-
1
-
-
33746638953
-
Fundamentals of data hiding security and their application to spread-spectrum analysis
-
Lecture Notes in Computer Science, Barcelona, Spain, June, Springer Verlag
-
Pedro Comesaña, Luis Pérez-Freire, and Fernando Pérez-González. Fundamentals of data hiding security and their application to spread-spectrum analysis. In 7th Information Hiding Workshop, IH05, Lecture Notes in Computer Science, Barcelona, Spain, June 2005, Springer Verlag.
-
(2005)
7th Information Hiding Workshop, IH05
-
-
Comesaña, P.1
Pérez-Freire, L.2
Pérez-González, F.3
-
2
-
-
0035790994
-
Considerations on watermarking security
-
Cannes, France, October
-
T. Kalker. Considerations on watermarking security. In Proc. of MMSP, pages 201-206, Cannes, France, October 2001.
-
(2001)
Proc. of MMSP
, pp. 201-206
-
-
Kalker, T.1
-
3
-
-
21844452952
-
Watermarking security part I: Theory
-
San Jose, USA, January
-
F. Cayre, C. Fontaine, and T. Furon, Watermarking security part I; Theory. In Proceedings of SPIE, Security, Steganography and Watermarking of Multimedia Contents VII, volume 5681, San Jose, USA, January 2005.
-
(2005)
Proceedings of SPIE, Security, Steganography and Watermarking of Multimedia Contents VII
, vol.5681
-
-
Cayre, F.1
Fontaine, C.2
Furon, T.3
-
4
-
-
4544241479
-
Danger of low-dimensional watermarking subspaces
-
May
-
Gwenaël J Doërr and Jean-Luc Dugelay. Danger of low-dimensional watermarking subspaces. In ICASSP 2004, 29th IEEE International Conference on Acoustics, Speech, and Signal Processing, May 17-21, 2004, Montreal, Canada, May 2004.
-
(2004)
ICASSP 2004, 29th IEEE International Conference on Acoustics, Speech, and Signal Processing, May 17-21, 2004, Montreal, Canada
-
-
Doërr, G.J.1
Dugelay, J.-L.2
-
5
-
-
84994294924
-
Information-theoretic analysis of security in side-informed data hiding
-
Lecture Notes in Computer Science, Barcelona, Spain, June. Springer Verlag
-
Luis Pérez-Freire, Pedro Comesaña, and Fernando Pérez-González, Information-theoretic analysis of security in side-informed data hiding. In 7th Information Hiding Workshop, IH05, Lecture Notes in Computer Science, Barcelona, Spain, June 2005. Springer Verlag.
-
(2005)
7th Information Hiding Workshop, IH05
-
-
Pérez-Freire, L.1
Comesaña, P.2
Pérez-González, F.3
-
6
-
-
21844449972
-
Watermarking security part II: Practice
-
San Jose, USA, January
-
F. Cayre, C. Fontaine, and T. Furon. Watermarking security part II: Practice. In Proceedings of SPIE, Security, Steganography and Watermarking of Multimedia Contents VII, volume 5681, San Jose, USA, January 2005.
-
(2005)
Proceedings of SPIE, Security, Steganography and Watermarking of Multimedia Contents VII
, vol.5681
-
-
Cayre, F.1
Fontaine, C.2
Furon, T.3
-
8
-
-
0032629347
-
Fast and robust fixed-point algorithms for independent component analysis
-
A. Hyvärinen. Fast and robust fixed-point algorithms for independent component analysis. IEEE Transactions on Neural Networks, 10(3):626-634, 1999.
-
(1999)
IEEE Transactions on Neural Networks
, vol.10
, Issue.3
, pp. 626-634
-
-
Hyvärinen, A.1
-
9
-
-
0002719797
-
The Hungarian method of solving the assignment problem
-
Kuhn, H. W. The Hungarian method of solving the assignment problem. Naval Res. Logistics Quart., 2:83-97, 1955.
-
(1955)
Naval Res. Logistics Quart.
, vol.2
, pp. 83-97
-
-
Kuhn, H.W.1
-
10
-
-
0038527410
-
Improved spread spectrum: A new modulation technique for robust watermarking
-
Malvar and Florencio. Improved spread spectrum: A new modulation technique for robust watermarking. IEEE Transactions on Signal Processing, 51, 2003.
-
(2003)
IEEE Transactions on Signal Processing
, pp. 51
-
-
Malvar1
Florencio2
-
11
-
-
38849168937
-
Natural watermarking: A secure spread spectrum technique for woa
-
Neil F. Johnson, editor, Lecture notes in computer science, Virginia, USA, Springer Verlag, Berlin, Germany
-
P. Bas and F. Cayre. Natural watermarking: a secure spread spectrum technique for woa. In Neil F. Johnson, editor, Information Hiding; 8th international workshop, Lecture notes in computer science, Virginia, USA, 2006, Springer Verlag, Berlin, Germany.
-
(2006)
Information Hiding; 8th International Workshop
-
-
Bas, P.1
Cayre, F.2
-
12
-
-
0037737759
-
Scalar costa scheme for information embedding
-
April
-
J. J. Eggers, R. Buml, R. Tzschoppe, and B. Girod. Scalar costa scheme for information embedding. IEEE Trans. on Signal Processing, 51(4):1003-1019, April 2003.
-
(2003)
IEEE Trans. on Signal Processing
, vol.51
, Issue.4
, pp. 1003-1019
-
-
Eggers, J.J.1
Buml, R.2
Tzschoppe, R.3
Girod, B.4
-
14
-
-
0004285345
-
-
The Art of Computer Programming. Addison-Wesley, Reading, Mass., 2nd ed.
-
Donald E. Knuth. The Art of Computer Programming. Vol. 2: Seminumerical Algorithms. Addison-Wesley, Reading, Mass., 1988, 2nd ed.
-
(1988)
Seminumerical Algorithms
, vol.2
-
-
Knuth, D.E.1
-
15
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
may
-
Brian Chen and Gregory W. Wornell. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. In IEEE Transaction on information theory, Vol. 47, N. 4, pages 1423-1443, may 2001.
-
(2001)
IEEE Transaction on Information Theory, Vol. 47, N. 4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
16
-
-
2942568431
-
Applying informed coding and embedding to design a robust, high capacity watermark
-
M. L. Miller, G. J. Doerr, and I. J. Cox. Applying informed coding and embedding to design a robust, high capacity watermark. IEEE Trans. on Image Processing, 6(13):791-807, 2004.
-
(2004)
IEEE Trans. on Image Processing
, vol.6
, Issue.13
, pp. 791-807
-
-
Miller, M.L.1
Doerr, G.J.2
Cox, I.J.3
|