-
1
-
-
0036488363
-
The first 50 years of electronic watermarking
-
Feb
-
I. Cox and M. Miller, "The first 50 years of electronic watermarking," EURASIP J. Appl. Signal Process., vol. 2002, no. 2, pp. 126-132, Feb. 2002.
-
(2002)
EURASIP J. Appl. Signal Process
, vol.2002
, Issue.2
, pp. 126-132
-
-
Cox, I.1
Miller, M.2
-
2
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
Oct
-
P. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Trans. Image Processing, vol. 10, pp. 1593-1601, Oct. 2001.
-
(2001)
IEEE Trans. Image Processing
, vol.10
, pp. 1593-1601
-
-
Wong, P.1
Memon, N.2
-
5
-
-
33947682873
-
Binary image watermarking through blurring and biased binarization
-
A. C. K. L. C. H. Lu and Y. Q. Shi, "Binary image watermarking through blurring and biased binarization," Int. J. Image Graph., vol. 5, no. 1, pp. 1-21, 2005.
-
(2005)
Int. J. Image Graph
, vol.5
, Issue.1
, pp. 1-21
-
-
Lu, H.1
Kot, A.C.2
Chen, L.3
Shi, Y.Q.4
-
6
-
-
0003830991
-
Multiresolution Digital Watermarking: Algorithms and Implications for Multimedia Signals,
-
Ph.D. dissertation, Univ. Toronto, Toronto, ON, Canada
-
D. Kundur, "Multiresolution Digital Watermarking: Algorithms and Implications for Multimedia Signals," Ph.D. dissertation, Univ. Toronto, Toronto, ON, Canada, 1999.
-
(1999)
-
-
Kundur, D.1
-
7
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
Jun
-
M. Utku-Celik, G. Sharma, E. Saber, and A. Murat-Tekalp, "Hierarchical watermarking for secure image authentication with localization," IEEE Trans. Image Processing, vol. 11, pp. 585-595, Jun. 2002.
-
(2002)
IEEE Trans. Image Processing
, vol.11
, pp. 585-595
-
-
Utku-Celik, M.1
Sharma, G.2
Saber, E.3
Murat-Tekalp, A.4
-
9
-
-
33947638584
-
Watermarking capacity of digital images based on domain-specific masking effects zero-error information hiding capacity for digital image
-
Las Vegas, NV, Apr
-
C.-Y. Lin and S.-F. Chang, "Watermarking capacity of digital images based on domain-specific masking effects zero-error information hiding capacity for digital image," in Proc. IEEE Int. Conf. Information Technology: Coding and Computing, Las Vegas, NV, Apr. 2001.
-
(2001)
Proc. IEEE Int. Conf. Information Technology: Coding and Computing
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
10
-
-
0141638482
-
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression
-
Aug
-
C.-T. Hsu and J.-L. Wu, "A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression," IEEE Trans. Circuits Syst. Video Technol., vol. 13, pp. 776-786, Aug. 2003.
-
(2003)
IEEE Trans. Circuits Syst. Video Technol
, vol.13
, pp. 776-786
-
-
Hsu, C.-T.1
Wu, J.-L.2
-
11
-
-
0035333687
-
Quantization index modulation: A class of probably good methods for digital watermarking and information embedding
-
B. Chen and G. W. Wornell, "Quantization index modulation: A class of probably good methods for digital watermarking and information embedding," IEEE Trans. Inform. Theory, vol. 47, no. 4, pp. 1423-1443, 2001.
-
(2001)
IEEE Trans. Inform. Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
12
-
-
0037737759
-
Scalar costa scheme for information embedding
-
J. Eggers, R. Bäuml, R. Tzschoppe, and B. Girod, "Scalar costa scheme for information embedding," IEEE Trans. Signal Process., vol. 51, pp. 1003-1019, 2003.
-
(2003)
IEEE Trans. Signal Process
, vol.51
, pp. 1003-1019
-
-
Eggers, J.1
Bäuml, R.2
Tzschoppe, R.3
Girod, B.4
-
13
-
-
0038188753
-
Performance analysis of existing and new methods for data hiding with known-host information in additive channels
-
Apr
-
F. Perez-Gonzalez, F. Balado, and J. Martin, "Performance analysis of existing and new methods for data hiding with known-host information in additive channels," IEEE Trans. Signal Processing, vol. 51, pp. 960-980, Apr. 2003.
-
(2003)
IEEE Trans. Signal Processing
, vol.51
, pp. 960-980
-
-
Perez-Gonzalez, F.1
Balado, F.2
Martin, J.3
-
16
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Dec
-
I. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process., vol. 6, pp. 1673-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Process
, vol.6
, pp. 1673-1687
-
-
Cox, I.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
17
-
-
0038527410
-
Improved spread spectrum: A new modulation technique for robust watermarking
-
Apr
-
D. F. H. Malvar, "Improved spread spectrum: A new modulation technique for robust watermarking," IEEE Trans. Signal Processing, vol. 51, pp. 898-905, Apr. 2003.
-
(2003)
IEEE Trans. Signal Processing
, vol.51
, pp. 898-905
-
-
Malvar, D.F.H.1
-
19
-
-
21844444135
-
Additive non-Gaussian noise attacks on the scalar costa scheme (SCS)
-
San Jose, CA, Jan
-
R. Tzschoppe, R. Bauml, R. Fischer, J. Huber, and A. Kaup, "Additive non-Gaussian noise attacks on the scalar costa scheme (SCS)," in Proc. SPIE Int. Conf. Electronic Images'05, San Jose, CA, Jan. 2005, vol. 5681.
-
(2005)
Proc. SPIE Int. Conf. Electronic Images'05
, vol.5681
-
-
Tzschoppe, R.1
Bauml, R.2
Fischer, R.3
Huber, J.4
Kaup, A.5
-
20
-
-
21844446385
-
Worst case additive attack against quantization-based data-hiding methods
-
San Jose, CA, Jan
-
J. Vila-Forcen, S. Voloshynovskiy, O. Koval, F. Perez-Gonzalez, and T. Pun, "Worst case additive attack against quantization-based data-hiding methods," in Proc. SPIE Int. Conf. Electronic Images'05, San Jose, CA, Jan. 2005, vol. 5681.
-
(2005)
Proc. SPIE Int. Conf. Electronic Images'05
, vol.5681
-
-
Vila-Forcen, J.1
Voloshynovskiy, S.2
Koval, O.3
Perez-Gonzalez, F.4
Pun, T.5
-
21
-
-
20444456703
-
A stochastic QIM algorithm for robust, undetectable image watermarking
-
Singapore, Oct
-
P. Moulin and A. Briassouli, "A stochastic QIM algorithm for robust, undetectable image watermarking," in Proc. IEEE Int. Conf. Image. Processing (ICIP'04), Singapore, Oct. 2004, pp. 1173-1176.
-
(2004)
Proc. IEEE Int. Conf. Image. Processing (ICIP'04)
, pp. 1173-1176
-
-
Moulin, P.1
Briassouli, A.2
-
22
-
-
0032070304
-
Multiresolution scene-based video watermarking using perceptual models
-
May
-
M. Swanson, B. Zhu, and A. Tewfik, "Multiresolution scene-based video watermarking using perceptual models," IEEE J. Select. Areas Commun., vol. 16, pp. 540-550, May 1998.
-
(1998)
IEEE J. Select. Areas Commun
, vol.16
, pp. 540-550
-
-
Swanson, M.1
Zhu, B.2
Tewfik, A.3
-
24
-
-
0141638479
-
Joint security and robustness enhancement for quantization based data embedding
-
Aug
-
M. Wu, "Joint security and robustness enhancement for quantization based data embedding," IEEE Trans. Circuits Syst. Video Technol., vol. 13, pp. 831-841, Aug. 2003.
-
(2003)
IEEE Trans. Circuits Syst. Video Technol
, vol.13
, pp. 831-841
-
-
Wu, M.1
-
25
-
-
0031378592
-
An invisible watermarking technique for image verification
-
Santa Barbara, CA
-
M. M. Yeung and F. Mintzer, "An invisible watermarking technique for image verification," in Proc. IEEE Int. Conf. Image Processing (ICIP'97), Santa Barbara, CA, 1997, vol. 2, pp. 680-683.
-
(1997)
Proc. IEEE Int. Conf. Image Processing (ICIP'97)
, vol.2
, pp. 680-683
-
-
Yeung, M.M.1
Mintzer, F.2
-
26
-
-
0038156437
-
Data hiding in image and video: Part-1. Fundamental issues and solutions
-
Jun
-
M. Wu and B. Liu, "Data hiding in image and video: Part-1. Fundamental issues and solutions," IEEE Trans. Image Process., vol. 12, pp. 685-695, Jun. 2003.
-
(2003)
IEEE Trans. Image Process
, vol.12
, pp. 685-695
-
-
Wu, M.1
Liu, B.2
-
27
-
-
0035251780
-
Quantization index modulation methods for digital watermarking and information embedding of multimedia
-
B. Chen and G. W. Wornell, "Quantization index modulation methods for digital watermarking and information embedding of multimedia," J. VLSI Signal Process., vol. 27, pp. 7-33, 2001.
-
(2001)
J. VLSI Signal Process
, vol.27
, pp. 7-33
-
-
Chen, B.1
Wornell, G.W.2
-
29
-
-
33947679393
-
-
R. L. Rivest, The MD5 message digest algorithm, request for comments (RFC)1321, Internet Activities Board, Internet PrivacZ Task Force, 3RIPEMD-1281, Apr. 1992.
-
R. L. Rivest, "The MD5 message digest algorithm, request for comments (RFC)1321," Internet Activities Board, Internet PrivacZ Task Force, vol. 3RIPEMD-1281, Apr. 1992.
-
-
-
-
30
-
-
0004116989
-
-
2nd ed. Cambridge, MA: MIT Press
-
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms, 2nd ed. Cambridge, MA: MIT Press, 2001.
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
32
-
-
0031704710
-
A robust data hiding using the multidimensional lattice
-
Santa Barbara, CA, Apr
-
J. Chae, D. MukherJee, and B. Manjunath, "A robust data hiding using the multidimensional lattice," in Proc. IEEE Int. Conf. ADL (ADL'98), Santa Barbara, CA, Apr. 1998, pp. 319-326.
-
(1998)
Proc. IEEE Int. Conf. ADL (ADL'98)
, pp. 319-326
-
-
Chae, J.1
MukherJee, D.2
Manjunath, B.3
-
33
-
-
9744279131
-
Robust image-adaptive data hiding using erasure and error correction
-
Dec
-
K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, "Robust image-adaptive data hiding using erasure and error correction," IEEE Trans. Image Processing, vol. 13, pp. 1627-1639, Dec. 2004.
-
(2004)
IEEE Trans. Image Processing
, vol.13
, pp. 1627-1639
-
-
Solanki, K.1
Jacobsen, N.2
Madhow, U.3
Manjunath, B.S.4
Chandrasekaran, S.5
-
34
-
-
0141750484
-
A capacity estimation technique for JPEG-to-JPEG image watermarking
-
Aug
-
P. H. W. Wong and O. C. Au, "A capacity estimation technique for JPEG-to-JPEG image watermarking," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 746-752, Aug. 2003.
-
(2003)
IEEE Trans. Circuits Syst. Video Technol
, vol.13
, Issue.8
, pp. 746-752
-
-
Wong, P.H.W.1
Au, O.C.2
-
36
-
-
0020752342
-
Writing on dirty paper
-
M. Costa, "Writing on dirty paper," IEEE Trans. Inform. Theory, vol. IT-29, pp. 439-441, 1983.
-
(1983)
IEEE Trans. Inform. Theory
, vol.IT-29
, pp. 439-441
-
-
Costa, M.1
|