-
1
-
-
13644262818
-
Hiding secret data in images via predictive coding
-
Yu Y.-H., Chang C.-C., and Hu Y.-C. Hiding secret data in images via predictive coding. Pattern Recognition 38 5 (2005) 691-705
-
(2005)
Pattern Recognition
, vol.38
, Issue.5
, pp. 691-705
-
-
Yu, Y.-H.1
Chang, C.-C.2
Hu, Y.-C.3
-
2
-
-
0842288710
-
A digital image watermarking method based on labeled bisecting clustering algorithm
-
Chu S.-C., Roddick J.F., Lu Z.-M., and Pan J.-S. A digital image watermarking method based on labeled bisecting clustering algorithm. IEICE Transactions on Fundamentals E87-A 1 (2004) 282-285
-
(2004)
IEICE Transactions on Fundamentals
, vol.E87-A
, Issue.1
, pp. 282-285
-
-
Chu, S.-C.1
Roddick, J.F.2
Lu, Z.-M.3
Pan, J.-S.4
-
3
-
-
0036497685
-
A steganographic method based upon JPEG and quantization table modification
-
Chang C.-C., Chen T.-S., and Chung L.-Z. A steganographic method based upon JPEG and quantization table modification. Information Sciences 141 (2002) 123-138
-
(2002)
Information Sciences
, vol.141
, pp. 123-138
-
-
Chang, C.-C.1
Chen, T.-S.2
Chung, L.-Z.3
-
4
-
-
0037410595
-
A steganographic method for images by pixel-value differencing
-
Wu D.-C., and Tsai W.-H. A steganographic method for images by pixel-value differencing. Pattern Recognition Letters 24 (2003) 1613-1626
-
(2003)
Pattern Recognition Letters
, vol.24
, pp. 1613-1626
-
-
Wu, D.-C.1
Tsai, W.-H.2
-
6
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox I.J., Kilian J., Leighton F.T., and Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6 12 (1997) 1673-1687
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
7
-
-
0036474718
-
A wavelet-based watermarking algorithm for ownership verification of digital images
-
Wang Y., Doherty J.F., and Van Dyck R.E. A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Transactions on Image Processing 11 2 (2002) 77-88
-
(2002)
IEEE Transactions on Image Processing
, vol.11
, Issue.2
, pp. 77-88
-
-
Wang, Y.1
Doherty, J.F.2
Van Dyck, R.E.3
-
8
-
-
0036773638
-
A new robust watermark embedding into wavelet DC components
-
Joo S., Suh Y., Shin J., Kikuchi H., and Cho S.-J. A new robust watermark embedding into wavelet DC components. ETRI Journal 24 5 (2002) 401-404
-
(2002)
ETRI Journal
, vol.24
, Issue.5
, pp. 401-404
-
-
Joo, S.1
Suh, Y.2
Shin, J.3
Kikuchi, H.4
Cho, S.-J.5
-
9
-
-
1942488388
-
Cryptanalysis of correlation-based watermarking schemes using single watermarked copy
-
Das T.K., and Maitra S. Cryptanalysis of correlation-based watermarking schemes using single watermarked copy. IEEE Signal Processing Letters 11 4 (2004) 446-449
-
(2004)
IEEE Signal Processing Letters
, vol.11
, Issue.4
, pp. 446-449
-
-
Das, T.K.1
Maitra, S.2
-
10
-
-
13244269881
-
Lossless generalized-LSB data embedding
-
Celik M.U., Sharma G., Tekalp A.M., and Saber E. Lossless generalized-LSB data embedding. IEEE Transactions on Image Processing 14 2 (2005) 253-266
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.2
, pp. 253-266
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
Saber, E.4
-
12
-
-
0036031345
-
Lossless data embedding for all image formats
-
Fridrich J., Goljan M., and Du R. Lossless data embedding for all image formats. Proceedings of SPIE Photonics West 4675, Electronic Imaging, Security and Watermarking of Multimedia Contents (San Jose, California) (2002) 572-583
-
(2002)
Proceedings of SPIE Photonics West 4675, Electronic Imaging, Security and Watermarking of Multimedia Contents (San Jose, California)
, pp. 572-583
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
13
-
-
0034251536
-
Repeating image watermarking technique by the visual cryptography
-
Wang C.-C., Tai S.-C., and Yu C.-S. Repeating image watermarking technique by the visual cryptography. IEICE Transactions on Fundamentals E83-A 8 (2000) 1589-1598
-
(2000)
IEICE Transactions on Fundamentals
, vol.E83-A
, Issue.8
, pp. 1589-1598
-
-
Wang, C.-C.1
Tai, S.-C.2
Yu, C.-S.3
-
14
-
-
33747620205
-
A copyright protection scheme for gray-level images based on image secret sharing and wavelet transformation
-
Hsieh S.-L., and Huang B.-Y. A copyright protection scheme for gray-level images based on image secret sharing and wavelet transformation. Proceedings of International Computer Symposium (2004) 661-666
-
(2004)
Proceedings of International Computer Symposium
, pp. 661-666
-
-
Hsieh, S.-L.1
Huang, B.-Y.2
-
15
-
-
0036605019
-
An image intellectual property protection scheme for gray-level images using visual secret sharing strategy
-
Chang C.-C., and Chung J.-C. An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Pattern Recognition Letters 23 (2002) 931-941
-
(2002)
Pattern Recognition Letters
, vol.23
, pp. 931-941
-
-
Chang, C.-C.1
Chung, J.-C.2
-
16
-
-
0037096996
-
A public verifiable copy protection technique for still image
-
Lee W.-B., and Chen T.-H. A public verifiable copy protection technique for still image. Journal of Systems and Software 62 (2002) 195-204
-
(2002)
Journal of Systems and Software
, vol.62
, pp. 195-204
-
-
Lee, W.-B.1
Chen, T.-H.2
-
17
-
-
84926193517
-
Visual cryptography, advances in cryptology: Eurocrypt'94
-
Naor N., and Shamir A. Visual cryptography, advances in cryptology: Eurocrypt'94. LNCS 950 (1995) 1-12
-
(1995)
LNCS
, vol.950
, pp. 1-12
-
-
Naor, N.1
Shamir, A.2
-
18
-
-
2642515522
-
A steganographic scheme for secure communications based on the chaos and Euler theorem
-
Lou D.-C., and Sung C.-H. A steganographic scheme for secure communications based on the chaos and Euler theorem. IEEE Transactions on Multimedia 6 3 (2004) 501-509
-
(2004)
IEEE Transactions on Multimedia
, vol.6
, Issue.3
, pp. 501-509
-
-
Lou, D.-C.1
Sung, C.-H.2
|