-
1
-
-
84856043672
-
A mathematical theory of communication
-
623-656
-
Shannon, C.: A mathematical theory of communication. Bell System Technical Journal 27 (1948) 379-423 & 623-656
-
(1948)
Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.1
-
2
-
-
0021486174
-
Cryptology and the origins of spread spectrum
-
Kahn, D.: Cryptology and the origins of spread spectrum. IEEE Spectrum 21 (1984) 70-80
-
(1984)
IEEE Spectrum
, vol.21
, pp. 70-80
-
-
Kahn, D.1
-
4
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon, C.: Communication theory of secrecy systems. Bell System Technical Journal 28 (1949) 656-715
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.1
-
6
-
-
21844463487
-
Watermarking security: Theory and practice
-
Cayre, F., Fontaine, C., Furon, T.: Watermarking security: Theory and practice. IEEE Transactions on Signal Processing, Supplement on Secure Media 53 (2005) 3976-3987
-
(2005)
IEEE Transactions on Signal Processing, Supplement on Secure Media
, vol.53
, pp. 3976-3987
-
-
Cayre, F.1
Fontaine, C.2
Furon, T.3
-
7
-
-
33746628959
-
Fundamentals of data hiding security and their applications to spread spectrum analysis
-
Proceedings of the 7th International Workshop on Information Hiding
-
Comesaña, P., Pérez-Freire, L., Pérez- Gonzàlez, F.: Fundamentals of data hiding security and their applications to spread spectrum analysis. In: Proceedings of the 7th International Workshop on Information Hiding. Volume 3727 of LNCS. (2005) 146-160
-
(2005)
LNCS
, vol.3727
, pp. 146-160
-
-
Comesaña, P.1
Pérez-Freire, L.2
Pérez-Gonzàlez, F.3
-
8
-
-
33746637553
-
Information-theoretic analysis of security in side-informed data hiding
-
Proceedings of the 7th International Workshop on Information Hiding
-
Pérez-Freire, L., Comesaña, P., Pérez- Gonzàlez, F.: Information-theoretic analysis of security in side-informed data hiding. In: Proceedings of the 7th International Workshop on Information Hiding. Volume 3727 of LNCS. (2005) 131-145
-
(2005)
LNCS
, vol.3727
, pp. 131-145
-
-
Pérez-Freire, L.1
Comesaña, P.2
Pérez-Gonzàlez, F.3
-
9
-
-
33645670509
-
Secret dither estimation in lattice-quantization data hiding: A set-membership approach
-
Security, Steganography, and Watermarking of Multimedia Contents VIII
-
Pérez-Freire, L., Pérez-Gonzàlez, F., Comesaña, P.: Secret dither estimation in lattice-quantization data hiding: a set-membership approach. In: Security, Steganography, and Watermarking of Multimedia Contents VIII. Volume 6072 of Proceedings of SPIE. (2006) 6072-0W
-
(2006)
Proceedings of SPIE
, vol.6072
-
-
Pérez-Freire, L.1
Pérez-Gonzàlez, F.2
Comesaña, P.3
-
11
-
-
84944403312
-
An asymmetric public detection watermarking technique
-
Proceedings of the Third Information Hiding Workshop
-
Furon, T., Duhamel, P.: An asymmetric public detection watermarking technique. In: Proceedings of the Third Information Hiding Workshop. Volume 1768 of Lecture Notes in Computer Science. (1999) 88-100
-
(1999)
Lecture Notes in Computer Science
, vol.1768
, pp. 88-100
-
-
Furon, T.1
Duhamel, P.2
-
14
-
-
0034769637
-
Unified approach of asymmetric watermarking schemes
-
Security and Watermarking of Multimedia Contents III
-
Furon, T., Venturini, I., Duhamel, P.: Unified approach of asymmetric watermarking schemes. In: Security and Watermarking of Multimedia Contents III. Volume 4314 of Proceedings of SPIE. (2001) 269-279
-
(2001)
Proceedings of SPIE
, vol.4314
, pp. 269-279
-
-
Furon, T.1
Venturini, I.2
Duhamel, P.3
-
16
-
-
0019009078
-
OSI reference model - The ISO model of architecture for open systems interconnection
-
Zimmermann, H.: OSI reference model - the ISO model of architecture for open systems interconnection. IEEE Transactions on Communications 28 (1980) 425-432
-
(1980)
IEEE Transactions on Communications
, vol.28
, pp. 425-432
-
-
Zimmermann, H.1
-
17
-
-
0033701078
-
Watermark copy attack
-
Security and Watermarking of Multimedia Contents II
-
Kutter, M., Voloshynovskiy, S., Herrigel, A.: Watermark copy attack. In: Security and Watermarking of Multimedia Contents II. Volume 3971 of Proceedings of SPIE. (2000) 371-380
-
(2000)
Proceedings of SPIE
, vol.3971
, pp. 371-380
-
-
Kutter, M.1
Voloshynovskiy, S.2
Herrigel, A.3
-
19
-
-
0038527384
-
Anti-collusion fingerprinting for multimedia
-
Trappe, W., Wu, M., Wang, Z., Liu, K.: Anti-collusion fingerprinting for multimedia. IEEE Transaction on Signal Processing, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery 51 (2003) 1069-1087
-
(2003)
IEEE Transaction on Signal Processing, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery
, vol.51
, pp. 1069-1087
-
-
Trappe, W.1
Wu, M.2
Wang, Z.3
Liu, K.4
-
22
-
-
21844446901
-
Temporal synchronization of water-marked video using image hashing
-
Security, Steganography and Watermarking of Multimedia Contents VII
-
Harmanci, Ö., Kucukgoz, M., Mihçak, K.: Temporal synchronization of water-marked video using image hashing. In: Security, Steganography and Watermarking of Multimedia Contents VII. Volume 5681 of Proceedings of SPIE. (2005) 370-380
-
(2005)
Proceedings of SPIE
, vol.5681
, pp. 370-380
-
-
Harmanci, Ö.1
Kucukgoz, M.2
Mihçak, K.3
-
23
-
-
2942568431
-
Applying informed coding and informed embedding to design a robust, high capacity watermark
-
Miller, M.L., Doërr, G., Cox, I.J.: Applying informed coding and informed embedding to design a robust, high capacity watermark. IEEE Transactions on Image Processing 13 (2004) 792-807
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, pp. 792-807
-
-
Miller, M.L.1
Doërr, G.2
Cox, I.J.3
-
24
-
-
33646183263
-
Trellis-coded rational dither modulation for digital watermarking
-
Proceedings of the 4th International Workshop on Digital Watermarking
-
Abrardo, A., Barni, M., Pérez-Gonzàlez, F., Mosquera, C.: Trellis-coded rational dither modulation for digital watermarking. In: Proceedings of the 4th International Workshop on Digital Watermarking. Volume 3710 of LNCS. (2005) 351-360
-
(2005)
LNCS
, vol.3710
, pp. 351-360
-
-
Abrardo, A.1
Barni, M.2
Pérez-Gonzàlez, F.3
Mosquera, C.4
-
26
-
-
27844535360
-
Robust video hashing based on radial projections of key frames
-
De Hoover, C., De Vleeschouwer, C., Lefèbvre, F., Macq, B.: Robust video hashing based on radial projections of key frames. IEEE Transactions on Signal Processing, Supplement on Secure Media 53 (2005) 4020-4037
-
(2005)
IEEE Transactions on Signal Processing, Supplement on Secure Media
, vol.53
, pp. 4020-4037
-
-
De Hoover, C.1
De Vleeschouwer, C.2
Lefèbvre, F.3
Macq, B.4
-
27
-
-
20444500587
-
Robust perceptual image hashing via matrix invariants
-
Kozat, S., Venkatesan, R., Mihçak, K.: Robust perceptual image hashing via matrix invariants. In: Proceedings of the IEEE International Conference on Image Processing. Volume V. (2004) 3443-3446
-
(2004)
Proceedings of the IEEE International Conference on Image Processing
, vol.5
, pp. 3443-3446
-
-
Kozat, S.1
Venkatesan, R.2
Mihçak, K.3
-
28
-
-
33845404068
-
Robust image hashing via non-negative matrix factorizations
-
Monga, V., Mihçak, K.: Robust image hashing via non-negative matrix factorizations. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing. Volume II. (2006) 225-228
-
(2006)
Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing
, vol.2
, pp. 225-228
-
-
Monga, V.1
Mihçak, K.2
-
29
-
-
84884742176
-
A crypto signature scheme for image authentication over wireless channel
-
Sun, Q., Ye, S., Lin, C.-Y., Chang, S.-F.: A crypto signature scheme for image authentication over wireless channel. International Journal of Image and Graphics 5 (2005) 1-14
-
(2005)
International Journal of Image and Graphics
, vol.5
, pp. 1-14
-
-
Sun, Q.1
Ye, S.2
Lin, C.-Y.3
Chang, S.-F.4
-
31
-
-
35048820669
-
On the integration of watermarks and cryptography
-
Proceedings of the 2nd International Workshop on Digital Watermarking
-
Katzenbeisser, S.: On the integration of watermarks and cryptography. In: Proceedings of the 2nd International Workshop on Digital Watermarking. Volume 2939 of Lecture Notes in Computer Science. (2003) 50-60
-
(2003)
Lecture Notes in Computer Science
, vol.2939
, pp. 50-60
-
-
Katzenbeisser, S.1
|