-
1
-
-
0035791751
-
"Electronic watermarking: The first 50 years"
-
I. Cox, M. Miller, and A. McKellips, "Electronic watermarking: The first 50 years," in Proc. Int. Workshop Multimedia Signal Processing, 2001, pp. 225-230.
-
(2001)
Proc. Int. Workshop Multimedia Signal Processing
, pp. 225-230
-
-
Cox, I.1
Miller, M.2
McKellips, A.3
-
2
-
-
31344436558
-
"Multimedia data-embedding and watermarking technologies"
-
BC, Canada, Jun
-
M. D. Swanson, M. Kobayashi, and A. H. Tewfik, "Multimedia data-embedding and watermarking technologies," in Proc. IEEE Int. Conf. Communications, vol. 2, BC, Canada, Jun. 1998, pp. 823-827.
-
(1998)
Proc. IEEE Int. Conf. Communications
, vol.2
, pp. 823-827
-
-
Swanson, M.D.1
Kobayashi, M.2
Tewfik, A.H.3
-
3
-
-
0032634857
-
"Multimedia watermarking techniques"
-
F. Hartung and M. Kutter, "Multimedia watermarking techniques," Proc. IEEE, vol. 87, pp. 1079-1107, 1999.
-
(1999)
Proc. IEEE
, vol.87
, pp. 1079-1107
-
-
Hartung, F.1
Kutter, M.2
-
4
-
-
0032680807
-
"Information hiding - A survey"
-
Jul
-
F. A. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding - A survey," Proc. IEEE, vol. 87, pp. 1062-1078, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, pp. 1062-1078
-
-
Petitcolas, F.A.1
Anderson, R.J.2
Kuhn, M.G.3
-
5
-
-
0018468867
-
"A signal theoretic method for creating forgery-proof documents for automatic verification"
-
Lexington, KY, May
-
W. Szepanski, "A signal theoretic method for creating forgery-proof documents for automatic verification," in Proc. Carnahan Conf. Crime Counter-Measures, Lexington, KY, May 1979, pp. 101-109.
-
(1979)
Proc. Carnahan Conf. Crime Counter-Measures
, pp. 101-109
-
-
Szepanski, W.1
-
6
-
-
0031362116
-
"Secure spread spectrum watermarking for multimedia"
-
Dec
-
I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Process.
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
7
-
-
0035333687
-
"Quantization index modulation: A class of provably good methods for digital watermarking and information embedding"
-
May
-
B. Chen and G. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inform. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
-
(2001)
IEEE Trans. Inform. Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.2
-
8
-
-
0033703674
-
"Preprocessed and postprocessed quantization index modulation methods for digital watermarking"
-
San Jose, CA, Jan
-
B. Chen and G. Wornell, "Preprocessed and postprocessed quantization index modulation methods for digital watermarking," in Proc. SPIE Security Watermarking of Multimedia Contents II, vol. 3971, San Jose, CA, Jan. 2000, pp. 48-59.
-
(2000)
Proc. SPIE Security Watermarking of Multimedia Contents II
, vol.3971
, pp. 48-59
-
-
Chen, B.1
Wornell, G.2
-
9
-
-
84952369138
-
"Digital watermarking and information embedding using dither modulation"
-
Dec
-
B. Chen and G. Wornell, "Digital watermarking and information embedding using dither modulation," in Proc. Workshop Multimedia Signal Processing, Dec. 1998, pp. 273-278.
-
(1998)
Proc. Workshop Multimedia Signal Processing
, pp. 273-278
-
-
Chen, B.1
Wornell, G.2
-
10
-
-
0004127894
-
"Data hiding in multimedia: Theory and applications"
-
New Jersey Institute of Technology, Kearny, NJ, Nov
-
M. Ramkumar, "Data hiding in multimedia: Theory and applications,", New Jersey Institute of Technology, Kearny, NJ, Nov. 1998.
-
(1998)
-
-
Ramkumar, M.1
-
11
-
-
0001038665
-
"A blind watermarking scheme based on structured codebooks"
-
London, U.K., Apr
-
J. J. Eggers, J. K. Su, and B. Girod, "A blind watermarking scheme based on structured codebooks," in Proc. Int. IEE Colloquim Secure Image Authentication, London, U.K., Apr. 2000, pp. 1-6.
-
(2000)
Proc. Int. IEE Colloquim Secure Image Authentication
, pp. 1-6
-
-
Eggers, J.J.1
Su, J.K.2
Girod, B.3
-
12
-
-
1842441816
-
"Digital watermarking facing attacks by amplitude scaling and additive white noise"
-
Berlin, Germany, Jan
-
J. J. Eggers, R. Bäuml, and B. Girod, "Digital watermarking facing attacks by amplitude scaling and additive white noise," in Proc. Int. ITG Conf. Source Channel Coding, Berlin, Germany, Jan. 2002, pp. 28-30.
-
(2002)
Proc. Int. ITG Conf. Source Channel Coding
, pp. 28-30
-
-
Eggers, J.J.1
Bäuml, R.2
Girod, B.3
-
13
-
-
0033601680
-
"A channel model for a watermark attack"
-
San Jose, CA, Jan
-
J. K. Su, F. Hartung, and B. Girod, "A channel model for a watermark attack," in Proc. SPIE Security Watermarking of Multimedia Contents, San Jose, CA, Jan. 1999, pp. 159-170.
-
(1999)
Proc. SPIE Security Watermarking of Multimedia Contents
, pp. 159-170
-
-
Su, J.K.1
Hartung, F.2
Girod, B.3
-
14
-
-
0344868484
-
"A channel model for watermarks subject to desynchronization attacks"
-
Berlin, Germany, Jan
-
R. Bäuml, J. J. Eggers, and J. Huber, "A channel model for watermarks subject to desynchronization attacks," in Proc. Int. ITG Conf. Source Channel Coding, Berlin, Germany, Jan. 2002, pp. 28-30.
-
(2002)
Proc. Int. ITG Conf. Source Channel Coding
, pp. 28-30
-
-
Bäuml, R.1
Eggers, J.J.2
Huber, J.3
-
15
-
-
0038527382
-
"The zero-rate spread spectrum watermarking game"
-
Apr
-
P. Moulin and A. Ivanovic, "The zero-rate spread spectrum watermarking game," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1098-1117, Apr. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.4
, pp. 1098-1117
-
-
Moulin, P.1
Ivanovic, A.2
-
16
-
-
0031365813
-
"Rotation, scale and translation invariant digital image watermarking"
-
J. J. K. ORuanaidh and T. Pun, "Rotation, scale and translation invariant digital image watermarking," in Proc. IEEE Int. Conf. Image Processing, vol. 1, 1997, pp. 536-539.
-
(1997)
Proc. IEEE Int. Conf. Image Processing
, vol.1
, pp. 536-539
-
-
ORuanaidh, J.J.K.1
Pun, T.2
-
17
-
-
0032653659
-
"Watermarking resisting to translation, rotation and scaling"
-
Nov
-
M. Kutter, "Watermarking resisting to translation, rotation and scaling," in Proc. SPIE Multimedia Systems Applications, vol. 3528, Nov. 1998, pp. 423-431.
-
(1998)
Proc. SPIE Multimedia Systems Applications
, vol.3528
, pp. 423-431
-
-
Kutter, M.1
-
18
-
-
0038188738
-
"Spread spectrum watermarking of audio signals"
-
Apr
-
D. Kirovski and H. S. Malvar, "Spread spectrum watermarking of audio signals," IEEE Trans. Signal Process. (Special Issue on Data Hiding, vol. 51, no. 4, pp. 1020-1033, Apr. 2003.
-
(2003)
IEEE Trans. Signal Process. (Special Issue on Data Hiding)
, vol.51
, Issue.4
, pp. 1020-1033
-
-
Kirovski, D.1
Malvar, H.S.2
-
19
-
-
0003826202
-
"An information theoretic approach to timing jitter"
-
Ph.D. dissertation, Univ. of California, San Diego, CA
-
C. M. M. J. Baggen, "An information theoretic approach to timing jitter," Ph.D. dissertation, Univ. of California, San Diego, CA, 1993.
-
(1993)
-
-
Baggen, C.M.M.J.1
-
20
-
-
0036612282
-
"The Gaussian watermarking game"
-
Jun
-
A. S. Cohen and A. Lapidoth, "The Gaussian watermarking game," IEEE Trans. Inform. Theory, vol. 48, no. 6, pp. 1639-1667, Jun. 2002.
-
(2002)
IEEE Trans. Inform. Theory
, vol.48
, Issue.6
, pp. 1639-1667
-
-
Cohen, A.S.1
Lapidoth, A.2
-
21
-
-
0345134578
-
"The effect of the random jitter attack on the bit error rate, performance of spatial domain image watermarking"
-
Barcelona, Spain
-
V. Licks, F. Ourique, R. Jordan, and F. Pérez-González, "The effect of the random jitter attack on the bit error rate, performance of spatial domain image watermarking," in Proc. IEEE Int. Conf. Image Processing (ICIP) 2003, vol. 2, Barcelona, Spain, 2002, pp. 28-30.
-
(2002)
Proc. IEEE Int. Conf. Image Processing (ICIP) 2003
, vol.2
, pp. 28-30
-
-
Licks, V.1
Ourique, F.2
Jordan, R.3
Pérez-González, F.4
-
22
-
-
31344452048
-
"Performance of dirty-paper codes for additive white Gaussian noise"
-
presented at the IEEE Workshop of Statistical Signal Processing (WSSP03), MO
-
V. Licks, F. Ourique, R. Jordan, and G. Heileman, "Performance of dirty-paper codes for additive white Gaussian noise," presented at the IEEE Workshop of Statistical Signal Processing (WSSP03), MO, 2003.
-
(2003)
-
-
Licks, V.1
Ourique, F.2
Jordan, R.3
Heileman, G.4
-
23
-
-
8844234944
-
"Capacity of data-hiding system subject to desynchronization"
-
presented at the SPIE, San Jose, CA, Jan
-
S. Pateux, G. L. Guelvouit, and J. Delhumeau, "Capacity of data-hiding system subject to desynchronization," presented at the SPIE, San Jose, CA, Jan. 2004.
-
(2004)
-
-
Pateux, S.1
Guelvouit, G.L.2
Delhumeau, J.3
-
24
-
-
0032657533
-
"Achievable performance of digital watermarking systems"
-
Florence, Italy, Jun
-
B. Chen and G. Wornell, "Achievable performance of digital watermarking systems," in Proc. Int. Conf. Multimedia Computing Systems, vol. 87, Florence, Italy, Jun. 1999, pp. 13-18.
-
(1999)
Proc. Int. Conf. Multimedia Computing Systems
, vol.87
, pp. 13-18
-
-
Chen, B.1
Wornell, G.2
-
25
-
-
0032625842
-
"Watermarking as communication with side information"
-
Jul
-
I. Cox, M. Miller, and A. McKellips, "Watermarking as communication with side information," in Proc. Int. Conf. Multimedia Computing Systems, Jul. 1999, pp. 1127-1141.
-
(1999)
Proc. Int. Conf. Multimedia Computing Systems
, pp. 1127-1141
-
-
Cox, I.1
Miller, M.2
McKellips, A.3
-
26
-
-
0020752342
-
"Writing on dirty papers"
-
May
-
M. H. M. Costa, "Writing on dirty papers," IEEE Trans. Inform. Theory, vol. IT-29, no. 3, pp. 439-441, May 1983.
-
(1983)
IEEE Trans. Inform. Theory
, vol.IT-29
, Issue.3
, pp. 439-441
-
-
Costa, M.H.M.1
-
27
-
-
0037353686
-
"Information-theoretic analysis of information hiding"
-
Mar
-
P. Moulin and J. A. O'Sullivan, "Information-theoretic analysis of information hiding," IEEE Trans. Inform. Theory, vol. 49, no. 3, pp. 563-593, Mar. 2003.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, Issue.3
, pp. 563-593
-
-
Moulin, P.1
O'Sullivan, J.A.2
-
28
-
-
0034441117
-
"An information-theoretic model for image watermarking and data hiding"
-
presented at the IEEE Int. Conf. Image Processing, Vancouver, BC, Canada, Sep
-
P. Moulin, M. K. Mihcak, and G.-I. A. Lin, "An information-theoretic model for image watermarking and data hiding," presented at the IEEE Int. Conf. Image Processing, Vancouver, BC, Canada, Sep. 2000.
-
(2000)
-
-
Mou, P.1
Mihcak, M.K.2
Lin, G.-I.A.3
-
29
-
-
0034844812
-
"The capacity of the vector Gaussian watermarking game"
-
Washington, DC, Jun
-
A. S. Cohen and A. Lapidoth, "The capacity of the vector Gaussian watermarking game," in IEEE Proc. Int. Symp. Information Theory, Washington, DC, Jun. 2001, p. 5.
-
(2001)
IEEE Proc. Int. Symp. Information Theory
, pp. 5
-
-
Cohen, A.S.1
Lapidoth, A.2
-
30
-
-
0018986069
-
"Necessary conditions for min-max problems and algorithms by a relaxation procedure"
-
Jan
-
K. Shimizu and E. Aiyoshi, "Necessary conditions for min-max problems and algorithms by a relaxation procedure," IEEE Trans. Autom. Control, vol. AC-25, no. 1, pp. 62-66, Jan. 1980.
-
(1980)
IEEE Trans. Autom. Control
, vol.AC-25
, Issue.1
, pp. 62-66
-
-
Shimizu, K.1
Aiyoshi, E.2
-
31
-
-
13444303921
-
"Fingerprinting and forensic analysis of multimedia"
-
presented at the Multimedia Security Workshop, Magdeburg, Germany, Sep
-
D. Schonberg and D. Kirovski, "Fingerprinting and forensic analysis of multimedia," presented at the Multimedia Security Workshop, Magdeburg, Germany, Sep. 2004.
-
(2004)
-
-
Schonberg, D.1
Kirovski, D.2
-
32
-
-
21844467953
-
"Threshold selection for correlation-based watermark deletion"
-
Island of Rhodes, Greece, Sep
-
A. Piva, M. Barni, F. bartolini, and V. Capellini, "Threshold selection for correlation-based watermark deletion," in Proc. Eur. Signal Processing Conf. (EUSIPCO), Island of Rhodes, Greece, Sep. 1998, pp. 337-355.
-
(1998)
Proc. Eur. Signal Processing Conf. (EUSIPCO)
, pp. 337-355
-
-
Piva, A.1
Barni, M.2
Bartolini, F.3
Capellini, V.4
|