-
2
-
-
33746628959
-
Fundamentals of data hiding security and their application to Spread-Spectrum analysis
-
Barcelona, Spain, Springer Verlag
-
Comesan̈a, P., Pérez-Freire, L., Pérez-González, F.: Fundamentals of data hiding security and their application to Spread-Spectrum analysis. In: 7th Information Hiding Workshop, IH05. Lecture Notes in Computer Science, Barcelona, Spain, Springer Verlag (2005)
-
(2005)
7th Information Hiding Workshop, IH05. Lecture Notes in Computer Science
-
-
Comesan̈a, P.1
Pérez-Freire, L.2
Pérez-González, F.3
-
3
-
-
0003302360
-
Public watermarks and resistance to tampering
-
Santa Barbara, California, USA
-
Cox, I.J., Linnartz, J.P.M.G.: Public watermarks and resistance to tampering. In: IEEE International Conference on Image Processing ICIP'97. Volume 3., Santa Barbara, California, USA (1997) 3-6
-
(1997)
IEEE International Conference on Image Processing ICIP'97
, vol.3
, pp. 3-6
-
-
Cox, I.J.1
Linnartz, J.P.M.G.2
-
4
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox, I.J., Killian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6 (1997) 1673-1687
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, pp. 1673-1687
-
-
Cox, I.J.1
Killian, J.2
Leighton, T.3
Shamoon, T.4
-
5
-
-
0007751316
-
Analysis of the sensitivity attack against electronic watermarks in images
-
Aucsmith, D., ed.: 2nd International Workshop on Information Hiding, IH'98. Portland, OR, USA, Springer Verlag
-
Linnartz, J.P.M.G., van Dijk, M.: Analysis of the sensitivity attack against electronic watermarks in images. In Aucsmith, D., ed.: 2nd International Workshop on Information Hiding, IH'98. Volume 1525 of Lecture Notes in Computer Science., Portland, OR, USA, Springer Verlag (1998) 258-272
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 258-272
-
-
Linnartz, J.P.M.G.1
Van Dijk, M.2
-
6
-
-
0032311781
-
Watermark estimation through detector analysis
-
Chicago, IL, USA
-
Kalker, T., Linnartz, J.P., van Dijk, M.: Watermark estimation through detector analysis. In: IEEE International Conference on Image Processing, ICIP'98, Chicago, IL, USA (1998) 425-429
-
(1998)
IEEE International Conference on Image Processing, ICIP'98
, pp. 425-429
-
-
Kalker, T.1
Linnartz, J.P.2
Van Dijk, M.3
-
8
-
-
0034769637
-
An unified approach of asymmetric watermarking schemes
-
Edward J. Delp III, Wong, P.W., eds.: San Jose, California, USA, SPIE
-
Furon, T., Venturini, I., Duhamel, P.: An unified approach of asymmetric watermarking schemes. In Edward J. Delp III, Wong, P.W., eds.: Security and Watermarking of Multimedia Contents III. Volume 4314., San Jose, California, USA, SPIE (2001) 269-279
-
(2001)
Security and Watermarking of Multimedia Contents III
, vol.4314
, pp. 269-279
-
-
Furon, T.1
Venturini, I.2
Duhamel, P.3
-
9
-
-
0036451748
-
JANIS: Just Another N-order side-Informed watermarking Scheme
-
Rochester, NY, USA
-
Furon, T., Macq, B., Hurley, N., Silvestre, G.: JANIS: Just Another N-order side-Informed watermarking Scheme. In: IEEE International Conference on Image Processing, ICIP'02. Volume 3., Rochester, NY, USA (2002) 153-156
-
(2002)
IEEE International Conference on Image Processing, ICIP'02
, vol.3
, pp. 153-156
-
-
Furon, T.1
Macq, B.2
Hurley, N.3
Silvestre, G.4
-
10
-
-
21844452953
-
New sensitivity analysis attack
-
Edward J. Delp III, Wong, P.W., eds.: SPIE
-
El Choubassi, M., Moulin, P.: New sensitivity analysis attack. In Edward J. Delp III, Wong, P.W., eds.: Security, Steganography and Watermarking of Multimedia contents VII, SPIE (2005) 734-745
-
(2005)
Security, Steganography and Watermarking of Multimedia Contents VII
, pp. 734-745
-
-
El Choubassi, M.1
Moulin, P.2
-
11
-
-
0037851028
-
An asymmetric watermarking method
-
Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery
-
Furon, T., Duhamel, P.: An asymmetric watermarking method. IEEE Trans. on Signal Processing 51 (2003) 981-995 Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery.
-
(2003)
IEEE Trans. on Signal Processing
, vol.51
, pp. 981-995
-
-
Furon, T.1
Duhamel, P.2
-
16
-
-
21844449699
-
Detection in quantizationbased watermarking: Performance and security issues
-
Edward J. Delp III,Wong, P.W., eds.: San Jose, California, USA, SPIE
-
Pérez-Freire, L., Comesan̈a, P., Pérez-González, F.: Detection in quantizationbased watermarking: performance and security issues. In Edward J. Delp III,Wong, P.W., eds.: Security, Steganography, and Watermarking of Multimedia Contents VII. Volume 5681., San Jose, California, USA, SPIE (2005) 721-733
-
(2005)
Security, Steganography, and Watermarking of Multimedia Contents VII
, vol.5681
, pp. 721-733
-
-
Pérez-Freire, L.1
Comesan̈a, P.2
Pérez-González, F.3
-
17
-
-
0033882559
-
DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure
-
Special Issue on Image and Video Processing for Digital Libraries
-
Hernández, J.R., Amado, M., Pérez-González, F.: DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Trans. on Image Processing 9 (2000) 55-68 Special Issue on Image and Video Processing for Digital Libraries.
-
(2000)
IEEE Trans. on Image Processing
, vol.9
, pp. 55-68
-
-
Hernández, J.R.1
Amado, M.2
Pérez-González, F.3
-
18
-
-
84944404911
-
Zero-knowledge watermark detection and proof of ownership
-
Moskowitz, I.S., ed.: 4th International Workshop on Information Hiding, IH'01 Pittsburgh, PA, USA, Springer Verlag
-
Adelsbach, A., Sadeghi, A.R.: Zero-knowledge watermark detection and proof of ownership. In Moskowitz, I.S., ed.: 4th International Workshop on Information Hiding, IH'01. Volume 2137 of Lecture Notes in Computer Science., Pittsburgh, PA, USA, Springer Verlag (2001) 273-288
-
(2001)
Lecture Notes in Computer Science
, vol.2137
, pp. 273-288
-
-
Adelsbach, A.1
Sadeghi, A.R.2
|