-
3
-
-
85032753064
-
What is the future for watermarking? (part i)
-
September
-
M. Barni (2003) What is the future for watermarking? (part i). IEEE Signal Processing Magazine 20(5), 55-59. September
-
(2003)
IEEE Signal Processing Magazine
, vol.20
, Issue.5
, pp. 55-59
-
-
Barni, M.1
-
4
-
-
85032750868
-
What is the future for watermarking? (part ii)
-
November
-
M. Barni (2003) What is the future for watermarking? (part ii). IEEE Signal Processing Magazine 20(6), 53-59. November
-
(2003)
IEEE Signal Processing Magazine
, vol.20
, Issue.6
, pp. 53-59
-
-
Barni, M.1
-
7
-
-
85115721225
-
Benchmarking of watermarking algorithms
-
J.-S. Pan, H.-C. Huang, L. Jain (Eds), World Scientific Publishing
-
N. Nikolaidis and I. Pitas (2004) Benchmarking of watermarking algorithms. J.-S. Pan, H.-C. Huang, L. Jain (Eds) Intelligent Watermarking Techniques World Scientific Publishing 315-347.
-
(2004)
Intelligent Watermarking Techniques
, pp. 315-347
-
-
Nikolaidis, N.1
Pitas, I.2
-
8
-
-
0032633080
-
The use of watermarks in the protection of digital multimedia products
-
July
-
G. Voyatzis and I. Pitas (1999) The use of watermarks in the protection of digital multimedia products. Proceedings of the IEEE 87(7), 1197-1207. July
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1197-1207
-
-
Voyatzis, G.1
Pitas, I.2
-
14
-
-
0035160549
-
A survey on watermarking application scenarios and related attacks
-
Thessaloniki, Greece, 7-10 October
-
A. Nikolaidis, S. Tsekeridou, A. Tefas and V. Solachidis (2001) A survey on watermarking application scenarios and related attacks. 2001 IEEE International Conference on Image Processing (ICIP 2001) Thessaloniki, Greece, 7-10 October
-
(2001)
2001 IEEE International Conference on Image Processing (ICIP 2001)
-
-
Nikolaidis, A.1
Tsekeridou, S.2
Tefas, A.3
Solachidis, V.4
-
16
-
-
0034444578
-
Robust image hashing
-
Vancouver, Canada, October
-
R. Venkatesan, S.M. Koon, M.H. Jakubowski and P. Moulin (2000) Robust image hashing. IEEE International Conference on Image Processing Vancouver, Canada, October
-
(2000)
IEEE International Conference on Image Processing
-
-
Venkatesan, R.1
Koon, S.M.2
Jakubowski, M.H.3
Moulin, P.4
-
18
-
-
0032656890
-
Copy protection for dvd video
-
July
-
J.A. Bloom, I. Cox I.l, T. Kalker, M.I. Miller and C.B.S. Traw (1999) Copy protection for dvd video. Proceedings of the IEEE 87(7), 1267-1276. July
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1267-1276
-
-
Bloom, J.A.1
Cox, I.2
Kalker, T.3
Miller, M.I.4
Traw, C.B.S.5
-
19
-
-
0002500694
-
Image authentication techniques for surveillance applications
-
October
-
F. Bartolini, A. Tefas, M. Barni and I. Pitas (2001) Image authentication techniques for surveillance applications. Proceedings of the IEEE 89(10), 1403-1418. October
-
(2001)
Proceedings of the IEEE
, vol.89
, Issue.10
, pp. 1403-1418
-
-
Bartolini, F.1
Tefas, A.2
Barni, M.3
Pitas, I.4
-
21
-
-
0034769637
-
A unified approach of asymmetric watermarking schemes
-
January, San Jose, CA
-
T. Furon, I. Venturini and P. Duhamel (2001) A unified approach of asymmetric watermarking schemes. January SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents 4314 269-279. San Jose, CA
-
(2001)
SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents
, vol.4314
, pp. 269-279
-
-
Furon, T.1
Venturini, I.2
Duhamel, P.3
-
23
-
-
0032625842
-
Watermarking as communications with side information
-
July
-
I.J. Cox, M.I. Miller and A.L. McKellips (1999) Watermarking as communications with side information. Proceedings of the IEEE 87(7), 1127-1141. July
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1127-1141
-
-
Cox, I.J.1
Miller, M.I.2
McKellips, A.L.3
-
24
-
-
0035333687
-
Quantization index modulation: a class of provably good methods for digital watermarking and information embedding
-
May
-
B. Chen and G. Wornell (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 47(4), 1423-1443. May
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.2
-
25
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
December
-
I.J. Cox, J. Kilian, F.T. Leighton and T. Shamoon (1997) Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6(12), 1673-1687. December
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
26
-
-
0032074148
-
Rotation, scale and translation invariant spread spectrum digital image watermarking
-
J.K. Ruanaidh and T. Pun (1998) Rotation, scale and translation invariant spread spectrum digital image watermarking. Elsevier Signal Processing, Sp. Issue on Copyright Protection and Access control 66(3), 303-317.
-
(1998)
Elsevier Signal Processing, Sp. Issue on Copyright Protection and Access control
, vol.66
, Issue.3
, pp. 303-317
-
-
Ruanaidh, J.K.1
Pun, T.2
-
27
-
-
4544313881
-
Design and statistical analysis of a hash-aided image watermarking system
-
October
-
J. Cannons and P. Moulin (2004) Design and statistical analysis of a hash-aided image watermarking system. IEEE Transactions on Image Processing 13(10), 1393-1408. October
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, Issue.10
, pp. 1393-1408
-
-
Cannons, J.1
Moulin, P.2
-
29
-
-
0035333285
-
Improved wavelet-based watermarking through pixel-wise masking
-
May
-
M. Barni, F. Bartolini and A. Piva (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Transactions on Image Processing 10(5), 783-791. May
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.5
, pp. 783-791
-
-
Barni, M.1
Bartolini, F.2
Piva, A.3
-
30
-
-
0035510211
-
Circularly symmetric watermark embedding in 2d dft domain
-
November
-
V. Solachidis and I. Pitas (2001) Circularly symmetric watermark embedding in 2d dft domain. IEEE Transactions on Image Processing 10(11), 1741-1753. November
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.11
, pp. 1741-1753
-
-
Solachidis, V.1
Pitas, I.2
-
31
-
-
0033882559
-
Dct-domain watermarking techniques for still images: Detector performance analysis and a new structure
-
Januray
-
J.R. Hernandez Juan R., M. Amado Martin and F. PerezGonzalez Fernando (2000) Dct-domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Transactions on Image Processing 9(1), 55-68Januray. Januray
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, Issue.1
, pp. 55-68Januray
-
-
Hernandez, J.R.1
Amado, M.2
PerezGonzalez, F.3
-
32
-
-
0035335237
-
A new decoder for the optimum recovery of nonadditive watermarks
-
May
-
M. Barni, F. Bartolini, A. DeRosa and A. Piva (2001) A new decoder for the optimum recovery of nonadditive watermarks. IEEE Transactions on Image Processing 10(5), 755-766. May
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.5
, pp. 755-766
-
-
Barni, M.1
Bartolini, F.2
DeRosa, A.3
Piva, A.4
-
33
-
-
0038188731
-
Optimum decoding and detection of multiplicative watermarks
-
April
-
M. Barni, F. Bartolini, A. DeRosa and A. Piva (2003) Optimum decoding and detection of multiplicative watermarks. IEEE Transactions on Signal Processing 51(4), 1118-1123. April
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, Issue.4
, pp. 1118-1123
-
-
Barni, M.1
Bartolini, F.2
DeRosa, A.3
Piva, A.4
-
34
-
-
0037851033
-
Robust optimum detection of transform domain multiplicative watermarks
-
April
-
Q. Cheng Qiang and T.S. Huang (2003) Robust optimum detection of transform domain multiplicative watermarks. IEEE Transactions on Signal Processing 51(4), 906-924. April
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, Issue.4
, pp. 906-924
-
-
Cheng, Q.1
Huang, T.S.2
-
35
-
-
14544298472
-
Optimal detector for multiplicative watermarks embedded in the dft domain of non-white signals
-
accepted for publication
-
V. Solachidis and I. Pitas (2004) Optimal detector for multiplicative watermarks embedded in the dft domain of non-white signals. Journal of Applied Signal Processing accepted for publication
-
(2004)
Journal of Applied Signal Processing
-
-
Solachidis, V.1
Pitas, I.2
-
37
-
-
0742321328
-
Spatial domain digital watermarking of multimedia objects for buyer authentication
-
February
-
D.P. Mukherjee, S. Maitra and S.T. Acton (2004) Spatial domain digital watermarking of multimedia objects for buyer authentication. IEEE Transactions on Multimedia 6(1), 1-15. February
-
(2004)
IEEE Transactions on Multimedia
, vol.6
, Issue.1
, pp. 1-15
-
-
Mukherjee, D.P.1
Maitra, S.2
Acton, S.T.3
-
38
-
-
0032072250
-
A DCTdomain system for robust image watermarking
-
M. Barni, F. Bartolini, V. Cappelini and A. Piva (1998) A DCTdomain system for robust image watermarking. Elsevier Signal Processing 66(3), 357-372.
-
(1998)
Elsevier Signal Processing
, vol.66
, Issue.3
, pp. 357-372
-
-
Barni, M.1
Bartolini, F.2
Cappelini, V.3
Piva, A.4
-
39
-
-
0038612961
-
Dct-based image watermarking using subsampling
-
March
-
W.C. Chu (2003) Dct-based image watermarking using subsampling. IEEE Transactions on Multimedia 5(1), 34-38. March
-
(2003)
IEEE Transactions on Multimedia
, vol.5
, Issue.1
, pp. 34-38
-
-
Chu, W.C.1
-
40
-
-
0035335388
-
Rotation, scale, and translation resilient watermarking for images
-
May
-
C.-Y. Lin, M. Wu, J. Bloom, I. Cox, M. Miller and Y. Lui (2001) Rotation, scale, and translation resilient watermarking for images. IEEE Transactions on Image Processing 10(5), 767-782. May
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.5
, pp. 767-782
-
-
Lin, C.-Y.1
Wu, M.2
Bloom, J.3
Cox, I.4
Miller, M.5
Lui, Y.6
-
41
-
-
0036474718
-
A wavelet-based watermarking algorithm for ownership verification of digital images
-
February
-
Y. Wang, J. Doherty and R.V. Dyck R. Van (2002) A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Transactions on Image Processing 11(2), 77-88. February
-
(2002)
IEEE Transactions on Image Processing
, vol.11
, Issue.2
, pp. 77-88
-
-
Wang, Y.1
Doherty, J.2
Dyck, R.V.3
-
42
-
-
44649109456
-
Methodology for the subjective assessment of the quality of television pictures
-
June
-
ITU (2002) Methodology for the subjective assessment of the quality of television pictures. ITU-R Recommendation BT.500-11 June
-
(2002)
ITU-R Recommendation BT.500-11
-
-
-
44
-
-
0035369792
-
Attack modelling: Towards a second generation benchmark
-
June
-
S. Voloshynovskiy, S. Pereira, V. Iquise and T. Pun (2001) Attack modelling: Towards a second generation benchmark. Signal Processing 81(6), 1177-1214. June
-
(2001)
Signal Processing
, vol.81
, Issue.6
, pp. 1177-1214
-
-
Voloshynovskiy, S.1
Pereira, S.2
Iquise, V.3
Pun, T.4
-
46
-
-
85032751954
-
Watermarking schemes evaluation
-
September
-
F.A.P. Petitcolas (2000) Watermarking schemes evaluation. IEEE Signal Processing Magazine 17(5), 58-64. September
-
(2000)
IEEE Signal Processing Magazine
, vol.17
, Issue.5
, pp. 58-64
-
-
Petitcolas, F.A.P.1
-
48
-
-
0032074580
-
Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications
-
May
-
S. Craver, N. Memon, B.-L. Yeo and M. Yeung (1998) Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications. IEEE Journal of Selected Areas in Communications 16(4), May
-
(1998)
IEEE Journal of Selected Areas in Communications
, vol.16
, Issue.4
-
-
Craver, S.1
Memon, N.2
Yeo, B.-L.3
Yeung, M.4
-
49
-
-
0034780126
-
A public automated web-based evaluation service for watermarking schemes: Stirmark benchmark
-
San Jose, CA, January
-
F. Petitcolas, M. Steinebach, F. Raynal, J. Dittmann, C. Fontaine and N. Fates (2001) A public automated web-based evaluation service for watermarking schemes: Stirmark benchmark. SPIE Electronic Imaging 2001, Security and Watermarking of Multimedia Contents San Jose, CA 4314. January
-
(2001)
SPIE Electronic Imaging 2001, Security and Watermarking of Multimedia Contents
, pp. 4314
-
-
Petitcolas, F.1
Steinebach, M.2
Raynal, F.3
Dittmann, J.4
Fontaine, C.5
Fates, N.6
-
50
-
-
0003197599
-
Second generation benchmarking and application oriented evaluation
-
Pittsburgh, PA, April
-
S. Pereira, S. Voloshynovskiy, M. Madueno, S. Marchand-Maillet and T. Pun (2001) Second generation benchmarking and application oriented evaluation. Information Hiding Workshop III Pittsburgh, PA, April
-
(2001)
Information Hiding Workshop III
-
-
Pereira, S.1
Voloshynovskiy, S.2
Madueno, M.3
Marchand-Maillet, S.4
Pun, T.5
-
51
-
-
0035159385
-
A benchmarking protocol for watermarking methods
-
Thessaloniki, Greece, 7-10 October
-
V. Solachidis, A. Tefas, N. Nikolaidis, S. Tsekeridou, A. Nikolaidis and I. Pitas (2001) A benchmarking protocol for watermarking methods. Proc. of ICIP '01 Thessaloniki, Greece 1023-1026. 7-10 October
-
(2001)
Proc. of ICIP '01
, pp. 1023-1026
-
-
Solachidis, V.1
Tefas, A.2
Nikolaidis, N.3
Tsekeridou, S.4
Nikolaidis, A.5
Pitas, I.6
-
54
-
-
0029765001
-
Copyright protection of images using robust digital signatures
-
Atlanta, GA
-
N. Nikolaidis and I. Pitas (1996) Copyright protection of images using robust digital signatures. Proc. of ICASSP'96 4 2168-2171. Atlanta, GA
-
(1996)
Proc. of ICASSP'96
, vol.4
, pp. 2168-2171
-
-
Nikolaidis, N.1
Pitas, I.2
-
55
-
-
0038818491
-
Performance analysis of correlation-based watermarking schemes employing markov chaotic sequences
-
July
-
A. Tefas, A. Nikolaidis, N. Nikolaidis, V. Solachidis, S. Tsekeridou and I. Pitas (2003) Performance analysis of correlation-based watermarking schemes employing markov chaotic sequences. IEEE Transactions on Signal Processing 51(7), 1979-1994. July
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, Issue.7
, pp. 1979-1994
-
-
Tefas, A.1
Nikolaidis, A.2
Nikolaidis, N.3
Solachidis, V.4
Tsekeridou, S.5
Pitas, I.6
-
56
-
-
0032296690
-
Chaotic watermarks for embedding in the spatial digital image domain
-
4–7 October, Chicago, USA
-
G. Voyatzis and I. Pitas (1998) Chaotic watermarks for embedding in the spatial digital image domain. 4–7 October Proc. of ICIP'98 II 432-436. Chicago, USA
-
(1998)
Proc. of ICIP'98
, vol.II
, pp. 432-436
-
-
Voyatzis, G.1
Pitas, I.2
-
57
-
-
0033699308
-
Comparison of different chaotic maps with application to image watermarking
-
28-31 May, Geneva, Switzerland
-
A. Nikolaidis and I. Pitas (2000) Comparison of different chaotic maps with application to image watermarking. 28-31 May Proc. of ISCAS'00 V 509-512. Geneva, Switzerland
-
(2000)
Proc. of ISCAS'00
, vol.V
, pp. 509-512
-
-
Nikolaidis, A.1
Pitas, I.2
-
58
-
-
0034442891
-
Copyright protection of still images using self-similar chaotic watermarks
-
to appear, Vancouver, Canada, 10-13 September
-
S. Tsekeridou, N. Nikolaidis, N. Sidiropoulos and I. Pitas (2000) Copyright protection of still images using self-similar chaotic watermarks. to appear Proc. of ICIP'00 Vancouver, Canada 411-414. 10-13 September
-
(2000)
Proc. of ICIP'00
, pp. 411-414
-
-
Tsekeridou, S.1
Nikolaidis, N.2
Sidiropoulos, N.3
Pitas, I.4
-
59
-
-
0001781493
-
Applications of chaotic signal processing techniques to multimedia watermarking
-
Catania, Italy, 18-20 May
-
N. Nikolaidis, S. Tsekeridou, A. Nikolaidis, A. Tefas, V. Solachidis and I. Pitas (2000) Applications of chaotic signal processing techniques to multimedia watermarking. Proceedings of the IEEE workshop on Nonlinear Dynamics in Electronic Systems Catania, Italy 1-7. 18-20 May
-
(2000)
Proceedings of the IEEE workshop on Nonlinear Dynamics in Electronic Systems
, pp. 1-7
-
-
Nikolaidis, N.1
Tsekeridou, S.2
Nikolaidis, A.3
Tefas, A.4
Solachidis, V.5
Pitas, I.6
-
60
-
-
0035018983
-
Statistical analysis of markov chaotic sequences for watermarking applications
-
Sydney, Australia, 6-9 May
-
A. Tefas, A. Nikolaidis, N. Nikolaidis, V. Solachidis, S. Tsekeridou and I. Pitas (2001) Statistical analysis of markov chaotic sequences for watermarking applications. 2001 IEEE International Symposium on Circuits and Systems (ISCAS 2001) Sydney, Australia 57-60. 6-9 May
-
(2001)
2001 IEEE International Symposium on Circuits and Systems (ISCAS 2001)
, pp. 57-60
-
-
Tefas, A.1
Nikolaidis, A.2
Nikolaidis, N.3
Solachidis, V.4
Tsekeridou, S.5
Pitas, I.6
-
61
-
-
0033688818
-
Rotation, scale, and translation resilient public watermarking for images
-
January
-
C. Lin, M. Wu, J.A. Bloom, I.J. Cox, M.L. Miller and Y.M. Lui (2000) Rotation, scale, and translation resilient public watermarking for images. Proc. of SPIE:Electronic Imaging 2000 3971 90-98. January
-
(2000)
Proc. of SPIE:Electronic Imaging 2000
, vol.3971
, pp. 90-98
-
-
Lin, C.1
Wu, M.2
Bloom, J.A.3
Cox, I.J.4
Miller, M.L.5
Lui, Y.M.6
-
62
-
-
0035308124
-
Watermarking in the space/spatial domain using two-dimensional radon wigner distribution
-
April
-
I. Djurovic, S. Stankovic and I. Pitas (2001) Watermarking in the space/spatial domain using two-dimensional radon wigner distribution. IEEE Transactions on Image Processing 10(4), 650-658. April
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.4
, pp. 650-658
-
-
Djurovic, I.1
Stankovic, S.2
Pitas, I.3
-
63
-
-
0033726714
-
Robust template matching for affine resistant image watermarks
-
June
-
S. Pereira and T. Pun (2000) Robust template matching for affine resistant image watermarks. IEEE Trans, on Image Processing 9(6), 1123-1129. June
-
(2000)
IEEE Trans, on Image Processing
, vol.9
, Issue.6
, pp. 1123-1129
-
-
Pereira, S.1
Pun, T.2
-
64
-
-
0032678983
-
Template based recovery of fourier-based watermarks using log-polar and log-log maps
-
7-11 June, Florence, Italy
-
S. Pereira, J. Ruanaidh, F. Deguillaume, G. Csurka and T. Pun (1999) Template based recovery of fourier-based watermarks using log-polar and log-log maps. 7-11 June Proc. of ICMCS'99 I 870-874. Florence, Italy
-
(1999)
Proc. of ICMCS'99
, vol.I
, pp. 870-874
-
-
Pereira, S.1
Ruanaidh, J.2
Deguillaume, F.3
Csurka, G.4
Pun, T.5
-
67
-
-
0032636838
-
Circularly symmetric watermark embedding in 2-d dft domain
-
Phoenix, Arizona, 15-19 March
-
V. Solachidis and I. Pitas (1999) Circularly symmetric watermark embedding in 2-d dft domain. Proc. of ICASPF'99 Phoenix, Arizona 3469-3472. 15-19 March
-
(1999)
Proc. of ICASPF'99
, pp. 3469-3472
-
-
Solachidis, V.1
Pitas, I.2
-
68
-
-
0033692720
-
Embedding self-similar watermarks in the wavelet domain
-
Istanbul, Turkey, 5-9 June
-
S. Tsekeridou and I. Pitas (2000) Embedding self-similar watermarks in the wavelet domain. Proc. of ICASSP'00 Istanbul, Turkey 1967-1970. 5-9 June
-
(2000)
Proc. of ICASSP'00
, pp. 1967-1970
-
-
Tsekeridou, S.1
Pitas, I.2
-
69
-
-
0000633632
-
Watermarking resisting to translation, rotation and scaling
-
November
-
M. Kutter (1998) Watermarking resisting to translation, rotation and scaling. Proc. of SPIE November
-
(1998)
Proc. of SPIE
-
-
Kutter, M.1
-
72
-
-
0037353686
-
Information-theoretic analysis of information hiding
-
March
-
P. Moulin and J.A. O'Sullivan (2003) Information-theoretic analysis of information hiding. IEEE Trans, on Information Theory 49(3), 563-593. March
-
(2003)
IEEE Trans, on Information Theory
, vol.49
, Issue.3
, pp. 563-593
-
-
Moulin, P.1
O'Sullivan, J.A.2
-
73
-
-
0035251780
-
Quantization index modulation methods for digital watermarking and information embedding in multimedia
-
B. Chen and G. Wornell (2001) Quantization index modulation methods for digital watermarking and information embedding in multimedia. Journal of VLSI Signal Processing 27 7-33.
-
(2001)
Journal of VLSI Signal Processing
, vol.27
, pp. 7-33
-
-
Chen, B.1
Wornell, G.2
-
76
-
-
0002135911
-
A stochastic approach to content adaptive digital image watermarking
-
Dresden, Germany, September
-
N. Baumgartner, S. Voloshynovskiy, A. Herrigel and T. Pun (1999) A stochastic approach to content adaptive digital image watermarking. Proc. of International Workshop on Information Hiding Dresden, Germany 211-236. September
-
(1999)
Proc. of International Workshop on Information Hiding
, pp. 211-236
-
-
Baumgartner, N.1
Voloshynovskiy, S.2
Herrigel, A.3
Pun, T.4
-
78
-
-
0027697301
-
The trustworthy digital camera: Restoring credibility to the photographic image
-
November
-
G.L. Friedman (1993) The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Transactions on Consumer Electronics 39(4), 905-910. November
-
(1993)
IEEE Transactions on Consumer Electronics
, vol.39
, Issue.4
, pp. 905-910
-
-
Friedman, G.L.1
-
79
-
-
0032308292
-
Compression tolerant image authentication
-
4-7 October, Chicago
-
S. Bhattacharjee and M. Kutter (1998) Compression tolerant image authentication. 4-7 October Proc. of ICIP'98 I 425-429. Chicago
-
(1998)
Proc. of ICIP'98
, vol.I
, pp. 425-429
-
-
Bhattacharjee, S.1
Kutter, M.2
-
80
-
-
0029727745
-
Transparent robust authentication and distortion measurement technique for images
-
Loen, Norway, September
-
B. Zhu, M.D. Swanson and A.H. Tewfik (1996) Transparent robust authentication and distortion measurement technique for images. Proc. of DSP'96 Loen, Norway 45-48. September
-
(1996)
Proc. of DSP'96
, pp. 45-48
-
-
Zhu, B.1
Swanson, M.D.2
Tewfik, A.H.3
-
81
-
-
0001171295
-
A public key watermark for image verification and authentication
-
4-7 October, Chicago
-
P.W. Wong (1998) A public key watermark for image verification and authentication. 4-7 October Proc. of ICIF'98 I 425-429. Chicago
-
(1998)
Proc. of ICIF'98
, vol.I
, pp. 425-429
-
-
Wong, P.W.1
-
82
-
-
84882516087
-
Semi-fragile watermarking for authenticating jpeg visual content
-
C.-Y. Lin and S.-F. Chang (2000) Semi-fragile watermarking for authenticating jpeg visual content. SPIE EI'00 3971.
-
(2000)
SPIE EI'00
, pp. 3971
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
83
-
-
0001204404
-
Watermarking for image authentication
-
4-7 October, Chicago
-
M. Wu and B. Liu (1998) Watermarking for image authentication. 4-7 October Proc. of ICIP'98 I 425-429. Chicago
-
(1998)
Proc. of ICIP'98
, vol.I
, pp. 425-429
-
-
Wu, M.1
Liu, B.2
-
84
-
-
0031378592
-
An invisible watermarking technique for image verification
-
October, Atlanta, GA
-
M.M. Yeung and F. Mintzer (1997) An invisible watermarking technique for image verification. October Proc. of ICIP'97 II 680-683. Atlanta, GA
-
(1997)
Proc. of ICIP'97
, vol.II
, pp. 680-683
-
-
Yeung, M.M.1
Mintzer, F.2
-
85
-
-
0033872149
-
Counterfeiting attacks on oblivious blockwise independent invisible watermarking schemes
-
March
-
M. Holliman and N. Memon (2000) Counterfeiting attacks on oblivious blockwise independent invisible watermarking schemes. IEEE Trans, on Image Processing 9(3), 432-441. March
-
(2000)
IEEE Trans, on Image Processing
, vol.9
, Issue.3
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
-
86
-
-
0032291652
-
Joint wavelet compression and authentication watermarking
-
4-7 October, Chicago
-
L. Xie and G.R. Arce (1998) Joint wavelet compression and authentication watermarking. 4-7 October Proc. of ICIP'98 II 427-431. Chicago
-
(1998)
Proc. of ICIP'98
, vol.II
, pp. 427-431
-
-
Xie, L.1
Arce, G.R.2
-
87
-
-
0032648596
-
Digital watermarking for telltale tamper proofing and authentication
-
July
-
D. Kundur and D. Hatzinakos (1999) Digital watermarking for telltale tamper proofing and authentication. Proceedings of the IEEE 87(7), 1167-1180. July
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1167-1180
-
-
Kundur, D.1
Hatzinakos, D.2
-
88
-
-
0031338360
-
Effective and ineffective digital watermarks
-
October, Atlanta, GA
-
F. Mintzer, G.W. Braudaway and M.M. Yeung (1997) Effective and ineffective digital watermarks. October Proc. of ICIP'97 III 9-12. Atlanta, GA
-
(1997)
Proc. of ICIP'97
, vol.III
, pp. 9-12
-
-
Mintzer, F.1
Braudaway, G.W.2
Yeung, M.M.3
-
89
-
-
0003356542
-
A watermark for image integrity and ownership verification
-
Portland, OR
-
P.W. Wong (1997) A watermark for image integrity and ownership verification. Proc. of IS&T PINC Conf Portland, OR
-
(1997)
Proc. of IS&T PINC Conf
-
-
Wong, P.W.1
-
91
-
-
84937061498
-
Image authentication and tamper proofing using mathematical morphology
-
Tampere, Finland, 5-8 September
-
A. Tefas and I. Pitas (2000) Image authentication and tamper proofing using mathematical morphology. Proc. of European Signal Processing Conf (EUSIPCO'2000) Tampere, Finland, 5-8 September
-
(2000)
Proc. of European Signal Processing Conf (EUSIPCO'2000)
-
-
Tefas, A.1
Pitas, I.2
|