-
1
-
-
0036488364
-
Compressive data hiding: An unconventional approach for improved color image coding
-
February
-
P. Campisi, D. Kundur, D. Hatzinakos and A. Neri, \Compressive data hiding: An unconventional approach for improved color image coding," EURASIP Journal on Applied Signal Processing 2002(2), 152{163 (February 2002).
-
(2002)
EURASIP Journal on Applied Signal Processing
, vol.2002
, Issue.2
, pp. 152-163
-
-
Campisi, P.1
Kundur, D.2
Hatzinakos, D.3
Neri, A.4
-
2
-
-
0033601683
-
A technique for image data hiding and reconstruc-tion without host image
-
, San Jose, CA, USA January
-
J. J. Chae and B. S. Manjunath, \A technique for image data hiding and reconstruc-tion without host image," in Security and Watermarking of Multimedia Content; Proc. SPIE Vol. 3657, San Jose, CA, USA, pp. 386{396 (January 1999).
-
(1999)
Security and Watermarking of Multimedia Content; Proc. SPIE
, vol.3657
, pp. 386-396
-
-
Chae, J.J.1
Manjunath, B.S.2
-
3
-
-
1442357585
-
Robust image authentication using content-based compression
-
E.-C. Chang, M. S. Kankanhalli, X. Guan, Z. Y. Huang and Y. H. Wu, \Robust image authentication using content-based compression," ACM Multimedia Systems Journal 9(2), 121{130 (2003).
-
(2003)
ACM Multimedia Systems Journal
, vol.9
, Issue.2
, pp. 121-130
-
-
Chang, E.-C.1
Kankanhalli, M.S.2
Guan, X.3
Huang, Z.Y.4
Wu, Y.H.5
-
4
-
-
17744413513
-
Robust turbo-based data hiding forimage and video sources
-
, Rochester, NY, USA October
-
J. Chou and K. Ramchandran, \Robust turbo-based data hiding forimage and video sources," in Proc. ICIP02; IEEE Int. Conf. Image Processing, Vol. II, Rochester, NY, USA, pp. 133{136 (October 2002).
-
(2002)
Proc. ICIP02; IEEE Int. Conf. Image Processing
, vol.2
, pp. 133-136
-
-
Chou, J.1
Ramchandran, K.2
-
5
-
-
0033309988
-
Images with self-correcting capabilities
-
, Kobe, Japan October
-
J. Fridrich and M. Goljan, \Images with self-correcting capabilities," in Proc. ICIP99; IEEE Int. Conf. Image Processing, Vol. III, Kobe, Japan, pp. 792{796 (October 1999).
-
(1999)
Proc. ICIP99; IEEE Int. Conf. Image Processing
, vol.3
, pp. 792-796
-
-
Fridrich, J.1
Goljan, M.2
-
6
-
-
0032648596
-
Digital watermarking for telltale tamper prooffing and authentication
-
July
-
D. Kundur and D. Hatzinakos, \Digital watermarking for telltale tamper prooffing and authentication," in Proceeding of IEEE 87(7), 1167{1180 (July 1999).
-
(1999)
Proceeding of IEEE
, vol.87
, Issue.7
, pp. 1167-1180
-
-
Kundur, D.1
Hatzinakos, D.2
-
7
-
-
0033688392
-
Semi-fragile watermarking for authenticating JPEG visual content
-
, San Jose, CA, USA January
-
C.-Y. Lin and S.-F. Chang, \Semi-fragile watermarking for authenticating JPEG visual content," in Security and Watarmerking of Multimedia Content II; Proc. SPIE Vol. 3971, San Jose, CA, USA, pp. 140{151 (January 2000).
-
(2000)
Security and Watarmerking of Multimedia Content II; Proc. SPIE
, vol.3971
, pp. 140-151
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
8
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
February
-
C.-Y. Lin and S.-F. Chang, \A robust image authentication method distinguishing JPEG compression from malicious manipulation," IEEE Transactions on Circuits and Systems for Video Technology 11(2), 153{168 (February 2001).
-
(2001)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
9
-
-
0036447872
-
Dirty-paper trellis codes for watermarking
-
, Rochester, NY, USA October
-
M. L. Miller, G. J. Doerr and I. J. Cox, \Dirty-paper trellis codes for watermarking," in Proc. ICIP02; IEEE Int. Conf. Image Processing, Vol. II, Rochester, NY, USA, pp. 129{132 (October 2002).
-
(2002)
Proc. ICIP02; IEEE Int. Conf. Image Processing
, vol.2
, pp. 129-132
-
-
Miller, M.L.1
Doerr, G.J.2
Cox, I.J.3
-
11
-
-
0036627368
-
A survey of watermarking algorithms for image authen-tication
-
June
-
C. Rey and J. L. Dugelay, \A survey of watermarking algorithms for image authen-tication," EURASIP Journal on Applied Signal Processing 2002(6), 613{621 (June 2002).
-
(2002)
EURASIP Journal on Applied Signal Processing
, vol.2002
, Issue.6
, pp. 613-621
-
-
Rey, C.1
Dugelay, J.L.2
-
12
-
-
84940644968
-
A mathematical theory of communications
-
July
-
C. E. Shannon, \A mathematical theory of communications," Bell Sys. Techn. Journal 27, 379{423 (July 1948).
-
(1948)
Bell Sys. Techn. Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
13
-
-
84856043672
-
A mathematical theory of communications
-
October
-
C. E. Shannon, \A mathematical theory of communications," Bell Sys. Techn. Journal 27, 623{656 (October 1948).
-
(1948)
Bell Sys. Techn. Journal
, vol.27
, pp. 623-656
-
-
Shannon, C.E.1
-
14
-
-
0031365052
-
Data hiding for video in video
-
, S. Barbara, CA October
-
M. Swanson, B. Zhu and A. Tewk, \Data hiding for video in video," in Proc. ICIP97; IEEE Int. Conf. Image Processing, Vol. 1, S. Barbara, CA, pp. 676{679 (October 1997).
-
(1997)
Proc. ICIP97; IEEE Int. Conf. Image Processing
, vol.1
, pp. 676-679
-
-
Swanson, M.1
Zhu, B.2
Tewk, A.3
|