-
1
-
-
0003302360
-
Public watermarks and resistance to tampering
-
(Santa Barbara, California, USA), October
-
I. J. Cox and J. P. M. G. Linnartz, "Public watermarks and resistance to tampering," in IEEE International Conference on Image Processing ICIP'97, 3, pp. 3-6, (Santa Barbara, California, USA), October 1997.
-
(1997)
IEEE International Conference on Image Processing ICIP'97
, vol.3
, pp. 3-6
-
-
Cox, I.J.1
Linnartz, J.P.M.G.2
-
2
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
December
-
I. J. Cox, J. Killian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Transactions on Image Processing 6, pp. 1673-1687, December 1997.
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, pp. 1673-1687
-
-
Cox, I.J.1
Killian, J.2
Leighton, T.3
Shamoon, T.4
-
3
-
-
0007751316
-
Analysis of the sensitivity attack against electronic watermarks in images
-
2nd International Workshop on Information Hiding, IH'98, D. Aucsmith, ed., Springer Verlag, (Portland, OR, USA), April
-
J. P. M. G. Linnartz and M. van Dijk, "Analysis of the sensitivity attack against electronic watermarks in images," in 2nd International Workshop on Information Hiding, IH'98, D. Aucsmith, ed., Lecture Notes in Computer Science 1525, pp. 258-272, Springer Verlag, (Portland, OR, USA), April 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 258-272
-
-
Linnartz, J.P.M.G.1
Van Dijk, M.2
-
4
-
-
0032311781
-
Watermark estimation through detector analysis
-
(Chicago, IL, USA), October
-
T. Kalker, J. P. Linnartz, and M. van Dijk, "Watermark estimation through detector analysis," in IEEE International Conference on Image Processing, ICIP'98, pp. 425-429, (Chicago, IL, USA), October 1998.
-
(1998)
IEEE International Conference on Image Processing, ICIP'98
, pp. 425-429
-
-
Kalker, T.1
Linnartz, J.P.2
Van Dijk, M.3
-
5
-
-
0034769637
-
An unified approach of asymmetric watermarking schemes
-
Edward J. Delp III and P. W. Wong, eds., SPIE, (San Jose, California, USA), January
-
T. Furon, I. Venturini, and P. Duhamel, "An unified approach of asymmetric watermarking schemes," in Security and Watermarking of Multimedia Contents III, Edward J. Delp III and P. W. Wong, eds., 4314, pp. 269-279, SPIE, (San Jose, California, USA), January 2001.
-
(2001)
Security and Watermarking of Multimedia Contents III
, vol.4314
, pp. 269-279
-
-
Furon, T.1
Venturini, I.2
Duhamel, P.3
-
6
-
-
0036451748
-
JANIS: Just Another N-order side-Informed watermarking Scheme
-
(Rochester, NY, USA), September
-
T. Furon, B. Macq, N. Hurley, and G. Silvestre, "JANIS: Just Another N-order side-Informed watermarking Scheme," in IEEE International Conference on Image Processing, ICIP'02, 3, pp. 153-156, (Rochester, NY, USA), September 2002.
-
(2002)
IEEE International Conference on Image Processing, ICIP'02
, vol.3
, pp. 153-156
-
-
Furon, T.1
Macq, B.2
Hurley, N.3
Silvestre, G.4
-
7
-
-
0036448239
-
LMS-based attack on watermark public detectors
-
September
-
M. F. Mansour and A. H. Tewfik, "LMS-based attack on watermark public detectors," in IEEE International Conference on Image Processing, ICIP'02, 3, pp. 649-652, September 2002.
-
(2002)
IEEE International Conference on Image Processing, ICIP'02
, vol.3
, pp. 649-652
-
-
Mansour, M.F.1
Tewfik, A.H.2
-
8
-
-
21844452953
-
New sensitivity analysis attack
-
Edward J. Delp III and P. W. Wong, eds., SPIE, January
-
M. El Choubassi and P. Moulin, "New sensitivity analysis attack," in Security, Steganography and Watermarking of Multimedia contents VII, Edward J. Delp III and P. W. Wong, eds., pp. 734-745, SPIE, January 2005.
-
(2005)
Security, Steganography and Watermarking of Multimedia Contents VII
, pp. 734-745
-
-
El Choubassi, M.1
Moulin, P.2
-
11
-
-
0004026002
-
-
Multimedia Information and Systems, Morgan Kauffman
-
I. J. Cox, M. L. Miller, and J. A. Bloom, Digital watermarking, Multimedia Information and Systems, Morgan Kauffman, 2002.
-
(2002)
Digital Watermarking
-
-
Cox, I.J.1
Miller, M.L.2
Bloom, J.A.3
-
12
-
-
0033882559
-
DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure
-
January. Special Issue on Image and Video Processing for Digital Libraries
-
J. R. Hernández, M. Amado, and F. Pérez-González, "DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure," IEEE Trans. on ImageProcessing 9, pp. 55-68, January 2000. Special Issue on Image and Video Processing for Digital Libraries.
-
(2000)
IEEE Trans. on ImageProcessing
, vol.9
, pp. 55-68
-
-
Hernández, J.R.1
Amado, M.2
Pérez-González, F.3
-
13
-
-
0034848594
-
Blind watermarking applied to image authentication
-
May
-
J. J. Eggers and B. Girod, "Blind watermarking applied to image authentication," in Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), 3, pp. 1977-1980, May 2001.
-
(2001)
Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP)
, vol.3
, pp. 1977-1980
-
-
Eggers, J.J.1
Girod, B.2
-
14
-
-
0141565031
-
Error exponents for one-bit watermarking
-
6-8 April
-
T. Liu and P. Moulin, "Error exponents for one-bit watermarking," in Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), 3, pp. 65-68, 6-8 April 2003.
-
(2003)
Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP)
, vol.3
, pp. 65-68
-
-
Liu, T.1
Moulin, P.2
-
15
-
-
21844449699
-
Detection in quantization-based watermarking: Performance and security issues
-
Edward J. Delp III and P. W. Wong, eds., SPIE, (San Jose, California, USA), January
-
L. Pérez-Freire, P. Comesaña, and F. Pérez- González, "Detection in quantization-based watermarking: performance and security issues," in Security, Steganography, and Watermarking of Multimedia Contents VII, Edward J. Delp III and P. W. Wong, eds., 5681, pp. 721-733, SPIE, (San Jose, California, USA), January 2005.
-
(2005)
Security, Steganography, and Watermarking of Multimedia Contents VII
, vol.5681
, pp. 721-733
-
-
Pérez-Freire, L.1
Comesaña, P.2
Pérez-González, F.3
-
16
-
-
2942568431
-
Applying informed coding and embedding to design a robust high-capacity watermark
-
June
-
M. L. Miller, G. J. Doërr, and I. J. Cox, "Applying informed coding and embedding to design a robust high-capacity watermark," IEEE Transactions on Image Processing 13, pp. 792-807, June 2004.
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, pp. 792-807
-
-
Miller, M.L.1
Doërr, G.J.2
Cox, I.J.3
-
17
-
-
84944404911
-
Zero-knowledge watermark detection and proof of ownership
-
4th International Workshop on Information Hiding, IH'.01, I. S. Moskowitz, ed., Springer Verlag, (Pittsburgh, PA, USA), April
-
A. Adelsbach and A.-R. Sadeghi, "Zero-knowledge watermark detection and proof of ownership," in 4th International Workshop on Information Hiding, IH'.01, I. S. Moskowitz, ed., Lecture Notes in Computer Science 2137, pp. 273-288, Springer Verlag, (Pittsburgh, PA, USA), April 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2137
, pp. 273-288
-
-
Adelsbach, A.1
Sadeghi, A.-R.2
|