-
2
-
-
0030388964
-
Secure spread spectrum watermarking for images, audio and video
-
I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for images, audio and video. In IEEE Int. Conference on Image Processing, volume 3, pages 243-246, 1996.
-
(1996)
IEEE Int. Conference on Image Processing
, vol.3
, pp. 243-246
-
-
Cox, I.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
3
-
-
84947937393
-
A secure, robust watermark for multimedia
-
Ross Anderson, editor, number 1174 in Lecture Notes in Computer Science. Springer-Verlag
-
I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon. A secure, robust watermark for multimedia. In Ross Anderson, editor, Workshop on Information Hiding, number 1174 in Lecture Notes in Computer Science. Springer-Verlag, 1996.
-
(1996)
Workshop on Information Hiding
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
4
-
-
0002487426
-
A review of watermarking anf the importance of perceptual modeling
-
Ingemar J. Cox and Matt L. Miller. A review of watermarking anf the importance of perceptual modeling. In Proc. of Electronic Imagining '97, 1997.
-
(1997)
Proc. of Electronic Imagining '97
-
-
Cox, I.J.1
Miller, M.L.2
-
6
-
-
0003296294
-
Public key watermarking by eigenvectors of linear transforms
-
J. Eggers, J. Su, and B. Girod. Public key watermarking by eigenvectors of linear transforms. In EUSIPCO, 2000.
-
(2000)
EUSIPCO
-
-
Eggers, J.1
Su, J.2
Girod, B.3
-
7
-
-
84944403312
-
An asymmetric public detection watermarking technique
-
T. Furon and P. Duhamel. An asymmetric public detection watermarking technique. In IH99, pages 88-100, 1999.
-
(1999)
IH99
, pp. 88-100
-
-
Furon, T.1
Duhamel, P.2
-
8
-
-
0002961810
-
Robustness of an asymmetric technique
-
T. Furon and P. Duhamel. Robustness of an asymmetric technique. In ICIP 2000, 2000.
-
(2000)
ICIP 2000
-
-
Furon, T.1
Duhamel, P.2
-
9
-
-
84947268359
-
A unified approach of asymmetric schemes
-
E. Delp and P. Wah Wong, editors, number 4312 in Proceedings of SPIE. SPIE
-
T. Furon, I. Venturini, and P. Duhamel. A unified approach of asymmetric schemes. In E. Delp and P. Wah Wong, editors, Security and Watermarking of Multimedia Contents, number 4312 in Proceedings of SPIE. SPIE, 2001.
-
(2001)
Security and Watermarking of Multimedia Contents
-
-
Furon, T.1
Venturini, I.2
Duhamel, P.3
-
11
-
-
84947916149
-
Recovery of watermarks from distorted images
-
Andreas Pfitzmann, editor, Springer-Verlag
-
N. F. Johnson, Z. Duric, and S. Jajodia. Recovery of watermarks from distorted images. In Andreas Pfitzmann, editor, Information Hiding Workshop '99, Lecture Notes in Computer Science, pages 318-332. Springer-Verlag, 1999.
-
(1999)
Information Hiding Workshop '99, Lecture Notes in Computer Science
, pp. 318-332
-
-
Johnson, N.F.1
Duric, Z.2
Jajodia, S.3
-
12
-
-
84957877979
-
Attacks on copyright marking systems
-
David Aucsmith, editor, number 1525 in Lecture Notes in Computer Science, Springer-Verlag
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn. Attacks on copyright marking systems. In David Aucsmith, editor, Second Workshop on Information Hiding, number 1525 in Lecture Notes in Computer Science, pages 218-238. Springer-Verlag, 1998.
-
(1998)
Second Workshop on Information Hiding
, pp. 218-238
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
13
-
-
84947914664
-
Fast robust template matching for affine resistant image watermarks
-
Andreas Pfitzmann, editor, Springer-Verlag
-
S. Perreira and T. Pun. Fast robust template matching for affine resistant image watermarks. In Andreas Pfitzmann, editor, Information Hiding Workshop '99, Lecture Notes in Computer Science, pages 199-210. Springer-Verlag, 1999.
-
(1999)
Information Hiding Workshop '99, Lecture Notes in Computer Science
, pp. 199-210
-
-
Perreira, S.1
Pun, T.2
-
14
-
-
84947921515
-
Asymmetric fingerprinting (extended abstract)
-
Ueli Maurer, editor, number 1070 in Lecture Notes in Computer Science, Springer-Verlag
-
B. Pfitzmann and M. Schunter. Asymmetric fingerprinting (extended abstract). In Ueli Maurer, editor, Advances in Cryptology-Eurocrypt 96, number 1070 in Lecture Notes in Computer Science, pages 84-95. Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology-Eurocrypt 96
, pp. 84-95
-
-
Pfitzmann, B.1
Schunter, M.2
-
17
-
-
84947912135
-
Develoments in steganography
-
Andreas Pfitzmann, editor, number 1768 in Lecture Notes in Computer Science, Springer-Verlag
-
J. Smith and C. Dodge. Develoments in steganography. In Andreas Pfitzmann, editor, Third Workshop on Information Hiding, number 1768 in Lecture Notes in Computer Science, pages 77-87. Springer-Verlag, 1999.
-
(1999)
Third Workshop on Information Hiding
, pp. 77-87
-
-
Smith, J.1
Dodge, C.2
|