-
1
-
-
21844463487
-
Watermarking security: Theory and practice
-
October
-
F. Cayre, C. Fontaine, and T. Furon, "Watermarking security: Theory and practice," IEEE Transactions on Signal Processing 53, pp. 3976-3987, October 2005.
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, pp. 3976-3987
-
-
Cayre, F.1
Fontaine, C.2
Furon, T.3
-
2
-
-
33746628959
-
Fundamentals of data hiding security and their application to spread-spectrum analysis
-
7th Information Hiding Workshop, IH05, M. Barni, J. Herrera-Joancomartf, S. Katzenbeisser, and F. Pérez-González, eds., Springer Verlag, (Barcelona, Spain), June
-
P. Comesaña, L. Pérez-Freire, and F. Pérez- González, "Fundamentals of data hiding security and their application to spread-spectrum analysis," in 7th Information Hiding Workshop, IH05, M. Barni, J. Herrera-Joancomartf, S. Katzenbeisser, and F. Pérez-González, eds., Lecture Notes in Computer Science 3727, pp. 146-160, Springer Verlag, (Barcelona, Spain), June 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3727
, pp. 146-160
-
-
Comesaña, P.1
Pérez-Freire, L.2
Pérez-González, F.3
-
3
-
-
0035333687
-
Quantization Index Modulation: A class of provably good methods for digital watermarking and information embedding
-
May
-
B. Chen and G. Wornell, "Quantization Index Modulation: a class of provably good methods for digital watermarking and information embedding," IEEE Transactions on Information Theory 47, pp. 1423-1443, May 2001.
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.2
-
4
-
-
0037737759
-
Scalar Costa Scheme for information embedding
-
April Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery
-
J. J. Eggers, R. Bäuml, R. Tzschoppe, and B. Girod, "Scalar Costa Scheme for information embedding," IEEE Transactions on Signal Processing 51, pp. 1003-1019, April 2003. Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery.
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, pp. 1003-1019
-
-
Eggers, J.J.1
Bäuml, R.2
Tzschoppe, R.3
Girod, B.4
-
5
-
-
84890522850
-
Communication theory of secrecy systems
-
October
-
C. E. Shannon, "Communication theory of secrecy systems," Bell system technical journal 28, pp. 656-715, October 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
6
-
-
33646182858
-
Security of DM quantization watermarking schemes: A practical study for digital images
-
M. Barni, I. Cox, T. Kalker, and H. J. Kim, eds., Springer, (Siena, Italy), September
-
P. Bas and J. Hurri, "Security of DM quantization watermarking schemes: a practical study for digital images," in Fourth International Workshop on Digital Watermarking, M. Barni, I. Cox, T. Kalker, and H. J. Kim, eds., 3710, pp. 186-200, Springer, (Siena, Italy), September 2005.
-
(2005)
Fourth International Workshop on Digital Watermarking
, vol.3710
, pp. 186-200
-
-
Bas, P.1
Hurri, J.2
-
7
-
-
5144221013
-
Achieving 1/2log(1+SNR) over the additive white Gaussian noise channel with lattice encoding and decoding
-
October
-
U. Erez and R. Zamir, "Achieving 1/2log(1+SNR) over the Additive White Gaussian Noise Channel with Lattice Encoding and Decoding," IEEE Transactions on Information Theory 50, pp. 2293-2314, October 2004.
-
(2004)
IEEE Transactions on Information Theory
, vol.50
, pp. 2293-2314
-
-
Erez, U.1
Zamir, R.2
-
8
-
-
0003643241
-
-
Sphere packings, lattices and groups, Springer-Verlag, New York, third ed.
-
J. H. Conway and N. J. A. Sloane, Sphere packings, lattices and groups, vol. 290 of a series of comprehensive studies in Mathematics, Springer-Verlag, New York, third ed., 1999.
-
(1999)
A Series of Comprehensive Studies in Mathematics
, vol.290
-
-
Conway, J.H.1
Sloane, N.J.A.2
-
11
-
-
33746637553
-
Information-theoretic analysis of security in side-informed data hiding
-
7th Information Hiding Workshop, IH05, M. Barni, J. Herrera- Joancomartí, S. Katzenbeisser, and F. Pérez-González, eds., Springer Verlag, (Barcelona, Spain), June
-
L. Pérez-Freire, P. Comesaña, and F. Pérez- González, "Information-theoretic analysis of security in side-informed data hiding," in 7th Information Hiding Workshop, IH05, M. Barni, J. Herrera-Joancomartí, S. Katzenbeisser, and F. Pérez-González, eds., Lecture Notes in Computer Science 3727, pp. 131-145, Springer Verlag, (Barcelona, Spain), June 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3727
, pp. 131-145
-
-
Pérez-Freire, L.1
Comesaña, P.2
Pérez-González, F.3
-
12
-
-
0004055894
-
-
SIAM Studies in Applied Mathematics, Cambridge University Press, Cambridge, UK
-
12. S. Boyd and L. Vandenberghe, Convex optimization, SIAM Studies in Applied Mathematics, Cambridge University Press, Cambridge, UK, 2004.
-
(2004)
Convex Optimization
-
-
Boyd, S.1
Vandenberghe, L.2
-
13
-
-
0026258792
-
Optimal estimation theory for dynamic systems with set membership uncertainty: An overview
-
M. Milanese and A. Vicino, "Optimal estimation theory for dynamic systems with set membership uncertainty: an overview," Automatica 27(6), pp. 997-1009, 1991.
-
(1991)
Automatica
, vol.27
, Issue.6
, pp. 997-1009
-
-
Milanese, M.1
Vicino, A.2
-
14
-
-
0027648997
-
An optimal volume ellipsoid algorithm for parameter set estimation
-
August
-
M. F. Cheung, S. Yurkovich, and K. M. Passino, "An optimal volume ellipsoid algorithm for parameter set estimation," IEEE Transactions on Automatic Control 38, pp. 1292-1296, August 1993.
-
(1993)
IEEE Transactions on Automatic Control
, vol.38
, pp. 1292-1296
-
-
Cheung, M.F.1
Yurkovich, S.2
Passino, K.M.3
-
15
-
-
20344396845
-
YALMIP: A toolbox for modeling and optimization in MATLAB
-
(Taipei, Taiwan)
-
J. Löfberg, "YALMIP: A toolbox for modeling and optimization in MATLAB," in Proceedings of the CACSD Conference, (Taipei, Taiwan), 2004. Available from http://control.ee.ethz.ch/~joloef/yalmip.php.
-
(2004)
Proceedings of the CACSD Conference
-
-
Löfberg, J.1
-
16
-
-
0033296299
-
Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones
-
Version 1.1
-
J. F. Sturm, "Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones.," Optimization methods and software 11-12(1-4), pp. 625-653, 1999. Version 1.1 available from http://sedumi.mcmaster.ca/.
-
(1999)
Optimization Methods and Software
, vol.11-12
, Issue.1-4
, pp. 625-653
-
-
Sturm, J.F.1
-
17
-
-
0020098638
-
Voronoi regions of lattices, second moments of polytopes, and quantization
-
March
-
J. H. Conway and N. J. A. Sloane, "Voronoi regions of lattices, second moments of polytopes, and quantization," IEEE Transactions on Information Theory 28, pp. 211-226, March 1982.
-
(1982)
IEEE Transactions on Information Theory
, vol.28
, pp. 211-226
-
-
Conway, J.H.1
Sloane, N.J.A.2
|