-
2
-
-
84947227462
-
An analysis of one of the SDMI candidates
-
Information Hiding 2001. Springer, Berlin Heidelberg New York
-
Boeuf, J., Stern, J.P.: An analysis of one of the SDMI candidates. In: Information Hiding 2001. Lecture Notes in Computer Science, vol. 2137, pp. 395-410 Springer, Berlin Heidelberg New York (2001)
-
(2001)
Lecture Notes in Computer Science
, vol.2137
, pp. 395-410
-
-
Boeuf, J.1
Stern, J.P.2
-
3
-
-
21844452952
-
Watermarking security part I: Theory
-
SPIE
-
Cayre, F., Fontaine, C., Furon, T.: Watermarking security part I: theory. In: The Proceedings of International Conference on Security, Steganography and Watermarking of Multimedia Contents VISPIE-IS & T Electronic Imaging, SPIE, vol. 5681, pp. 746-757, 2005
-
(2005)
The Proceedings of International Conference on Security, Steganography and Watermarking of Multimedia Contents VISPIE-IS & T Electronic Imaging
, vol.5681
, pp. 746-757
-
-
Cayre, F.1
Fontaine, C.2
Furon, T.3
-
4
-
-
13244284705
-
Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme
-
Das, T.K., Maitra, S., Mitra, J.: Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme. IEEE Trans. Signal Process. 53(2), 768-775 (2005)
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, Issue.2
, pp. 768-775
-
-
Das, T.K.1
Maitra, S.2
Mitra, J.3
-
5
-
-
1942488388
-
Cryptanalysis of correlation based water-marking schemes using single watermarked copy
-
Das, T.K., Maitra, S.: Cryptanalysis of correlation based water-marking schemes using single watermarked copy. IEEE Signal Process. Lett. 11(4), 446-449 (2004)
-
(2004)
IEEE Signal Process. Lett.
, vol.11
, Issue.4
, pp. 446-449
-
-
Das, T.K.1
Maitra, S.2
-
6
-
-
84957610906
-
A note on the limits of collusion-resistant watermarks
-
Eurocrypt 1999. Springer, Berlin Heidelberg New york
-
Ergun, F., Kilian J., Kumar, R.: A note on the limits of collusion-resistant watermarks. In: Eurocrypt 1999. LNCS, vol. 1592, pp. 140-149, Springer, Berlin Heidelberg New york (1999)
-
(1999)
LNCS
, vol.1592
, pp. 140-149
-
-
Ergun, F.1
Kilian, J.2
Kumar, R.3
-
7
-
-
0041809184
-
Key-dependent random image transforms and their applications in image watermarking
-
Las Vegas, NV, USA, June
-
Fridrich, J.: Key-dependent random image transforms and their applications in image watermarking. In: Proceedings of the International Conference on Imaging Science, Systems, and Technology, CISST'99, Las Vegas, NV, pp. 237-243, USA, June 1999
-
(1999)
Proceedings of the International Conference on Imaging Science, Systems, and Technology, CISST'99
, pp. 237-243
-
-
Fridrich, J.1
-
8
-
-
84957892352
-
Robust digital water-marking based on key-dependent basis functions
-
Information Hiding: Second International Workshop. Portland, OR, USA, April 1998. Springer, Berlin Heidelberg New York
-
Fridrich, J., Baldoza, A.C., Simard, R.J.: Robust digital water-marking based on key-dependent basis functions. In: Information Hiding: Second International Workshop. Portland, OR, USA, April 1998. Lecture Notes in Computer Science, vol. 1525, pp. 143-157, Springer, Berlin Heidelberg New York (1998)
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 143-157
-
-
Fridrich, J.1
Baldoza, A.C.2
Simard, R.J.3
-
10
-
-
84947916149
-
Recovery of watermarks from distorted images
-
Proceedings of the Third Information Hiding Workshop, Springer, Berlin Heidelberg New York
-
Johnson, N.F., Duric, Z., Jajodia, S.: Recovery of watermarks from distorted images. In: Proceedings of the Third Information Hiding Workshop, LNCS, vol. 1768, pp. 318-332. Springer, Berlin Heidelberg New York (2000)
-
(2000)
LNCS
, vol.1768
, pp. 318-332
-
-
Johnson, N.F.1
Duric, Z.2
Jajodia, S.3
-
12
-
-
0003482564
-
-
Katzenbeisser, S., Petitcolas, F.A.P., (eds). Artech House, USA
-
Katzenbeisser, S., Petitcolas, F.A.P., (eds): Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, USA (2000)
-
(2000)
Information Hiding Techniques for Steganography and Digital Watermarking
-
-
-
13
-
-
0003185688
-
La cryptographie militaire
-
Jan, 161-191, FEB 1883
-
Kerckhoffs, A.: La Cryptographie Militaire. J. Sci. Mil. 9th series, IX, 5-38, Jan 1883, 161-191, FEB 1883
-
(1883)
J. Sci. Mil. 9th Series
, vol.9
, pp. 5-38
-
-
Kerckhoffs, A.1
-
14
-
-
0036350089
-
Embedding and detecting spread-spectrum watermarks under the estimation attack
-
Kirovski, D., Malvar, H.S.: Embedding and detecting spread-spectrum watermarks under the estimation attack. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, 2002
-
(2002)
IEEE International Conference on Acoustics, Speech, and Signal Processing
-
-
Kirovski, D.1
Malvar, H.S.2
-
15
-
-
35248891551
-
Replacement attack on arbitrary watermarking systems
-
ACM Workshop on Digital Rights Management 2002. Springer, Berlin Heidelberg New York
-
Kirovski, D., Petitcolas, F.A.P.: Replacement attack on arbitrary watermarking systems. In: ACM Workshop on Digital Rights Management 2002. Lecture Notes in Computer Science, vol. 2696, pp. 177-189. Springer, Berlin Heidelberg New York (2002)
-
(2002)
Lecture Notes in Computer Science
, vol.2696
, pp. 177-189
-
-
Kirovski, D.1
Petitcolas, F.A.P.2
-
16
-
-
0002883985
-
Improved digital watermarking through diversity and attack characterization
-
Orlando, FL, USA, October
-
Kundur, D.: Improved digital watermarking through diversity and attack characterization. In: Proceedings of the ACM Workshop on Multimedia Security'99, Orlando, FL, USA, October 1999, pp. 53-58
-
(1999)
Proceedings of the ACM Workshop on Multimedia Security'99
, pp. 53-58
-
-
Kundur, D.1
-
17
-
-
0035127750
-
Optimal differential energy watermarking of DCT encoded images and video
-
Langelaar, G.C., Lagendijk, R.L.: Optimal differential energy watermarking of DCT encoded images and video. IEEE Trans. Image Process. 10(1), 148-158 (2001)
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.1
, pp. 148-158
-
-
Langelaar, G.C.1
Lagendijk, R.L.2
-
18
-
-
0024700097
-
A theory of multi resolution signal decomposition: The Wavelet representation
-
Mallat, S.G.: A theory of multi resolution signal decomposition: the Wavelet representation. IEEE Trans PAMI 11, 674-693 (1989)
-
(1989)
IEEE Trans PAMI
, vol.11
, pp. 674-693
-
-
Mallat, S.G.1
-
19
-
-
35248849238
-
Cryptanalysis of discrete-sequence spread spectrum watermarks
-
Workshop on Information Hiding 2002, Springer, Berlin Heidelbreg New York
-
Mihcak, M.K., Venkatesan, R., Kesal, M.: Cryptanalysis of discrete-sequence spread spectrum watermarks. In: Workshop on Information Hiding 2002, Lecture Notes in Computer Science, vol 2578, pp. 226-246. Springer, Berlin Heidelbreg New York (2003)
-
(2003)
Lecture Notes in Computer Science
, vol.2578
, pp. 226-246
-
-
Mihcak, M.K.1
Venkatesan, R.2
Kesal, M.3
-
20
-
-
0035167831
-
Watermark security via wavelet filter parameterization
-
2001
-
Meerwald, P., Uhl, A.: Watermark Security via Wavelet Filter Parameterization. In: The Proceedings of ICIP, 2001, vol. 3, pp. 1027-1030, 2001
-
(2001)
The Proceedings of ICIP
, vol.3
, pp. 1027-1030
-
-
Meerwald, P.1
Uhl, A.2
-
21
-
-
84957877979
-
Attacks on copyright marking systems
-
2nd Workshop on Information Hiding. Springer, Berlin Heidelberg New York
-
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G., Aucsmith, D.: Attacks on copyright marking systems. In: 2nd Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 1525 pp. 28-238. Springer, Berlin Heidelberg New York (1998)
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 28-238
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
Aucsmith, D.4
-
22
-
-
33645413341
-
Evaluation of copyright marking systems
-
Florence, Italy, June
-
Petitcolas, F.A.F., Anderson, R.J.: Evaluation of copyright marking systems. In: IEEE Multimedia Systems, Florence, Italy, June 1999
-
(1999)
IEEE Multimedia Systems
-
-
Petitcolas, F.A.F.1
Anderson, R.J.2
-
23
-
-
0346396224
-
Cryptographic copyright protection for digital images based on watermarking techniques
-
Ruanaidh, J.O., Petersen, H., Herrigel, A., Pereira, S., Pun, T.: Cryptographic copyright protection for digital images based on watermarking techniques. Theor. Comput. Sci. 226, 117-142 (1999)
-
(1999)
Theor. Comput. Sci.
, vol.226
, pp. 117-142
-
-
Ruanaidh, J.O.1
Petersen, H.2
Herrigel, A.3
Pereira, S.4
Pun, T.5
-
24
-
-
0036474718
-
A wavelet-based watermarking algorithm for ownership verification of digital images
-
Wang, Y., Doherty, J.F., VanDyck, R.E.: A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans. Image Process. 11(2), 77-88 (2002)
-
(2002)
IEEE Trans. Image Process.
, vol.11
, Issue.2
, pp. 77-88
-
-
Wang, Y.1
Doherty, J.F.2
VanDyck, R.E.3
-
25
-
-
0032402514
-
Watermark design for embedded wavelet image codec
-
San Diego, CA, USA, July
-
Wang, H.-J., Kuo, C.-C.J.: Watermark design for embedded wavelet image codec. In: Proceedings of the SPIE's 43rd Annual Meeting, Applications of Digital Image Processing, San Diego, CA, USA, July 1998, vol. 3460, pp. 388-1398
-
(1998)
Proceedings of the SPIE's 43rd Annual Meeting, Applications of Digital Image Processing
, vol.3460
, pp. 388-1398
-
-
Wang, H.-J.1
Kuo, C.-C.J.2
-
26
-
-
1942486241
-
Wavelet tree quantization for copyright protection watermarking
-
Wang, S.-H., Lin, Y.-P: Wavelet tree quantization for copyright protection watermarking. IEEE Trans. Image Process. 13(2), 154-165 (2004)
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.2
, pp. 154-165
-
-
Wang, S.-H.1
Lin, Y.-P.2
|