-
1
-
-
0037513460
-
Special issue on signal processing for data hiding in digital media and secure content delivery
-
April
-
A. Akansu, E. Delp, T. Kalker, B. Liu, N. Memon, P. Moulin, and A. Tewfik. Special issue on signal processing for data hiding in digital media and secure content delivery. IEEE Trans. Signal Processing, 51(4), April 2003.
-
(2003)
IEEE Trans. Signal Processing
, vol.51
, Issue.4
-
-
Akansu, A.1
Delp, E.2
Kalker, T.3
Liu, B.4
Memon, N.5
Moulin, P.6
Tewfik, A.7
-
2
-
-
0031271273
-
Blind source separation; semiparametric statistical approach
-
Special issue on neural networks
-
S.-I. Amari and J.F. Cardoso. Blind source separation; semiparametric statistical approach. IEEE Trans. Signal Processing, 45(11), 1997. Special issue on neural networks.
-
(1997)
IEEE Trans. Signal Processing
, vol.45
, Issue.11
-
-
Amari, S.-I.1
Cardoso, J.F.2
-
3
-
-
0041320695
-
A general framework for robust watermarking security
-
October Special issue on Security of Data Hiding Technologies, invited paper
-
M. Barni, F. Bartolini, and T. Furon. A general framework for robust watermarking security. Signal Processing, 83(10):2069-2084, October 2003. Special issue on Security of Data Hiding Technologies, invited paper.
-
(2003)
Signal Processing
, vol.83
, Issue.10
, pp. 2069-2084
-
-
Barni, M.1
Bartolini, F.2
Furon, T.3
-
4
-
-
0032024437
-
Copyright labelling of digitized image data
-
March
-
S. Burgett, E. Koch, and J. Zhao. Copyright labelling of digitized image data. IEEE Commun. Mag., 36(3):94-100, March 1998.
-
(1998)
IEEE Commun. Mag.
, vol.36
, Issue.3
, pp. 94-100
-
-
Burgett, S.1
Koch, E.2
Zhao, J.3
-
5
-
-
0032187518
-
Blind signal separation: Statistical principles
-
October
-
J.-F. Cardoso. Blind signal separation: statistical principles. Proc. IEEE, 86(10):2009-2025, October 1998.
-
(1998)
Proc. IEEE
, vol.86
, Issue.10
, pp. 2009-2025
-
-
Cardoso, J.-F.1
-
6
-
-
33749443954
-
Watermarking attack: Security of WSS techniques
-
Lecture Notes in Computer Science. Springer-Verlag, to appear, Best Paper Award
-
F. Cayre, C. Fontaine, and T. Furon. Watermarking attack: Security of WSS techniques. In International Workshop on Digital Watermarking - IWDW 2004, Lecture Notes in Computer Science. Springer-Verlag, 2004. to appear, Best Paper Award.
-
(2004)
International Workshop on Digital Watermarking - IWDW 2004
-
-
Cayre, F.1
Fontaine, C.2
Furon, T.3
-
8
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
May
-
B. Chen and G. Wornell. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inform. Theory, 47:1423-1443, May 2001.
-
(2001)
IEEE Trans. Inform. Theory
, vol.47
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.2
-
9
-
-
0032075477
-
Some general methods for tampering with watermarks
-
May Special issue on copyright and privacy protection
-
I. Cox and J.-P. Linnartz. Some general methods for tampering with watermarks. IEEE J. Select. Areas Commun., 16(4):587-93, May 1998. Special issue on copyright and privacy protection.
-
(1998)
IEEE J. Select. Areas Commun.
, vol.16
, Issue.4
, pp. 587-593
-
-
Cox, I.1
Linnartz, J.-P.2
-
10
-
-
0031340746
-
On the invertibility of invisible watermarking technique
-
Washington, DC, USA, October IEEE
-
S. Craver, N. Memon, B.-L. Yeo, and M.M. Yeung. On the invertibility of invisible watermarking technique. In Proc. ICIP, pages 540-543, Washington, DC, USA, October 1997. IEEE.
-
(1997)
Proc. ICIP
, pp. 540-543
-
-
Craver, S.1
Memon, N.2
Yeo, B.-L.3
Yeung, M.M.4
-
11
-
-
0017018484
-
New directions in cryptography
-
November
-
W. Diffie and M. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, 22(6):644-54, November 1976.
-
(1976)
IEEE Trans. Inform. Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
12
-
-
4143083811
-
Lattice costa schemes using subspace projection for digital watermarking
-
August
-
R. Fischer, R. Tzschoppe, and R. Bäuml. Lattice costa schemes using subspace projection for digital watermarking. European Trans. Telecommunications, 15(4):351-362, August 2004.
-
(2004)
European Trans. Telecommunications
, vol.15
, Issue.4
, pp. 351-362
-
-
Fischer, R.1
Tzschoppe, R.2
Bäuml, R.3
-
14
-
-
33747644069
-
Source separation when the input sources are discrete or have constant modulus
-
December
-
F. Gamboa and E. Gassiat. Source separation when the input sources are discrete or have constant modulus. IEEE Trans. Signal Processing, 45(12):3062-3072, December 1997.
-
(1997)
IEEE Trans. Signal Processing
, vol.45
, Issue.12
, pp. 3062-3072
-
-
Gamboa, F.1
Gassiat, E.2
-
15
-
-
0037737759
-
-
[1]
-
J.Eggers, R. Baüml, R. Tzschoppe, and B.Girod. Scalar costa scheme for information embedding, in [1], pages 1003-1019.
-
Scalar Costa Scheme for Information Embedding
, pp. 1003-1019
-
-
Eggers, J.1
Baüml, R.2
Tzschoppe, R.3
Girod, B.4
-
16
-
-
0035790994
-
Considerations on watermarking security
-
Cannes, France, October
-
T. Kalker. Considerations on watermarking security. In Proc. MMSP, pages 201-206, Cannes, France, October 2001.
-
(2001)
Proc. MMSP
, pp. 201-206
-
-
Kalker, T.1
-
18
-
-
0033701078
-
Watermark copy attack
-
P.W. Wong and E. Delp, editors, San Jose, Cal., USA, January
-
M. Kutter, S. Voloshynovskiy, and A. Herrigel. Watermark copy attack. In P.W. Wong and E. Delp, editors, Security and Watermarking of Multimedia Contents II, volume 3971, San Jose, Cal., USA, January 2000.
-
(2000)
Security and Watermarking of Multimedia Contents II
, vol.3971
-
-
Kutter, M.1
Voloshynovskiy, S.2
Herrigel, A.3
-
19
-
-
0007751316
-
Analysis of the sensitivity attack against electronic watermarks in images
-
D. Aucsmith, editor, Proc. IHW, Portland, Oregon, USA, April Springer Verlag
-
J.P. Linnartz and M. van Dijk. Analysis of the sensitivity attack against electronic watermarks in images. In D. Aucsmith, editor, Proc. IHW, volume 1525 of Lecture Notes in Computer Science, Portland, Oregon, USA, April 1998. Springer Verlag.
-
(1998)
Lecture Notes in Computer Science
, vol.1525
-
-
Linnartz, J.P.1
Van Dijk, M.2
-
21
-
-
0034441409
-
Informed embedding: Exploiting image and detector information during watermark insertion
-
Vancouver, Canada, September
-
M. Miller, I. Cox, and J. Bloom. Informed embedding: exploiting image and detector information during watermark insertion. In Proc. ICIP, Vancouver, Canada, September 2000.
-
(2000)
Proc. ICIP
-
-
Miller, M.1
Cox, I.2
Bloom, J.3
-
22
-
-
0002561772
-
An information-theoritic approach to steganography and watermarking
-
A. Pfitzmann, editor, Dresden, Germany, September Springer Verlag
-
T. Mittelholzer. An information-theoritic approach to steganography and watermarking. In A. Pfitzmann, editor, Proc. IHW, pages 1-17, Dresden, Germany, September 1999. Springer Verlag.
-
(1999)
Proc. IHW
, pp. 1-17
-
-
Mittelholzer, T.1
-
23
-
-
0035369674
-
The role of information theory in watermarking and its application to image watermarking
-
P. Moulin. The role of information theory in watermarking and its application to image watermarking. Signal Processing, 81:1121-1139, 2001.
-
(2001)
Signal Processing
, vol.81
, pp. 1121-1139
-
-
Moulin, P.1
-
24
-
-
0037400124
-
Practical watermarking scheme based on wide spread spectrum and game theory
-
April
-
S. Pateux and G. Le Guelvouit. Practical watermarking scheme based on wide spread spectrum and game theory. Signal Processing: Image Communication, 18:283-296, April 2003.
-
(2003)
Signal Processing: Image Communication
, vol.18
, pp. 283-296
-
-
Pateux, S.1
Le Guelvouit, G.2
-
25
-
-
0035448026
-
Blind separation of instantaneous mixtures of non stationary sources
-
D.T. Pham and J.F. Cardoso. Blind separation of instantaneous mixtures of non stationary sources. IEEE Trans. Signal Processing, 49(9): 1837-1848, 2001.
-
(2001)
IEEE Trans. Signal Processing
, vol.49
, Issue.9
, pp. 1837-1848
-
-
Pham, D.T.1
Cardoso, J.F.2
-
26
-
-
84890522850
-
Communication theory of secrecy systems
-
October
-
C.E. Shannon. Communication theory of secrecy systems. Bell system technical journal, 28:656-715, October 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
27
-
-
0032123107
-
On the Cramr-Rao bound under parametric constraints
-
P. Stoica and B.C. Ng. On the Cramr-Rao bound under parametric constraints. IEEE Signal Processing Lett., 5(7): 177-179, 1998.
-
(1998)
IEEE Signal Processing Lett.
, vol.5
, Issue.7
, pp. 177-179
-
-
Stoica, P.1
Ng, B.C.2
-
28
-
-
0039132601
-
Blind separation of BPSK sources with residual carriers
-
January
-
A.-J. van der Veen. Blind separation of BPSK sources with residual carriers. Signal Processing, 73(10):67-79, January 1999.
-
(1999)
Signal Processing
, vol.73
, Issue.10
, pp. 67-79
-
-
Van Der Veen, A.-J.1
-
29
-
-
4544366059
-
On regularity and identifiability of blind source separation under constant-modulus constraints
-
To appear
-
Y. Yao and G.B. Giannakis. On regularity and identifiability of blind source separation under constant-modulus constraints. IEEE Trans. Signal Processing, 2004. To appear.
-
(2004)
IEEE Trans. Signal Processing
-
-
Yao, Y.1
Giannakis, G.B.2
|