-
1
-
-
0017018484
-
"New directions in cryptography"
-
Nov.
-
W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
2
-
-
0032680807
-
"Information hiding - A survey"
-
Jul.
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding - A survey," Proc. IEEE, vol. 87, no. 7, pp. 1062-1078, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
3
-
-
0002321371
-
"Methods for tamper detection in digital images"
-
Orlando, FL, Oct.
-
J. Fridrich, "Methods for tamper detection in digital images," in Proc. Multimedia and Security Workshop at ACM Multimedia, Orlando, FL, Oct. 1999, pp. 19-23.
-
(1999)
Proc. Multimedia and Security Workshop at ACM Multimedia
, pp. 19-23
-
-
Fridrich, J.1
-
6
-
-
0027697301
-
"The trustworthy digital camera: Restoring credibility to the photographic image"
-
Nov.
-
G. L. Friedman, "The trustworthy digital camera: Restoring credibility to the photographic image," IEEE Trans. Consumer Electron., vol. 39, no. 4, pp. 905-910, Nov. 1993.
-
(1993)
IEEE Trans. Consumer Electron.
, vol.39
, Issue.4
, pp. 905-910
-
-
Friedman, G.L.1
-
7
-
-
0032648596
-
"Digital watermarking for telltale tamper proofing and authentication"
-
Jul.
-
D. Kundur and D. Hatzinakos, "Digital watermarking for telltale tamper proofing and authentication," Proc. IEEE, vol. 87, no. 7, pp. 1167-1180, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1167-1180
-
-
Kundur, D.1
Hatzinakos, D.2
-
8
-
-
0032312612
-
"A public key watermark for image verification and authentication"
-
Oct.
-
P. W. Wong, "A public key watermark for image verification and authentication," in Proc. Int. Conf. Image Processing (ICIP), vol. 1, Oct. 1998, pp. 445-459.
-
(1998)
Proc. Int. Conf. Image Processing (ICIP)
, vol.1
, pp. 445-459
-
-
Wong, P.W.1
-
9
-
-
0032292342
-
"Watermarking for image authentication"
-
Oct.
-
M. Wu and B. Liu, "Watermarking for image authentication," in Proc. Int. Conf. Image Processing (ICIP), vol. 2, Oct. 1998, pp. 437-441.
-
(1998)
Proc. Int. Conf. Image Processing (ICIP)
, vol.2
, pp. 437-441
-
-
Wu, M.1
Liu, B.2
-
10
-
-
85007375266
-
"Toward robust, content based techniques for image authentication"
-
Los Angeles, CA, Dec.
-
M. P. Queluz, "Toward robust, content based techniques for image authentication," in Proc. Workshop Multimedia Signal Processing (MMSP), Los Angeles, CA, Dec. 1998, pp. 297-302.
-
(1998)
Proc. Workshop Multimedia Signal Processing (MMSP)
, pp. 297-302
-
-
Queluz, M.P.1
-
12
-
-
0033726248
-
"Watermarking technologies for authentication and protection of images"
-
Mar.-Apr.
-
B. Macq and J.-L. Dugelay, "Watermarking technologies for authentication and protection of images," Ann. Telecommun., vol. 55, no. 3-4, pp. 92-100, Mar.-Apr. 2000.
-
(2000)
Ann. Telecommun.
, vol.55
, Issue.3-4
, pp. 92-100
-
-
Macq, B.1
Dugelay, J.-L.2
-
13
-
-
0034848594
-
"Blind watermarking applied to image authentication"
-
Salt Lake City, UT, May
-
J. J. Eggers and B. Girod, "Blind watermarking applied to image authentication," in Proc. Int. Conf. Acoustics, Speech, Signal Processing (ICASSP), vol. 3, Salt Lake City, UT, May 2001, pp. 1977-1980.
-
(2001)
Proc. Int. Conf. Acoustics, Speech, Signal Processing (ICASSP)
, vol.3
, pp. 1977-1980
-
-
Eggers, J.J.1
Girod, B.2
-
14
-
-
0031378592
-
"An invisible watermarking technique for image verification"
-
Oct.
-
M. M. Yeung and F. Mintzer, "An invisible watermarking technique for image verification," in Proc. Int. Conf. Image Processing (ICIP), vol. 2, Oct. 1997, pp. 680-683.
-
(1997)
Proc. Int. Conf. Image Processing (ICIP)
, vol.2
, pp. 680-683
-
-
Yeung, M.M.1
Mintzer, F.2
-
15
-
-
0030409375
-
"A robust content based digital signature for image authentication"
-
Sep.
-
M. Schneider and S. Chang, "A robust content based digital signature for image authentication," in Proc. Int. Conf. Image Processing (ICIP), vol. 3, Sep. 1996, pp. 227-230.
-
(1996)
Proc. Int. Conf. Image Processing (ICIP)
, vol.3
, pp. 227-230
-
-
Schneider, M.1
Chang, S.2
-
16
-
-
0035248504
-
"A robust image authentication method distinguishing JPEG compression from malicious manipulation"
-
Feb.
-
C.-Y. Lin and S.-F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation," IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 2, pp. 153-168, Feb. 2001.
-
(2001)
IEEE Trans. Circuits Syst. Video Technol.
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
17
-
-
0035509773
-
"A class of authentication digital watermarks for secure multimedia communication"
-
Nov.
-
L. Me and G. R. Arce, "A class of authentication digital watermarks for secure multimedia communication," IEEE Trans. Image Process., vol. 10, no. 11, pp. 1754-1764, Nov. 2001.
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.11
, pp. 1754-1764
-
-
Me, L.1
Arce, G.R.2
-
18
-
-
0035473830
-
"Multipurpose watermarking for image authentication and protection"
-
Oct.
-
C.-S. Lu and H. Liao, "Multipurpose watermarking for image authentication and protection," IEEE Trans. Image Process, vol. 10, no. 10, pp. 1579-1592, Oct. 2001.
-
(2001)
IEEE Trans. Image Process
, vol.10
, Issue.10
, pp. 1579-1592
-
-
Lu, C.-S.1
Liao, H.2
-
19
-
-
0019148101
-
"Coding for channel with random paramters"
-
S. I. Gel'fand and M. S. Pinsker, "Coding for channel with random paramters," Probl. Contr. Inf. Theory, vol. 9, no. 1, pp. 19-31, 1983.
-
(1983)
Probl. Contr. Inf. Theory
, vol.9
, Issue.1
, pp. 19-31
-
-
Gel'Fand, S.I.1
Pinsker, M.S.2
-
20
-
-
0020752342
-
"Writing on dirty paper"
-
May
-
M. H. M. Costa, "Writing on dirty paper" IEEE Trans. Inf. Theory, vol. IT-29, no. 3, pp. 439-441, May 1983.
-
(1983)
IEEE Trans. Inf. Theory
, vol.IT-29
, Issue.3
, pp. 439-441
-
-
Costa, M.H.M.1
-
21
-
-
0020821981
-
"On the capacity of computer memory with defects"
-
Sep.
-
C. Heegard and A. A. El Gamal, "On the capacity of computer memory with defects," IEEE Trans. Inf. Theory, vol. IT-29, no. 5, pp.6 731-739, Sep. 1983.
-
(1983)
IEEE Trans. Inf. Theory
, vol.IT-29
, Issue.5
, pp. 731-739
-
-
Heegard, C.1
El Gamal, A.A.2
-
22
-
-
84890380431
-
"Information-theoretic analysis of steganography"
-
Cambridge, MA, Aug.
-
J. A. O'Sullivan, P. Moulin, and J. M. Ettinger, "Information-theoretic analysis of steganography," in Proc. IEEE Int. Symp. Information Theory, Cambridge, MA, Aug. 1998, p. 297.
-
(1998)
Proc. IEEE Int. Symp. Information Theory
, pp. 297
-
-
O'Sullivan, J.A.1
Moulin, P.2
Ettinger, J.M.3
-
23
-
-
0034448785
-
"Quantization index modulation: A class of provably good methods for digital watermarking and information embedding"
-
Sorrento, Italy, Jun.
-
B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," in Proc. IEEE Int. Symp. Information Theory, Sorrento, Italy, Jun. 2000, p. 46.
-
(2000)
Proc. IEEE Int. Symp. Information Theory
, pp. 46
-
-
Chen, B.1
Wornell, G.W.2
-
24
-
-
0034446834
-
"On the Gaussian watermarking game"
-
Sorrento, Italy, Jun.
-
A. Cohen and A. Lapidoth, "On the Gaussian watermarking game," in IEEE Int. Symp. Inform. Theory, Sorrento, Italy, Jun. 2000, p. 48.
-
(2000)
IEEE Int. Symp. Inform. Theory
, pp. 48
-
-
Cohen, A.1
Lapidoth, A.2
-
25
-
-
0034449758
-
"Information-theoretic analysis of information hiding"
-
Sorrento, Italy, Jun.
-
P. Moulin and J. O'Sullivan, "Information-theoretic analysis of information hiding," in IEEE Int. Symp. Information Theory, Sorrento, Italy, Jun. 2000, p. 19.
-
(2000)
IEEE Int. Symp. Information Theory
, pp. 19
-
-
Moulin, P.1
O'Sullivan, J.2
-
26
-
-
0035333687
-
"Quantization index modulation: A class of provably good methods for digital watermarking and information embedding"
-
May
-
B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
27
-
-
0037353686
-
"Information-theoretic analysis of information hiding"
-
Mar.
-
P. Moulin and J. A. O'Sullivan, "Information-theoretic analysis of information hiding," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 563-593, Mar. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.3
, pp. 563-593
-
-
Moulin, P.1
O'Sullivan, J.A.2
-
28
-
-
0035334148
-
"Identification in the presence of side information with application to watermarking"
-
May
-
Y. Steinberg and N. Merhav, "Identification in the presence of side information with application to watermarking," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1410-1422, May 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.4
, pp. 1410-1422
-
-
Steinberg, Y.1
Merhav, N.2
-
29
-
-
0036612282
-
"The Gaussian watermarking game"
-
Jun.
-
A. Cohen and A. Lapidoth, "The Gaussian watermarking game," IEEE Trans. Inf. Theory, vol. 48, no. 6, pp. 1639-1667, Jun. 2002.
-
(2002)
IEEE Trans. Inf. Theory
, vol.48
, Issue.6
, pp. 1639-1667
-
-
Cohen, A.1
Lapidoth, A.2
-
30
-
-
0032095654
-
"Multimedia data-embedding and watermarking technologies"
-
Jun.
-
M. D. Swanson, M. Kobayashi, and A. H. Tewfik, "Multimedia data-embedding and watermarking technologies," Proc. IEEE, vol. 86, no. 6, pp. 1064-1087, Jun. 1998.
-
(1998)
Proc. IEEE
, vol.86
, Issue.6
, pp. 1064-1087
-
-
Swanson, M.D.1
Kobayashi, M.2
Tewfik, A.H.3
-
31
-
-
84947943261
-
"Protecting digital media content"
-
Jul.
-
N. Memon and P. W. Wong, "Protecting digital media content," Commun. ACM, vol. 41, no. 7, pp. 35-42, Jul. 1998.
-
(1998)
Commun. ACM
, vol.41
, Issue.7
, pp. 35-42
-
-
Memon, N.1
Wong, P.W.2
-
32
-
-
0032075477
-
"Some general methods for tampering with watermarks"
-
May
-
I. J. Cox and J.-P. M. G. Linnartz, "Some general methods for tampering with watermarks," IEEE J. Select. Areas Commun., vol. 16, no. 4, pp. 587-593, May 1998.
-
(1998)
IEEE J. Select. Areas Commun.
, vol.16
, Issue.4
, pp. 587-593
-
-
Cox, I.J.1
Linnartz, J.-P.M.G.2
-
33
-
-
0033308186
-
"On the duality between distributed source coding and data hiding"
-
Pacific Grove, CA, Oct.
-
J. Chou, S. S. Pradhan, and K. Ramchandran, "On the duality between distributed source coding and data hiding," in Proc. Asilomar Conf. Signals, Systems, and Computers, vol. 2, Pacific Grove, CA, Oct. 1999, pp. 1503-1507.
-
(1999)
Proc. Asilomar Conf. Signals, Systems, and Computers
, vol.2
, pp. 1503-1507
-
-
Chou, J.1
Pradhan, S.S.2
Ramchandran, K.3
-
34
-
-
0037516820
-
"Duality between source and channel coding and its extension to the side information case"
-
May
-
S. S. Pradhan, J. Chou, and K. Ramchandran, "Duality between source and channel coding and its extension to the side information case," IEEE Trans. Inf. Theory, vol. 49, no. 5, pp. 1181-1203, May 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.5
, pp. 1181-1203
-
-
Pradhan, S.S.1
Chou, J.2
Ramchandran, K.3
-
35
-
-
0034444044
-
"Illustration of the duality between channel coding and rate distoriton with side information"
-
Pacific Grove, CA, Nov.
-
J. K. Su, J. J. Eggers, and B. Girod, "Illustration of the duality between channel coding and rate distoriton with side information," in Proc. Asilomar Conf. Signals, Systems, and Computers, vol. 2, Pacific Grove, CA, Nov. 2000, pp. 1841-1845.
-
(2000)
Proc. Asilomar Conf. Signals, Systems, and Computers
, vol.2
, pp. 1841-1845
-
-
Su, J.K.1
Eggers, J.J.2
Girod, B.3
-
36
-
-
0037854454
-
"The duality between information embedding and source coding with side information and some applications"
-
May
-
R. J. Barron, B. Chen, and G. W. Wornell, "The duality between information embedding and source coding with side information and some applications," IEEE Trans. Inf. Theory, vol. 49, no. 5, pp. 1159-1180, May 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.5
, pp. 1159-1180
-
-
Barron, R.J.1
Chen, B.2
Wornell, G.W.3
-
37
-
-
0034873503
-
"The duality between information embedding and source coding with side information and some applications"
-
Washington, DC, Jun.
-
R. J. Barron, B. C. Chen, and G. W. Wornell, "The duality between information embedding and source coding with side information and some applications," in Proc. IEEE Int. Symp. Information Theory, Washington, DC, Jun. 2001, p. 300.
-
(2001)
Proc. IEEE Int. Symp. Information Theory
, pp. 300
-
-
Barron, R.J.1
Chen, B.C.2
Wornell, G.W.3
-
38
-
-
0033871878
-
"On random coding error exponents of watermarking systems"
-
Mar.
-
N. Merhav, "On random coding error exponents of watermarking systems," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 420-430, Mar. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.2
, pp. 420-430
-
-
Merhav, N.1
-
39
-
-
0034858502
-
"Unified duality of channel capacity and rate distortion with state information"
-
Washington, DC, Jun.
-
M. Chiang and T. M. Cover, "Unified duality of channel capacity and rate distortion with state information," in Proc. IEEE Int. Symp. Information Theory, Washington, DC, Jun. 2001, p. 301.
-
(2001)
Proc. IEEE Int. Symp. Information Theory
, pp. 301
-
-
Chiang, M.1
Cover, T.M.2
-
40
-
-
0009754120
-
"Capacity and lattice-strategies for cancelling known interference"
-
Honolulu, HI, Nov.
-
U. Erez, S. Shamai, and R. Zamir, "Capacity and lattice-strategies for cancelling known interference," in Proc. Int. Symp. Information Theory and Its Applications, Honolulu, HI, Nov. 2000, pp. 681-684.
-
(2000)
Proc. Int. Symp. Information Theory and Its Applications
, pp. 681-684
-
-
Erez, U.1
Shamai, S.2
Zamir, R.3
-
41
-
-
0036611624
-
"Nested linear/lattice codes for structured multiterminal binning"
-
Jun.
-
R. Zamir, S. Shamai Shitz, and U. Erez, "Nested linear/lattice codes for structured multiterminal binning," IEEE Trans. Inf. Theory, vol. 49, no. 6, pp. 1250-1278, Jun. 2002.
-
(2002)
IEEE Trans. Inf. Theory
, vol.49
, Issue.6
, pp. 1250-1278
-
-
Zamir, R.1
Shamai Shitz, S.2
Erez, U.3
-
42
-
-
0036354141
-
"Rate vs. Distortion trade-off for channels with state information"
-
Lausanne, Switzerland, Jun./Jul.
-
A. Sutivong, T. Cover, M. Chiang, and Y.-H. Kim, "Rate vs. distortion trade-off for channels with state information," in Proc. IEEE Int. Symp. Information Theory, Lausanne, Switzerland, Jun./Jul. 2002, p. 226.
-
(2002)
Proc. IEEE Int. Symp. Information Theory
, pp. 226
-
-
Sutivong, A.1
Cover, T.2
Chiang, M.3
Kim, Y.-H.4
-
44
-
-
0028461972
-
"A general formula for channel capacity"
-
Jul.
-
S. Verdú and T. S. Han, "A general formula for channel capacity," IEEE Trans. Inf. Theory, vol. 40, no. 4, pp. 1147-1157, Jul. 1994.
-
(1994)
IEEE Trans. Inf. Theory
, vol.40
, Issue.4
, pp. 1147-1157
-
-
Verdú, S.1
Han, T.S.2
-
45
-
-
0029734858
-
"Simulation of random processes and rate-distortion theory"
-
Jan.
-
Y. Steinberg and S. Verdú, "Simulation of random processes and rate-distortion theory," IEEE Trans. Inf. Theory, vol. 42, no. 1, pp. 63-86, Jan. 1996.
-
(1996)
IEEE Trans. Inf. Theory
, vol.42
, Issue.1
, pp. 63-86
-
-
Steinberg, Y.1
Verdú, S.2
-
46
-
-
0036566725
-
"Hybrid digital-analog (HDA) joint source-channel codes for broadcasting and robust communications"
-
May
-
U. Mittal and N. Phamdo, "Hybrid digital-analog (HDA) joint source-channel codes for broadcasting and robust communications," IEEE Trans. Inf. Theory, vol. 48, no. 5, pp. 1082-1102, May 2002.
-
(2002)
IEEE Trans. Inf. Theory
, vol.48
, Issue.5
, pp. 1082-1102
-
-
Mittal, U.1
Phamdo, N.2
-
47
-
-
0036495808
-
"Joint source-channel coding of a Gaussian mixture source over the gaussian broadcast channel"
-
Mar.
-
Z. Reznic, R. Zamir, and M. Feder, "Joint source-channel coding of a Gaussian mixture source over the gaussian broadcast channel," IEEE Trans. Inf. Theory, vol. 48, no. 3, pp. 776-781, Mar. 2002.
-
(2002)
IEEE Trans. Inf. Theory
, vol.48
, Issue.3
, pp. 776-781
-
-
Reznic, Z.1
Zamir, R.2
Feder, M.3
-
48
-
-
0032025574
-
"Systematic lossy source/channel coding"
-
Mar.
-
S. Shamai (Shitz), S. Verdú, and R. Zamir, "Systematic lossy source/channel coding," IEEE Trans. Inf. Theory, vol. 44, no. 2, pp. 564-579, Mar. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.2
, pp. 564-579
-
-
Shamai, S.1
Verdú, S.2
Zamir, R.3
-
49
-
-
0003837864
-
"Authenticating multimedia in the presence of noise"
-
Master's thesis, MIT, Cambridge, MA
-
E. Martinian, "Authenticating multimedia in the presence of noise," Master's thesis, MIT, Cambridge, MA, 2000.
-
(2000)
-
-
Martinian, E.1
-
50
-
-
0034774708
-
"Information theoretic approach to the authentication of multimedia"
-
San Jose, CA, Jan.
-
E. Martinian, B. Chen, and G. W. Wornell, "Information theoretic approach to the authentication of multimedia," in Proc. SPIE: Security and Watermarking of Multimedia Contents III (Part of Electronic Imaging 2001), San Jose, CA, Jan. 2001.
-
(2001)
Proc. SPIE: Security and Watermarking of Multimedia Contents III (Part of Electronic Imaging 2001)
-
-
Martinian, E.1
Chen, B.2
Wornell, G.W.3
-
51
-
-
0016882596
-
"The rate-distortion function for source coding with side information at the decoder"
-
Jan.
-
A. D. Wyner and J. Ziv, "The rate-distortion function for source coding with side information at the decoder," IEEE Trans. Inf. Theory, vol. IT-22, no. 1, pp. 1-10, Jan. 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-22
, Issue.1
, pp. 1-10
-
-
Wyner, A.D.1
Ziv, J.2
-
52
-
-
0016576623
-
"Source coding with side information and a converse for degraded broadcast channels"
-
Nov.
-
R. Ahlswede and J. Körner, "Source coding with side information and a converse for degraded broadcast channels," IEEE Trans. Inf. Theory, vol. IT-21, no. 6, pp. 629-637, Nov. 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-21
, Issue.6
, pp. 629-637
-
-
Ahlswede, R.1
Körner, J.2
|