-
1
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Dec.
-
I. Cox, J. Killian, F. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Process
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.1
Killian, J.2
Leighton, F.3
Shamoon, T.4
-
3
-
-
0032075477
-
Some general methods for tampering with watermarking
-
May
-
I. Cox and J. P. Linnartz, "Some general methods for tampering with watermarking," IEEE J, Sel. Areas Commun., vol. 16, no. 4, pp. 587-593, May 1998.
-
(1998)
IEEE J, Sel. Areas Commun.
, vol.16
, Issue.4
, pp. 587-593
-
-
Cox, I.1
Linnartz, J.P.2
-
4
-
-
84957877979
-
Attacks on copyright marking systems
-
Apr.
-
F. Petitcolas, R. Anderson, and M. Kuhn, "Attacks on copyright marking systems," in Proc. 2nd Workshop Info. Hiding, Lecture Notes Comput. Sci., Apr. 1998, pp. 218-238.
-
(1998)
Proc. 2nd Workshop Info. Hiding, Lecture Notes Comput. Sci.
, pp. 218-238
-
-
Petitcolas, F.1
Anderson, R.2
Kuhn, M.3
-
5
-
-
0033601672
-
Spread spectrum watermarking: Malicious attacks and counterattacks
-
Jan.
-
F. Hartung, J. Su, and B. Girod, "Spread spectrum watermarking: Malicious attacks and counterattacks," in Proc. SPIE, Security and Watermarking of Multimedia Contents, Electronic Imaging, Jan. 1999, pp. 147-158.
-
(1999)
Proc. SPIE, Security and Watermarking of Multimedia Contents, Electronic Imaging
, pp. 147-158
-
-
Hartung, F.1
Su, J.2
Girod, B.3
-
6
-
-
84944317710
-
Efficient watermark detection and collusion security
-
Feb.
-
F. Zane, "Efficient watermark detection and collusion security," in Proc. 4th Int. Conf. Financial Cryptogrophy, Lecture Notes Comput. Sci., Feb. 2000, vol. 1962, pp. 21-32.
-
(2000)
Proc. 4th Int. Conf. Financial Cryptogrophy, Lecture Notes Comput. Sci.
, vol.1962
, pp. 21-32
-
-
Zane, F.1
-
7
-
-
0000676728
-
Combining digital watermarks and collusion secure fingerprints for digital images
-
Oct.
-
J. Dittmann, P. Schmitt, E. Saar, J. Schwenk, and J. Ueberberg, "Combining digital watermarks and collusion secure fingerprints for digital images," SPIE J. Electron. Imaging, vol. 9, no. 4, pp. 456-467, Oct. 2000.
-
(2000)
SPIE J. Electron. Imaging
, vol.9
, Issue.4
, pp. 456-467
-
-
Dittmann, J.1
Schmitt, P.2
Saar, E.3
Schwenk, J.4
Ueberberg, J.5
-
8
-
-
0038527384
-
Anti-collusion fingerprinting for multimedia
-
Apr.
-
W. Trappe, M. Wu, Z. Wang, and K. J. R. Liu, "Anti-collusion fingerprinting for multimedia," IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 1069-1087, Apr. 2003.
-
(2003)
IEEE Trans. Signal Processing
, vol.51
, Issue.4
, pp. 1069-1087
-
-
Trappe, W.1
Wu, M.2
Wang, Z.3
Liu, K.J.R.4
-
9
-
-
11844303521
-
Group-oriented fingerprinting for multimedia forensics
-
Nov.
-
Z. J. Wang, M. Wu, W. Trappe, and K. J. R. Liu, "Group-oriented fingerprinting for multimedia forensics," EURASIP J. Appl. Signal Processing, vol. 2004, no. 14, pp. 2142-2162, Nov. 2004.
-
(2004)
EURASIP J. Appl. Signal Processing
, vol.2004
, Issue.14
, pp. 2142-2162
-
-
Wang, Z.J.1
Wu, M.2
Trappe, W.3
Liu, K.J.R.4
-
10
-
-
84957610906
-
A note on the limits of collusionresistant watermarks
-
F. Ergun, J. Killian, and R. Kumar, "A note on the limits of collusionresistant watermarks," Advances in Cryptology, Lect. Notes Comput. Sci., vol. 1592, pp. 140-149, 2001.
-
(2001)
Advances in Cryptology, Lect. Notes Comput. Sci.
, vol.1592
, pp. 140-149
-
-
Ergun, F.1
Killian, J.2
Kumar, R.3
-
11
-
-
0037796443
-
-
Dept. Comput. Sci., Princeton Univ., Princeton, NJ, Tech. Rep. TR-585-98
-
J. Killian, T. Leighton, L. R. Matheson, T. G. Shamoon, R. Tajan, and F. Zane, Resistance of Digital Watermarks to Collusive Attacks Dept. Comput. Sci., Princeton Univ., Princeton, NJ, 1998, Tech. Rep. TR-585-98.
-
(1998)
Resistance of Digital Watermarks to Collusive Attacks
-
-
Killian, J.1
Leighton, T.2
Matheson, L.R.3
Shamoon, T.G.4
Tajan, R.5
Zane, F.6
-
12
-
-
84937053497
-
Capacity of digital watermarks subject to an optimal collusion attacks
-
presented at the, Tampere, Finland
-
J. Su, J. Eggers, and B. Girod, "Capacity of digital watermarks subject to an optimal collusion attacks," presented at the Eur. Signal Processing Conf., Tampere, Finland, 2000.
-
(2000)
Eur. Signal Processing Conf.
-
-
Su, J.1
Eggers, J.2
Girod, B.3
-
13
-
-
18844450187
-
Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting
-
May
-
H. Zhao, M. Wu, Z. J. Wang, and K. J. R. Liu, "Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting," IEEE Trans. Image Process., vol. 14, no. 5, pp. 646-661, May 2005.
-
(2005)
IEEE Trans. Image Process
, vol.14
, Issue.5
, pp. 646-661
-
-
Zhao, H.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
-
15
-
-
20444373301
-
Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation
-
Jun.
-
Z. J. Wang, M. Wu, H. Zhao, W. Trappe, and K. J. R. Liu, "Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation," IEEE Trans. Image Process., vol. 14, no. 6, pp. 804-821, Jun. 2005.
-
(2005)
IEEE Trans. Image Process
, vol.14
, Issue.6
, pp. 804-821
-
-
Wang, Z.J.1
Wu, M.2
Zhao, H.3
Trappe, W.4
Liu, K.J.R.5
-
16
-
-
33748105251
-
Behavior forensics for scalable multi-user collusion: Fairness and effectiveness
-
Sep.
-
H. Zhao and K. J. R. Liu, "Behavior forensics for scalable multi-user collusion: Fairness and effectiveness," IEEE Trans. Inf. Forensics Security, vol. 1, no. 3, pp. 311-329, Sep. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.3
, pp. 311-329
-
-
Zhao, H.1
Liu, K.J.R.2
-
17
-
-
0032072279
-
Image adaptive watermarking using visual models
-
May
-
C. Podilchuk and W. Zeng, "Image adaptive watermarking using visual models," IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 525-540, May 1998.
-
(1998)
IEEE J. Sel. Areas Commun.
, vol.16
, Issue.4
, pp. 525-540
-
-
Podilchuk, C.1
Zeng, W.2
-
18
-
-
0032070304
-
Multiresolution scene-based video watermarking using perceptual models
-
May
-
M. Swanson, B. Zhu, and A. Tewfik, "Multiresolution scene-based video watermarking using perceptual models," IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 540-550, May 1998.
-
(1998)
IEEE J. Sel. Areas Commun.
, vol.16
, Issue.4
, pp. 540-550
-
-
Swanson, M.1
Zhu, B.2
Tewfik, A.3
-
19
-
-
13144275283
-
Statistical invisibility for collusion-resistant digital video watermarking
-
Feb.
-
K. Su, D. Kundur, and D. Hatzinakos, "Statistical invisibility for collusion-resistant digital video watermarking," IEEE Trans. Multimedia, vol. 7, no. 1, pp. 43-51, Feb. 2005.
-
(2005)
IEEE Trans. Multimedia
, vol.7
, Issue.1
, pp. 43-51
-
-
Su, K.1
Kundur, D.2
Hatzinakos, D.3
-
20
-
-
13144281779
-
Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance
-
Feb.
-
K. Su, D. Kundur, and D. Hatzinakos, "Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance," IEEE Trans. Multimedia, vol. 7, no. 1, pp. 52-66, Feb. 2005.
-
(2005)
IEEE Trans. Multimedia
, vol.7
, Issue.1
, pp. 52-66
-
-
Su, K.1
Kundur, D.2
Hatzinakos, D.3
-
21
-
-
0035159083
-
Frame interpolation using transmitted block-based motion vectors
-
Oct.
-
S. Yoon and N. Ahuja, "Frame interpolation using transmitted block-based motion vectors," in Proc. IEEE Int. Conf. Image Process., Oct. 2001, vol. 3, pp. 856-859.
-
(2001)
Proc. IEEE Int. Conf. Image Process
, vol.3
, pp. 856-859
-
-
Yoon, S.1
Ahuja, N.2
-
22
-
-
0012839687
-
-
Upper Saddle River, NJ: Prentice-Hall
-
Y. Wang, J. Ostermann, and Y. Zhang, Video Processing and Communications, 1st ed. Upper Saddle River, NJ: Prentice-Hall, 2001.
-
(2001)
Video Processing and Communications, 1st Ed.
-
-
Wang, Y.1
Ostermann, J.2
Zhang, Y.3
|