-
2
-
-
2642515522
-
"A steganographic scheme for secure communications based on the chaos and Euler theorem"
-
D.-C. Lou and C.-H. Sung, "A steganographic scheme for secure communications based on the chaos and Euler theorem," IEEE Trans. Multimedia 6(3), 501-509 (2004).
-
(2004)
IEEE Trans. Multimedia
, vol.6
, Issue.3
, pp. 501-509
-
-
Lou, D.-C.1
Sung, C.-H.2
-
4
-
-
0842288710
-
"A digital image watermarking method based on labeled bisecting clustering algorithm"
-
S.-C. Chu, J. F. Roddick, Z.-M. Lu, and J.-S. Pan, "A digital image watermarking method based on labeled bisecting clustering algorithm," IEICE Trans. Fundamentals E87-A(1), 282-285 (2004).
-
(2004)
IEICE Trans. Fundamentals
, vol.E87-A
, Issue.1
, pp. 282-285
-
-
Chu, S.-C.1
Roddick, J.F.2
Lu, Z.-M.3
Pan, J.-S.4
-
5
-
-
0031362116
-
"Secure spread spectrum watermarking for multimedia"
-
I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process. 6(12), 1673-1687 (1997).
-
(1997)
IEEE Trans. Image Process
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
6
-
-
12344332735
-
"An adjusted-purpose digital watermarking technique"
-
Y.-T. Wu and F.-Y. Shih, "An adjusted-purpose digital watermarking technique," Pattern Recogn. 37, 2349-2359 (2004).
-
(2004)
Pattern Recogn.
, vol.37
, pp. 2349-2359
-
-
Wu, Y.-T.1
Shih, F.-Y.2
-
7
-
-
5644253212
-
"Blind image data hiding based on self reference"
-
Y. Wang and A. Pearmain, "Blind image data hiding based on self reference," Pattern Recogn. Lett. 25, 1681-1689 (2004).
-
(2004)
Pattern Recogn. Lett.
, vol.25
, pp. 1681-1689
-
-
Wang, Y.1
Pearmain, A.2
-
8
-
-
12344303071
-
Fuzzy-ART based adaptive digital watermarking scheme"
-
C.-H. Chang, Z. Ye, and M. Zhang, Fuzzy-ART based adaptive digital watermarking scheme," IEEE Trans. Circuits Syst. Video Technol. 15(1), 65-81 (2005).
-
(2005)
IEEE Trans. Circuits Syst. Video Technol.
, vol.15
, Issue.1
, pp. 65-81
-
-
Chang, C.-H.1
Ye, Z.2
Zhang, M.3
-
9
-
-
13244269881
-
"Lossless generalized-LSB data embedding"
-
M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, "Lossless generalized-LSB data embedding," IEEE Trans. Image Process. 14(2), 253-266 (2005).
-
(2005)
IEEE Trans. Image Process.
, vol.14
, Issue.2
, pp. 253-266
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
Saber, E.4
-
10
-
-
0030386584
-
"Application of toral automorphism in image watermarking"
-
G. Voyatzis and I. Pitas, "Application of toral automorphism in image watermarking," in Proc. IEEE Int. Conf. on Image Processing, Vol. 2, pp. 237-240 (1996).
-
(1996)
Proc. IEEE Int. Conf. on Image Processing
, vol.2
, pp. 237-240
-
-
Voyatzis, G.1
Pitas, I.2
-
12
-
-
0034251536
-
"Repeating image watermarking technique by the visual cryptography"
-
C.-C. Wang, S.-C. Tai, and C.-S. Yu, "Repeating image watermarking technique by the visual cryptography," IEICE Trans. Fundamentals E83-A(8), 1589-1598 (2000).
-
(2000)
IEICE Trans. Fundamentals
, vol.E83-A
, Issue.8
, pp. 1589-1598
-
-
Wang, C.-C.1
Tai, S.-C.2
Yu, C.-S.3
-
13
-
-
2142802703
-
"An asymmetric watermarking scheme based on visual cryptography"
-
Y.-C. Hou and P.-M. Chen, "An asymmetric watermarking scheme based on visual cryptography," in Proc. IEEE Int. Conf. on Signal Processing, Vol. 2, pp. 992-995 (2000).
-
(2000)
Proc. IEEE Int. Conf. on Signal Processing
, vol.2
, pp. 992-995
-
-
Hou, Y.-C.1
Chen, P.-M.2
-
14
-
-
0036605019
-
"An image intellectual property protection scheme for gray-level images using visual secret sharing strategy"
-
C.-C. Chang and J.-C. Chung, "An image intellectual property protection scheme for gray-level images using visual secret sharing strategy," Pattern Recogn. Lett. 23, 931-941 (2002).
-
(2002)
Pattern Recogn. Lett.
, vol.23
, pp. 931-941
-
-
Chang, C.-C.1
Chung, J.-C.2
-
15
-
-
33747620205
-
"A copyright protection scheme for gray-level images based on image secret sharing and wavelet transformation"
-
S.-L. Hsieh and B.-Y. Huang, "A copyright protection scheme for gray-level images based on image secret sharing and wavelet transformation," in Proc. Int. Computer Symp., pp. 661-666, (2004).
-
(2004)
Proc. Int. Computer Symp.
, pp. 661-666
-
-
Hsieh, S.-L.1
Huang, B.-Y.2
-
16
-
-
0037096996
-
"A public verifiable copy protection technique for still image"
-
W.-B. Lee and T.-H. Chen, "A public verifiable copy protection technique for still image," J. Syst. Softw. 62, 195-204 (2002).
-
(2002)
J. Syst. Softw.
, vol.62
, pp. 195-204
-
-
Lee, W.-B.1
Chen, T.-H.2
|