robust template matching for affine resistant image watermarks"
-
A. Pfitzmann, Ed. Dresden, Germany: Springer-Verlag
-
S. Pereira and T. Pun, "Fast robust template matching for affine resistant image watermarks," in Proc. IHW. A. Pfitzmann, Ed. Dresden, Germany: Springer-Verlag, 1999, pp. 199-210.
-
(1999)
Proc. IHW
, pp. 199-210
-
-
Pereira, S.1
Pun, T.2
-
4
-
-
0032625842
-
"Watermarking as communication with side information"
-
Jul
-
I. Cox, M. Miller, and A. McKellips, "Watermarking as communication with side information," Proc. IEEE, vol. 87, no. 7, pp. 1127-1141, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1127-1141
-
-
Cox, I.1
Miller, M.2
McKellips, A.3
-
5
-
-
0035333687
-
"Quantization index modulation: A class of provably good methods for digital watermarking and information embedding"
-
May
-
B. Chen and G. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.2
-
6
-
-
0035369674
-
"The role of information theory in watermarking and its application to image watermarking"
-
P. Moulin, "The role of information theory in watermarking and its application to image watermarking," Signal Process., vol. 81, pp. 1121-1139, 2001.
-
(2001)
Signal Process.
, vol.81
, pp. 1121-1139
-
-
Moulin, P.1
-
7
-
-
0035790994
-
"Considerations on watermarking security"
-
Cannes, France, Oct
-
T. Kalker, "Considerations on watermarking security," in Proc. MMSP, Cannes, France, Oct. 2001, pp. 201-206.
-
(2001)
Proc. MMSP
, pp. 201-206
-
-
Kalker, T.1
-
8
-
-
0031340746
-
"On the invertibility of invisible watermarking technique"
-
Washington, DC
-
S. Craver, N. Memon, B.-L. Yeo, and M. M. Yeung, "On the invertibility of invisible watermarking technique," in Proc. IEEE ICIP Washington, DC, 1997, pp. 540-543.
-
(1997)
Proc. IEEE ICIP
, pp. 540-543
-
-
Craver, S.1
Memon, N.2
Yeo, B.-L.3
Yeung, M.M.4
-
9
-
-
0033701078
-
"Watermark copy attack"
-
P. W. Wong and E. Delp, Eds., San Jose, CA, Jan
-
M. Kutter, S. Voloshynovskiy, and A. Herrigel, "Watermark copy attack," in Proc. SPIE Security and Watermarking of Multimedia Contents II, vol. 3971, P. W. Wong and E. Delp, Eds., San Jose, CA, Jan. 2000.
-
(2000)
Proc. SPIE Security and Watermarking of Multimedia Contents II
, vol.3971
-
-
Kutter, M.1
Voloshynovskiy, S.2
Herrigel, A.3
-
10
-
-
0032075477
-
"Some general methods for tampering with watermarks"
-
May
-
I. Cox and J.-P. Linnartz, "Some general methods for tampering with watermarks," IEEE J. Sel. Areas Commun., vol. 16, no. 5, pp. 587-93, May 1998.
-
(1998)
IEEE J. Sel. Areas Commun.
, vol.16
, Issue.5
, pp. 587-593
-
-
Cox, I.1
Linnartz, J.-P.2
-
11
-
-
0007751316
-
"Analysis of the sensitivity attack against electronic watermarks in images"
-
D. Aucsmith, Ed. Portland, OR: Springer-Verlag, Lecture Notes in Computer Science
-
J. P. Linnartz and M. van Dijk, "Analysis of the sensitivity attack against electronic watermarks in images," in Proc. IHW, D. Aucsmith, Ed. Portland, OR: Springer-Verlag, 1998, vol. 1525, Lecture Notes in Computer Science.
-
(1998)
Proc. IHW
, vol.1525
-
-
Linnartz, J.P.1
van Dijk, M.2
-
12
-
-
0002561772
-
"An information-theoritic approach to steganography and watermarking"
-
A. Pfitzmann, Ed. Dresden, Germany: Springer-Verlag
-
T. Mittelholzer, "An information-theoritic approach to steganography and watermarking," in Proc. IHW, A. Pfitzmann, Ed. Dresden, Germany: Springer-Verlag, 1999. pp. 1-17.
-
(1999)
Proc. IHW
, pp. 1-17
-
-
Mittelholzer, T.1
-
13
-
-
0037851028
-
"An asymmetric watermarking method"
-
Apr
-
T. Furon and P. Duhamel, "An asymmetric watermarking method," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 981-995, Apr. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.4
, pp. 981-995
-
-
Furon, T.1
Duhamel, P.2
-
14
-
-
0041320695
-
"A general framework for robust watermarking security"
-
Oct. to be published
-
M. Barni, F. Bartolini, and T. Furon, "A general framework for robust watermarking security," Signal Process., vol. 83, no. 10, pp. 2069-2084, Oct. 2003, to be published.
-
(2003)
Signal Process.
, vol.83
, Issue.10
, pp. 2069-2084
-
-
Barni, M.1
Bartolini, F.2
Furon, T.3
-
15
-
-
0003185688
-
"La cryptographie militaire"
-
Jan
-
A. Kerckhoffs, "La cryptographie militaire," J. Des Sci. Militaires, vol. 9, pp. 5-38, Jan. 1883.
-
(1883)
J. Des Sci. Militaires
, vol.9
, pp. 5-38
-
-
Kerckhoffs, A.1
-
16
-
-
84890522850
-
"Communication theory of secrecy systems"
-
Oct
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
17
-
-
0017018484
-
"New directions in cryptography"
-
Nov
-
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
18
-
-
0032024437
-
"Copyright labeling of digitized image data"
-
Mar
-
S. Burgett, E. Koch, and J. Zhao, "Copyright labeling of digitized image data," IEEE Commun. Mag., vol. 36, no. 3, pp. 94-100, Mar. 1998.
-
(1998)
IEEE Commun. Mag.
, vol.36
, Issue.3
, pp. 94-100
-
-
Burgett, S.1
Koch, E.2
Zhao, J.3
-
19
-
-
0021486174
-
"Cryptology and the origins of spread spectrum"
-
Sep
-
D. Kahn, "Cryptology and the origins of spread spectrum," IEEE Spectrum, vol. 21, pp. 70-80, Sep. 1984.
-
(1984)
IEEE Spectrum
, vol.21
, pp. 70-80
-
-
Kahn, D.1
-
20
-
-
0037400124
-
"Practical watermarking scheme based on wide spread spectrum and game theory"
-
Apr
-
S. Pateux and G. Le Guelvouit, "Practical watermarking scheme based on wide spread spectrum and game theory," Signal Processing: Image Commun., vol. 18, pp. 283-296, Apr. 2003.
-
(2003)
Signal Processing: Image Commun.
, vol.18
, pp. 283-296
-
-
Pateux, S.1
Le Guelvouit, G.2
-
21
-
-
0037737759
-
"Scalar costa scheme for information embedding"
-
Apr
-
J. Eggers, R. Baüml, R. Tzschoppe, and B. Girod, "Scalar costa scheme for information embedding," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1003-1019, Apr. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.4
, pp. 1003-1019
-
-
Eggers, J.1
Baüml, R.2
Tzschoppe, R.3
Girod, B.4
-
22
-
-
0034441409
-
"Informed embedding: Exploiting image and detector information during watermark insertion"
-
Vancouver, BC, Canada, Sep
-
M. Miller, I. Cox, and J. Bloom, "Informed embedding: Exploiting image and detector information during watermark insertion," in Proc. ICIP, Vancouver, BC, Canada, Sep. 2000.
-
(2000)
Proc. ICIP
-
-
Miller, M.1
Cox, I.2
Bloom, J.3
-
23
-
-
0038527410
-
"Improved spread spectrum: A new modulation technique for robust watermarking"
-
Apr
-
H. S. Malvar and D. A. F. Florêncio, "Improved spread spectrum: A new modulation technique for robust watermarking," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 868-905, Apr. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.4
, pp. 868-905
-
-
Malvar, H.S.1
Florêncio, D.A.F.2
-
24
-
-
0035448026
-
"Blind separation of instantaneous mixtures of nonstationary sources"
-
Sep
-
D. T. Pham and J. F. Cardoso, "Blind separation of instantaneous mixtures of nonstationary sources," IEEE Trans. Signal Process., vol. 49, no. 9, pp. 1837-1848, Sep. 2001.
-
(2001)
IEEE Trans. Signal Process.
, vol.49
, Issue.9
, pp. 1837-1848
-
-
Pham, D.T.1
Cardoso, J.F.2
-
25
-
-
0035368528
-
"Analysis of digital watermarks subjected to optimum linear filtering and additive noise"
-
J. Su, J. Eggers, and B. Girod, "Analysis of digital watermarks subjected to optimum linear filtering and additive noise," Signal Process., vol. 81, pp. 1141-1175, 2001.
-
(2001)
Signal Process.
, vol.81
, pp. 1141-1175
-
-
Su, J.1
Eggers, J.2
Girod, B.3
-
26
-
-
0028416938
-
"Independent component analysis, A new concept?"
-
P. Comon, "Independent component analysis, A new concept?," Signal Process., vol. 36, no. 3, pp. 287-314, 1994.
-
(1994)
Signal Process.
, vol.36
, Issue.3
, pp. 287-314
-
-
Comon, P.1
-
27
-
-
0031271273
-
"Blind source separation; Semiparametric statistical approach"
-
S.-I. Amari and J. F. Cardoso, "Blind source separation; Semiparametric statistical approach," IEEE Trans. Signal Process., vol. 45, 1997.
-
(1997)
IEEE Trans. Signal Process.
, vol.45
-
-
Amari, S.-I.1
Cardoso, J.F.2
-
28
-
-
0032187518
-
"Blind signal separation: Statistical principles"
-
Oct
-
J.-F. Cardoso, "Blind signal separation: Statistical principles," Proc. IEEE. vol. 86, no. 10, pp. 2009-2025, Oct. 1998.
-
(1998)
Proc. IEEE
, vol.86
, Issue.10
, pp. 2009-2025
-
-
Cardoso, J.-F.1
-
29
-
-
0039132601
-
"Blind separation of BPSK sources with residual carders"
-
Jan
-
A.-J. van der Veen, "Blind separation of BPSK sources with residual carders," Signal Process., vol. 73, no. 10, pp. 67-79, Jan. 1999.
-
(1999)
Signal Process.
, vol.73
, Issue.10
, pp. 67-79
-
-
van der Veen, A.-J.1
-
30
-
-
0031386464
-
"Source separation when the input sources are discrete or have constant modulus"
-
Dec
-
F. Gamboa and E. Gassiat, "Source separation when the input sources are discrete or have constant modulus," IEEE Trans. Signal Process., vol. 45, no. 12, pp. 3062-3072, Dec. 1997.
-
(1997)
IEEE Trans. Signal Process.
, vol.45
, Issue.12
, pp. 3062-3072
-
-
Gamboa, F.1
Gassiat, E.2
-
31
-
-
0032123107
-
"On the Cramér-Rao bound under parametric constraints"
-
Jul
-
P. Stoica and B. C. Ng, "On the Cramér-Rao bound under parametric constraints," IEEE Signal Process. Lett., vol. 5, no. 7, pp. 177-179, Jul. 1998.
-
(1998)
IEEE Signal Process. Lett.
, vol.5
, Issue.7
, pp. 177-179
-
-
Stoica, P.1
Ng, B.C.2
-
32
-
-
17444373859
-
"On regularity and idenfifiability of blind source separation under constant-modulus constraints"
-
Apr
-
Y. Yao and G. B. Criannakis, "On regularity and idenfifiability of blind source separation under constant-modulus constraints," IEEE Trans. Signal Process., vol. 53, no. 4, Apr. 2005.
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, Issue.4
-
-
Yao, Y.1
Criannakis, G.B.2
-
33
-
-
33746618589
-
"Watermarking attack: Security of wss techniques"
-
Seoul, Korea
-
F. Cayre, C. Fontaine, and T. Furon, "Watermarking attack: Security of wss techniques," in Proc. IWDW, Seoul, Korea, 2004.
-
(2004)
Proc. IWDW
-
-
Cayre, F.1
Fontaine, C.2
Furon, T.3
-
35
-
-
21844435949
-
"ICA for watermarking digital images"
-
S. Bounkong, B. Toch, D. Saad, and D. Lowe, "ICA for watermarking digital images," J. Machine Learning Res., vol. 1, pp. 1-25, 2002.
-
(2002)
J. Machine Learning Res.
, vol.1
, pp. 1-25
-
-
Bounkong, S.1
Toch, B.2
Saad, D.3
Lowe, D.4
-
36
-
-
21844460192
-
"Watermark attack based on blind estimation without priors"
-
Lecture Notes in Computer Science
-
J. Du, C.-H. Lee, H.-K. Lee, and Y. Suh, "Watermark attack based on blind estimation without priors," in Proc. IWDW, Lecture Notes in Computer Science. 2002.
-
(2002)
Proc. IWDW
-
-
Du, J.1
Lee, C.-H.2
Lee, H.-K.3
Suh, Y.4
-
37
-
-
4544241479
-
"Danger of low-dimensional watermarking subspaces"
-
Montreal QC, Canada
-
G. Doërr and J.-L. Dugelay, "Danger of low-dimensional watermarking subspaces," in Proc. IEEE ICASSP Montreal, QC, Canada, 2004, vol. 3.
-
(2004)
Proc. IEEE ICASSP
, vol.3
-
-
Doërr, G.1
Dugelay, J.-L.2
-
38
-
-
0003266236
-
"Performance bounds for blind channel estimation"
-
Englewood Cliffs, NJ: Prentice-Hall
-
P. Stoica and B. Ng, "Performance bounds for blind channel estimation," in Signal Processing Advances in Wireless and Mobile Communications. Englewood Cliffs, NJ: Prentice-Hall, 2001, vol. 1, pp. 41-62.
-
(2001)
Signal Processing Advances in Wireless and Mobile Communications
, vol.1
, pp. 41-62
-
-
Stoica, P.1
Ng, B.2
-
39
-
-
0042826822
-
"Independent component analysis: A tutorial"
-
A. Hyvärinen and E. Oja, "Independent component analysis: A tutorial," Neural Networks, vol. 13, no. 4-5, pp. 411-430, 2000.
-
(2000)
Neural Networks
, vol.13
, Issue.4-5
, pp. 411-430
-
-
Hyvärinen, A.1
Oja, E.2
-
40
-
-
0032629347
-
"Fast and robust fixed-point algorithms for independent component analysis"
-
May
-
A. Hyvärinen, "Fast and robust fixed-point algorithms for independent component analysis," IEEE Trans. Neural Networks, vol. 10, no. 3, pp. 626-634, May 1999.
-
(1999)
IEEE Trans. Neural Networks
, vol.10
, Issue.3
, pp. 626-634
-
-
Hyvärinen, A.1
-
41
-
-
4143083811
-
"Lattice costa schemes using subspace projection for digital watermarking"
-
Aug
-
R. Fischer, R. Tzschoppe, and R. Bäuml, "Lattice costa schemes using subspace projection for digital watermarking," Eur. Trans. Telecommun., vol. 15, no. 4, pp. 351-362, Aug. 2004.
-
(2004)
Eur. Trans. Telecommun.
, vol.15
, Issue.4
, pp. 351-362
-
-
Fischer, R.1
Tzschoppe, R.2
Bäuml, R.3
-
42
-
-
0037513460
-
"Special issue on signal processing for data hiding in digital media and secure content delivery"
-
Apr
-
A. Akansu, E. Delp, T. Kalker, B. Liu, N. Memon, P. Moulin, and A. Tewfik, "Special issue on signal processing for data hiding in digital media and secure content delivery," IEEE Trans. Signal Process., vol. 51, no. 4, Apr. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.4
-
-
Akansu, A.1
Delp, E.2
Kalker, T.3
Liu, B.4
Memon, N.5
Moulin, P.6
Tewfik, A.7
|