-
1
-
-
0005082011
-
Distortion modeling and invariant extraction for digital image print-and-scan process
-
presented at the
-
C. Y. Lin and S. F. Chang, "Distortion modeling and invariant extraction for digital image print-and-scan process," presented at the Int. Symp. Multimedia Information Processing Dec. 1999.
-
Int. Symp. Multimedia Information Processing Dec. 1999
-
-
Lin, C.Y.1
Chang, S.F.2
-
2
-
-
0032074148
-
Rotation, scale and translation invariant spread spectrum digital image watermarking
-
May
-
J. K. O. Ruanaidh and T. Pun, "Rotation, scale and translation invariant spread spectrum digital image watermarking," in Signal Process., May 1998, vol. 66, no. 3, pp. 303-317.
-
(1998)
Signal Process.
, vol.66
, Issue.3
, pp. 303-317
-
-
Ruanaidh, J.K.O.1
Pun, T.2
-
3
-
-
0035510211
-
Circularly symmetric watermark embedding in 2-D DFT domain
-
Nov.
-
V. Solachidis and I. Pitas, "Circularly symmetric watermark embedding in 2-D DFT domain," IEEE Trans. Image Process., vol. 10, no. 11, pp. 1741-1753, Nov. 2001.
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.11
, pp. 1741-1753
-
-
Solachidis, V.1
Pitas, I.2
-
4
-
-
0036709226
-
Geometrically invariant watermarking using feature points
-
Sep.
-
P. Bas, J.-M. Chassery, and B. Macq, "Geometrically invariant watermarking using feature points," IEEE Trans. Image Process., vol. 11, no. 9, pp. 1014-1028, Sep. 2002.
-
(2002)
IEEE Trans. Image Process.
, vol.11
, Issue.9
, pp. 1014-1028
-
-
Bas, P.1
Chassery, J.-M.2
Macq, B.3
-
5
-
-
0001405296
-
Hidden images in halftone pictures
-
Jul.
-
J. Rosen and B. Javidi, "Hidden images in halftone pictures," Appl. Opt., vol. 40, no. 20, pp. 3346-3353, Jul. 2001.
-
(2001)
Appl. Opt.
, vol.40
, Issue.20
, pp. 3346-3353
-
-
Rosen, J.1
Javidi, B.2
-
6
-
-
0036543654
-
Data hiding watermarking in halftone images
-
Apr.
-
M. S. Fu and O. C. Au, "Data hiding watermarking in halftone images," IEEE Trans. Image Process., vol. 11, no. 4, pp. 477-484, Apr. 2002.
-
(2002)
IEEE Trans. Image Process.
, vol.11
, Issue.4
, pp. 477-484
-
-
Fu, M.S.1
Au, O.C.2
-
7
-
-
8844237609
-
Visual communications with side information via distributed printing channels: Extended multimedia and security perspectives
-
San Jose, CA, Jan.
-
S. V. Voloshynovskiy, O. Koval, F. Deguillaume, and T. Pun, "Visual communications with side information via distributed printing channels: Extended multimedia and security perspectives," in Proc. SPIE: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Jan. 2004, pp. 428-445.
-
(2004)
Proc. SPIE: Security, Steganography, and Watermarking of Multimedia Contents VI
, pp. 428-445
-
-
Voloshynovskiy, S.V.1
Koval, O.2
Deguillaume, F.3
Pun, T.4
-
8
-
-
8844243984
-
Signature-embedding in printed documents for security and forensic applications
-
San Jose, CA, Jan.
-
A. K. Mikkilineni, G. N. Ali, P.-J. Chiang, G. T. C. Chiu, J. P. Allebach, and E. J. Delp, "Signature-embedding in printed documents for security and forensic applications," in Proc. SPIE: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Jan. 2004, pp. 455-66.
-
(2004)
Proc. SPIE: Security, Steganography, and Watermarking of Multimedia Contents VI
, pp. 455-466
-
-
Mikkilineni, A.K.1
Ali, G.N.2
Chiang, P.-J.3
Chiu, G.T.C.4
Allebach, J.P.5
Delp, E.J.6
-
9
-
-
20444458008
-
Estimating and undoing rotation for print-scan resilient data hiding
-
presented at the, Singapore, Oct.
-
K. Solanki, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, "Estimating and undoing rotation for print-scan resilient data hiding," presented at the ICIP, Singapore, Oct. 2004.
-
(2004)
ICIP
-
-
Solanki, K.1
Madhow, U.2
Manjunath, B.S.3
Chandrasekaran, S.4
-
10
-
-
21844445604
-
Modeling the print-scan process for resilient data hiding
-
Mar.
-
K. Solanki, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, "Modeling the print-scan process for resilient data hiding," in Proc. SPIE Security, Steganography, and Watermarking of Multimedia Contents VII, Mar. 2005, vol. 5681, pp. 418-429.
-
(2005)
Proc. SPIE Security, Steganography, and Watermarking of Multimedia Contents VII
, vol.5681
, pp. 418-429
-
-
Solanki, K.1
Madhow, U.2
Manjunath, B.S.3
Chandrasekaran, S.4
-
11
-
-
33748537517
-
Robust image-adaptive data hiding: Modeling, source coding and channel coding
-
Oct.
-
K. Solanki, O. Dabeer, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, "Robust image-adaptive data hiding: Modeling, source coding and channel coding," in Proc. 42nd Annu. Allerton Conf. Communications, Control, and Computing, Oct. 2003.
-
(2003)
Proc. 42nd Annu. Allerton Conf. Communications, Control, and Computing
-
-
Solanki, K.1
Dabeer, O.2
Madhow, U.3
Manjunath, B.S.4
Chandrasekaran, S.5
-
12
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
May
-
B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
13
-
-
0000230675
-
Attacks on copyright marking systems
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Attacks on copyright marking systems," in Proc. Workshop Information Hiding, 1998, pp. 219-239.
-
(1998)
Proc. Workshop Information Hiding
, pp. 219-239
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
14
-
-
0036504569
-
Electrophotographic process embedded in direct binary search
-
Mar.
-
D. Kacker, T. Camis, and J. P. Allebach, "Electrophotographic process embedded in direct binary search," IEEE Trans. Image Process., vol. 11, no. 3, pp. 243-257, Mar. 2002.
-
(2002)
IEEE Trans. Image Process.
, vol.11
, Issue.3
, pp. 243-257
-
-
Kacker, D.1
Camis, T.2
Allebach, J.P.3
-
15
-
-
0041663514
-
A printer model using signal processing techniques
-
Jul.
-
A. Vongkunghae, J. Yi, and R. B. Wells, "A printer model using signal processing techniques," IEEE Trans. Image Process., vol. 12, no. 7, pp. 776-783, Jul. 2003.
-
(2003)
IEEE Trans. Image Process.
, vol.12
, Issue.7
, pp. 776-783
-
-
Vongkunghae, A.1
Yi, J.2
Wells, R.B.3
-
16
-
-
0034224697
-
Targetless scanner color calibration
-
Jul./Aug.
-
G. Sharma, "Targetless scanner color calibration," J. Imaging Sci. Technol., vol. 44, no. 4, pp. 301-307, Jul./Aug. 2000.
-
(2000)
J. Imaging Sci. Technol.
, vol.44
, Issue.4
, pp. 301-307
-
-
Sharma, G.1
-
17
-
-
0032208664
-
Characterization of image degradation caused by scanning
-
E. H. B. Smith, "Characterization of image degradation caused by scanning," Pattern Recognit. Lett., vol. 19, no. 13, pp. 1191-1197, 1998.
-
(1998)
Pattern Recognit. Lett.
, vol.19
, Issue.13
, pp. 1191-1197
-
-
Smith, E.H.B.1
-
19
-
-
0035473829
-
Look-up table (LUT) method for inverse halftoning
-
Oct.
-
M. Mese and P. P. Vaidyanathan, "Look-up table (LUT) method for inverse halftoning," IEEE Trans. Image Process., vol. 10, no. 10, pp. 1566-1578, Oct. 2001.
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.10
, pp. 1566-1578
-
-
Mese, M.1
Vaidyanathan, P.P.2
-
20
-
-
0033337789
-
Inverse halftoning using wavelets
-
Oct.
-
X. Zixiang, M. T. Orchard, and K. Ramchandran, "Inverse halftoning using wavelets," IEEE Trans. Image Process., vol. 8, no. 10, pp. 1479-1483, Oct. 1999.
-
(1999)
IEEE Trans. Image Process.
, vol.8
, Issue.10
, pp. 1479-1483
-
-
Zixiang, X.1
Orchard, M.T.2
Ramchandran, K.3
-
21
-
-
33845647801
-
A stochastic QIM algorithm for robust, undetectable image watermarking
-
presented at the, Singapore, Oct.
-
P. Moulin and A. Briassouli, "A stochastic QIM algorithm for robust, undetectable image watermarking," presented at the IC1P, Singapore, Oct. 2004.
-
(2004)
IC1P
-
-
Moulin, P.1
Briassouli, A.2
-
22
-
-
0033740153
-
Modeling and quality assessment of halftoning by error diffusion
-
May
-
T. D. Kite, B. L. Evans, and A. C. Bovik, "Modeling and quality assessment of halftoning by error diffusion," IEEE Trans. Image Process., vol. 9, no. 5, pp. 909-922, May 2000.
-
(2000)
IEEE Trans. Image Process.
, vol.9
, Issue.5
, pp. 909-922
-
-
Kite, T.D.1
Evans, B.L.2
Bovik, A.C.3
-
23
-
-
9744279131
-
Robust image-adaptive data hiding based on erasure and error correction
-
Dec.
-
K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, "Robust image-adaptive data hiding based on erasure and error correction," IEEE Trans. Image Process., vol. 13, no. 12, pp. 1627-1639, Dec. 2004.
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.12
, pp. 1627-1639
-
-
Solanki, K.1
Jacobsen, N.2
Madhow, U.3
Manjunath, B.S.4
Chandrasekaran, S.5
-
24
-
-
0037003152
-
Image adaptive high volume data hiding based on scalar quantization
-
Anaheim, CA, Oct.
-
N. Jacobsen, K. Solanki, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, "Image adaptive high volume data hiding based on scalar quantization," in Proc. IEEE Military Comm. Conf., Anaheim, CA, Oct. 2002.
-
(2002)
Proc. IEEE Military Comm. Conf.
-
-
Jacobsen, N.1
Solanki, K.2
Madhow, U.3
Manjunath, B.S.4
Chandrasekaran, S.5
-
25
-
-
0001585514
-
Coding theorems for turbolike codes
-
Sep.
-
D. Divsalar, H. Jin, and R. J. McEliece, "Coding theorems for turbolike codes," in Proc. 36th Allerton Conf. Communications, Control, and Computing, Sep. 1998, pp. 201-210.
-
(1998)
Proc. 36th Allerton Conf. Communications, Control, and Computing
, pp. 201-210
-
-
Divsalar, D.1
Jin, H.2
McEliece, R.J.3
-
26
-
-
0035246564
-
Factor graphs and the sum-product algorithm
-
Feb.
-
F. R. Kschischang, B. J. Frey, and H.-A. Loeliger, "Factor graphs and the sum-product algorithm," IEEE Trans. Inf. Theory, vol. 47, no. 2, pp. 498-519, Feb. 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.2
, pp. 498-519
-
-
Kschischang, F.R.1
Frey, B.J.2
Loeliger, H.-A.3
|