-
1
-
-
0041320695
-
A general framework for robust watermarking security
-
Oct., special issue on Security of Data Hiding Technologies, invited paper
-
M. Barni, F. Bartolini, and T. Furon, "A general framework for robust watermarking security," Signal Process., vol. 83, no. 10, pp. 2069-2084, Oct. 2003, special issue on Security of Data Hiding Technologies, invited paper.
-
(2003)
Signal Process.
, vol.83
, Issue.10
, pp. 2069-2084
-
-
Barni, M.1
Bartolini, F.2
Furon, T.3
-
2
-
-
21844463487
-
Watermarking security: Theory and practice
-
Oct.
-
F. Cayre, C. Fontaine, and T. Furon, "Watermarking security: Theory and practice," IEEE Trans. Signal Process., vol. 53, no. 10, pt. 2, pp. 3976-3987, Oct. 2005.
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, Issue.10 PART 2
, pp. 3976-3987
-
-
Cayre, F.1
Fontaine, C.2
Furon, T.3
-
3
-
-
33746638953
-
Fundamentals of data hiding security and their application to spread- spectrum analysis
-
presented at the, Barcelona, Spain, Jun., ser. Lecture Notes Computer Science, Springer Verlag
-
P. Comesaña, L. Pérez-Freire, and F. Pérez- González, "Fundamentals of data hiding security and their application to spread- spectrum analysis," presented at the 7th Information Hiding Workshop, IH05, Barcelona, Spain, Jun. 2005, ser. Lecture Notes Computer Science, Springer Verlag.
-
(2005)
7th Information Hiding Workshop, IH05
-
-
Comesaña, P.1
Pérez-Freire, L.2
Pérez-González, F.3
-
4
-
-
0003185688
-
La cryptographic militaire
-
Jan.
-
A. Kerckhoffs, "La cryptographic militaire," J. Sci. Militaires, vol. 9, pp. 5-38, Jan. 1883.
-
(1883)
J. Sci. Militaires
, vol.9
, pp. 5-38
-
-
Kerckhoffs, A.1
-
5
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
7
-
-
28944435491
-
Data hiding codes
-
Dec.
-
P. Moulin and R. Koetter, "Data hiding codes," Proc. IEEE, vol. 93, no. 12, pp. 2083-2126, Dec. 2005.
-
(2005)
Proc. IEEE
, vol.93
, Issue.12
, pp. 2083-2126
-
-
Moulin, P.1
Koetter, R.2
-
8
-
-
35248849238
-
Cryptanalysis of discrete-sequence spread spectrum watermarks
-
F. A. P. Petitcolas, Ed., Noordwijkerhout, The Netherlands, Oct.
-
M. K. Mihcak, R. Venkatesan, and M. Kesal, "Cryptanalysis of discrete-sequence spread spectrum watermarks," in Proc. 5th Int. Workshop Digital Watermarking, F. A. P. Petitcolas, Ed., Noordwijkerhout, The Netherlands, Oct. 2002, pp. 226-246.
-
(2002)
Proc. 5th Int. Workshop Digital Watermarking
, pp. 226-246
-
-
Mihcak, M.K.1
Venkatesan, R.2
Kesal, M.3
-
9
-
-
4744367575
-
Security pitfalls of frame-by-frame approaches to video watermarking
-
Oct.
-
G. Doc̈rr and J.-L. Dugelay, "Security pitfalls of frame-by-frame approaches to video watermarking," IEEE Trans. Signal Process., Supplement Secure Media, vol. 52, no. 10, pp. 2955-2964, Oct. 2004.
-
(2004)
IEEE Trans. Signal Process., Supplement Secure Media
, vol.52
, Issue.10
, pp. 2955-2964
-
-
Doc̈rr, G.1
Dugelay, J.-L.2
-
10
-
-
84994294924
-
Information-theoretic analysis of security in side-informed data hiding
-
Barcelona, Spain, Jun., ser. Lecture Notes Computer Science, Springer Verlag
-
L. Pérez-Freire, P. Comesaña, and F. Pérez- González, "Information-theoretic analysis of security in side-informed data hiding," in 7th Information Hiding Workshop, Barcelona, Spain, Jun. 2005, ser. Lecture Notes Computer Science, Springer Verlag.
-
(2005)
7th Information Hiding Workshop
-
-
Pérez-Freire, L.1
Comesaña, P.2
Pérez-González, F.3
-
11
-
-
0036030769
-
Estimation of amplitude modifications before SCS watermark detection
-
San Jose, CA, Jan.
-
J. Eggers, R. Bäuml, and B. Girod, "Estimation of amplitude modifications before SCS watermark detection," in Proc. Security and Watermarking of Multimedia Contents IV, San Jose, CA, Jan. 2002, vol. 4675, pp. 387-398.
-
(2002)
Proc. Security and Watermarking of Multimedia Contents IV
, vol.4675
, pp. 387-398
-
-
Eggers, J.1
Bäuml, R.2
Girod, B.3
-
12
-
-
33646182858
-
Security of DM quantization watermarking schemes: A practical study for digital images
-
M. Barni, I. Cox, T. Kalker, and H. J. Kim, Eds., Siena, Italy, Sep.
-
P. Bas and J. Hurri, "Security of DM quantization watermarking schemes: A practical study for digital images," in Proc. 4th Int. Workshop on Digital Watermarking, M. Barni, I. Cox, T. Kalker, and H. J. Kim, Eds., Siena, Italy, Sep. 2005, vol. 3710, pp. 186-200.
-
(2005)
Proc. 4th Int. Workshop on Digital Watermarking
, vol.3710
, pp. 186-200
-
-
Bas, P.1
Hurri, J.2
-
13
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
May
-
B. Chen and G. Wornell, "Quantization Index Modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.2
-
14
-
-
0032656890
-
Copy protection for DVD video
-
Jul., Special Issue on Identification and Protection of Multimedia Information
-
J. Bloom, I. Cox, T. Kalker, J.-P. Linnartz, M. Miller, and C. Traw, "Copy protection for DVD video," Proc. IEEE. vol. 87, no. 7, pp. 1267-1276, Jul. 1999, Special Issue on Identification and Protection of Multimedia Information.
-
(1999)
Proc. IEEE.
, vol.87
, Issue.7
, pp. 1267-1276
-
-
Bloom, J.1
Cox, I.2
Kalker, T.3
Linnartz, J.-P.4
Miller, M.5
Traw, C.6
-
15
-
-
85032752384
-
Digital watermarking for DVD video copy protection
-
Sep.
-
M. Maes, T. Kalker, J.-P. Linnartz, J. Talstra, G. Depovere, and J. Haitsma, "Digital watermarking for DVD video copy protection," Signal Process. Mag., vol. 17, no. 5, pp. 47-57, Sep. 2000.
-
(2000)
Signal Process. Mag.
, vol.17
, Issue.5
, pp. 47-57
-
-
Maes, M.1
Kalker, T.2
Linnartz, J.-P.3
Talstra, J.4
Depovere, G.5
Haitsma, J.6
-
16
-
-
0037737759
-
Scalar Costa Scheme for information embedding
-
Apr.
-
J. J. Eggers, R. Bäuml, R. Tzschoppe, and B. Girod, "Scalar Costa Scheme for information embedding," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1003-1019, Apr. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.4
, pp. 1003-1019
-
-
Eggers, J.J.1
Bäuml, R.2
Tzschoppe, R.3
Girod, B.4
-
17
-
-
0034848594
-
Blind watermarking applied to image authentication
-
Salt Lake City, UT, May
-
J. Eggers and B. Girod, "Blind watermarking applied to image authentication," in Proc. Int. Conf. Audio, Speech and Signal Processing, Salt Lake City, UT, May 2001.
-
(2001)
Proc. Int. Conf. Audio, Speech and Signal Processing
-
-
Eggers, J.1
Girod, B.2
-
18
-
-
0020752342
-
Writing on dirty paper
-
May
-
M. H. M. Costa, "Writing on dirty paper," IEEE Trans. Inf. Theory, vol. IT-29, no. 3, pp. 439-441, May 1983.
-
(1983)
IEEE Trans. Inf. Theory
, vol.IT-29
, Issue.3
, pp. 439-441
-
-
Costa, M.H.M.1
-
19
-
-
0003643241
-
-
ser. Comprehensive Studies Math., 3rd ed. New York: Springer-Verlag
-
J. H. Conway and N. J. A. Sloane, Sphere Packings, Lattices and Groups, ser. Comprehensive Studies Math., 3rd ed. New York: Springer-Verlag, 1999, vol. 290.
-
(1999)
Sphere Packings, Lattices and Groups
, vol.290
-
-
Conway, J.H.1
Sloane, N.J.A.2
-
20
-
-
21844442871
-
Spread-spectrum vs. quantization-based data hiding: Misconceptions and implications
-
E. J. Delp III and P. W. Wong, Eds. San Jose, CA: SPIE, Jan.
-
L. Pérez-Freire and F. Pérez-González, "Spread-spectrum vs. quantization-based data hiding: Misconceptions and implications," in Proc. Security, Steganography, and Watermarking Multimedia Contents VII, E. J. Delp III and P. W. Wong, Eds. San Jose, CA: SPIE, Jan. 2005, vol. 5681, pp. 341-352.
-
(2005)
Proc. Security, Steganography, and Watermarking Multimedia Contents VII
, vol.5681
, pp. 341-352
-
-
Pérez-Freire, L.1
Pérez-González, F.2
-
21
-
-
78650273796
-
Dither signals and their effect on quantization noise
-
Dec.
-
L. Schuchman, "Dither signals and their effect on quantization noise," IEEE Trans. Commun. Technol., vol. COM-12, no. 4, pp. 162-165, Dec. 1964.
-
(1964)
IEEE Trans. Commun. Technol.
, vol.COM-12
, Issue.4
, pp. 162-165
-
-
Schuchman, L.1
-
22
-
-
5144221013
-
Achieving 1/2 log(1 + SNR) over the additive white gaussian noise channel with lattice encoding and decoding
-
Oct.
-
U. Erez and R. Zamir, "Achieving 1/2 log(1 + SNR) over the additive white gaussian noise channel with lattice encoding and decoding," IEEE Trans. Inf. Theory, vol. 50, no. 10, pp. 2293-2314, Oct. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.10
, pp. 2293-2314
-
-
Erez, U.1
Zamir, R.2
-
23
-
-
0344153348
-
On testing convexity and submodularity
-
M. Parnas, D. Ron, and R. Rubinfeld, "On testing convexity and submodularity," SIAM J. Comput., vol. 32, no. 5, pp. 1158-1184, 2003.
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.5
, pp. 1158-1184
-
-
Parnas, M.1
Ron, D.2
Rubinfeld, R.3
-
24
-
-
0020098638
-
Voronoi regions of lattices, second moments of polytopes, and quantization
-
Mar.
-
J. H. Conway and N. J. A. Sloane, "Voronoi regions of lattices, second moments of polytopes, and quantization," IEEE Trans. Inf. Theory, vol. IT-28, no. 2, pp. 211-226, Mar. 1982.
-
(1982)
IEEE Trans. Inf. Theory
, vol.IT-28
, Issue.2
, pp. 211-226
-
-
Conway, J.H.1
Sloane, N.J.A.2
-
25
-
-
0020102220
-
Fast quantizing and decoding algorithms for lattice quantizers and codes
-
Mar.
-
J. Conway and N. Sloane, "Fast quantizing and decoding algorithms for lattice quantizers and codes," IEEE Trans. Inf. Theory, vol. IT-28, no. 2, pp. 227-232, Mar. 1982.
-
(1982)
IEEE Trans. Inf. Theory
, vol.IT-28
, Issue.2
, pp. 227-232
-
-
Conway, J.1
Sloane, N.2
-
26
-
-
0030191118
-
On lattice quantization noise
-
Jul.
-
R. Zamir and M. Feder, "On lattice quantization noise," IEEE Trans. Inf. Theory, vol. 42, no. 4, pp. 1152-1159, Jul. 1996.
-
(1996)
IEEE Trans. Inf. Theory
, vol.42
, Issue.4
, pp. 1152-1159
-
-
Zamir, R.1
Feder, M.2
-
27
-
-
0024750676
-
Set membership identification in digital signal processing
-
Oct.
-
J. R. Deller, "Set membership identification in digital signal processing," IEEE Acoust. Speech Signal Process. Mag., vol. 6, no. 4, pp. 4-20, Oct. 1989.
-
(1989)
IEEE Acoust. Speech Signal Process. Mag.
, vol.6
, Issue.4
, pp. 4-20
-
-
Deller, J.R.1
-
28
-
-
0027541192
-
The foundations of set theoretic estimation
-
Feb.
-
P. L. Combettes, "The foundations of set theoretic estimation," Proc. IEEE, vol. 81, no. 2, pp. 182-208, Feb. 1993.
-
(1993)
Proc. IEEE
, vol.81
, Issue.2
, pp. 182-208
-
-
Combettes, P.L.1
-
29
-
-
4143057226
-
Speech watermarking with objective fidelity and robustness criteria
-
Pacific Grove, CA, Nov.
-
A. R. Gurijala and J. R. Deller, "Speech watermarking with objective fidelity and robustness criteria," in Proc. Conf. Rec. 37th Asilomar Conf. Signals, Systems and Computers, Pacific Grove, CA, Nov. 2003, vol. 2, pp. 1908-1912.
-
(2003)
Proc. Conf. Rec. 37th Asilomar Conf. Signals, Systems and Computers
, vol.2
, pp. 1908-1912
-
-
Gurijala, A.R.1
Deller, J.R.2
-
30
-
-
0004055894
-
-
Cambridge, U.K.: Cambridge Univ. Press, sen SIAM Studies in Applied Mathematics
-
S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, U.K.: Cambridge Univ. Press, 2004, sen SIAM Studies in Applied Mathematics.
-
(2004)
Convex Optimization
-
-
Boyd, S.1
Vandenberghe, L.2
-
32
-
-
0030106462
-
Semidefinite programming
-
Mar.
-
L. Vandenberghe and S. Boyd, "Semidefinite programming," SIAM Rev., vol. 38, no. 1, pp. 49-95, Mar. 1996.
-
(1996)
SIAM Rev.
, vol.38
, Issue.1
, pp. 49-95
-
-
Vandenberghe, L.1
Boyd, S.2
-
33
-
-
0027648997
-
An optimal volume ellipsoid algorithm for parameter set estimation
-
Aug.
-
M. F. Cheung, S. Yurkovich, and K. M. Passino, "An optimal volume ellipsoid algorithm for parameter set estimation," IEEE Trans. Autom. Control, vol. 38, no. 8, pp. 1292-1296, Aug. 1993.
-
(1993)
IEEE Trans. Autom. Control
, vol.38
, Issue.8
, pp. 1292-1296
-
-
Cheung, M.F.1
Yurkovich, S.2
Passino, K.M.3
-
34
-
-
20344396845
-
YALMIP: A toolbox for modeling and optimization in MATLAB
-
Taipei, Taiwan, R.O.C., [On-line]
-
J. Löfberg, "YALMIP: A toolbox for modeling and optimization in MATLAB," in Proc. CACSD Conf., Taipei, Taiwan, R.O.C., 2004 [On-line], Available: http://control.ee.ethz.ch/~joloef/yalmip.php.
-
(2004)
Proc. CACSD Conf.
-
-
Löfberg, J.1
-
35
-
-
0033296299
-
Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones
-
[Online]
-
J. F. Sturm, "Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones," Optimization Methods and Software, vol. 11-12, no. 1-4, pp. 625-653, 1999 [Online]. Available: http://sedumi.mcmaster.ca/
-
(1999)
Optimization Methods and Software
, vol.11-12
, Issue.1-4
, pp. 625-653
-
-
Sturm, J.F.1
-
36
-
-
0024714671
-
Exact recursive polyhedral description of the feasible parameter set for bounded-error models
-
Aug.
-
E. Walter and H. Piet-Lahanier, "Exact recursive polyhedral description of the feasible parameter set for bounded-error models," IEEE Trans. Autom. Control, vol. 34, no. 8, pp. 911-915, Aug. 1989.
-
(1989)
IEEE Trans. Autom. Control
, vol.34
, Issue.8
, pp. 911-915
-
-
Walter, E.1
Piet-Lahanier, H.2
-
37
-
-
80052439767
-
Secret dither estimation in lattice-quantization data hiding: A set-membership approach
-
E. J. Delp, III and P. W. Wong, Eds. San Jose, CA: SPIE, Jan.
-
L. Pérez-Freire, F. Pérez-González, and P. Comesaña, "Secret dither estimation in lattice-quantization data hiding: A set-membership approach," in Security, Steganography, and Watermarking of Multimedia Contents VIII, E. J. Delp, III and P. W. Wong, Eds. San Jose, CA: SPIE, Jan. 2006.
-
(2006)
Security, Steganography, and Watermarking of Multimedia Contents VIII
-
-
Pérez-Freire, L.1
Pérez-González, F.2
Comesaña, P.3
-
38
-
-
4744374963
-
Temporal synchronization in video water-marking
-
Oct.
-
E. Lin and E. Delp, "Temporal synchronization in video water-marking," IEEE Trans. Signal Process., vol. 52, no. 10, pp. 3007-3022, Oct. 2004.
-
(2004)
IEEE Trans. Signal Process.
, vol.52
, Issue.10
, pp. 3007-3022
-
-
Lin, E.1
Delp, E.2
-
39
-
-
33748101742
-
Block QIM watermarking games
-
Sep.
-
P. Moulin and A. K. Goteti, "Block QIM watermarking games," IEEE Trans. Inf. Forensics Security, vol. 1, no. 3, pp. 293-310, Sep. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.3
, pp. 293-310
-
-
Moulin, P.1
Goteti, A.K.2
-
40
-
-
0016037985
-
A simple converse for broadcast channels with additive white Gaussian noise
-
Mar.
-
P. P. Bergmans, "A simple converse for broadcast channels with additive white Gaussian noise," IEEE Trans. Inf. Theory, vol. IT-20, no. 2, pp. 279-281, Mar. 1974.
-
(1974)
IEEE Trans. Inf. Theory
, vol.IT-20
, Issue.2
, pp. 279-281
-
-
Bergmans, P.P.1
|