-
1
-
-
0003302360
-
Public watermarks and resistance to tampering
-
presented at the, Santa Barbara, CA
-
I. J. Cox and J. P. M. G. Linnartz, "Public watermarks and resistance to tampering," presented at the Int. Conf. Image Processing, Santa Barbara, CA, 1997.
-
(1997)
Int. Conf. Image Processing
-
-
Cox, I.J.1
Linnartz, J.P.M.G.2
-
2
-
-
0007751316
-
Analysis of the sensitivity attack against electronic watermarks in images
-
Portland, OR, Apr
-
J. P. Linnartz and M. van Dijk, "Analysis of the sensitivity attack against electronic watermarks in images," in Proc. Workshop of Information Hiding, Portland, OR, Apr. 1998, pp. 258-272.
-
(1998)
Proc. Workshop of Information Hiding
, pp. 258-272
-
-
Linnartz, J.P.1
van Dijk, M.2
-
3
-
-
0032311781
-
Watermark estimation through detector analysis
-
Chicago, IL, Oct
-
T. Kalker, J. P. Linnartz, and M. van Dijk, "Watermark estimation through detector analysis," in Proc. Int. Conf. Image Processing, Chicago, IL, Oct. 1998, vol. 1, pp. 425-429.
-
(1998)
Proc. Int. Conf. Image Processing
, vol.1
, pp. 425-429
-
-
Kalker, T.1
Linnartz, J.P.2
van Dijk, M.3
-
5
-
-
0036294066
-
Secure watermark detection with nonparametric decision boundaries
-
Orlando, FL, May
-
A. Tewfik and M. Mansour, "Secure watermark detection with nonparametric decision boundaries," in Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing, Orlando, FL, May 2002, pp. 2089-2092.
-
(2002)
Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing
, pp. 2089-2092
-
-
Tewfik, A.1
Mansour, M.2
-
6
-
-
0036448239
-
LMS-based attack on watermark public detectors
-
Rochester, NY, Sep
-
A. Tewfik and M. Mansour, "LMS-based attack on watermark public detectors," in Proc. IEEE Int. Conf. Image Processing, Rochester, NY, Sep. 2002, pp. 649-652.
-
(2002)
Proc. IEEE Int. Conf. Image Processing
, pp. 649-652
-
-
Tewfik, A.1
Mansour, M.2
-
7
-
-
21844452953
-
A new sensitivity analysis attack
-
San Jose, CA, Jan
-
M. El Choubassi and P. Moulin, "A new sensitivity analysis attack," in Proc. SPIE Conf., San Jose, CA, Jan. 2005, pp. 734-745.
-
(2005)
Proc. SPIE Conf
, pp. 734-745
-
-
El Choubassi, M.1
Moulin, P.2
-
8
-
-
33646182640
-
The return of the sensitivity attack
-
Siena, Italy, Sep
-
P. Comesãna, L. Pérez-Freire, and F. Pérez- Gonzaléz, "The return of the sensitivity attack," in Proc. Int. Workshop on Digital Watermarking, Siena, Italy, Sep. 2005, pp. 260-274.
-
(2005)
Proc. Int. Workshop on Digital Watermarking
, pp. 260-274
-
-
Comesãna, P.1
Pérez-Freire, L.2
Pérez- Gonzaléz, F.3
-
9
-
-
34249303444
-
-
Master, Univ. Illinois, Elect. Comput. Eng. Dept, Urbana-Champaign, IL
-
M. El Choubassi, "Novel Algorithms for Sensitivity Analysis Attacks," Master, Univ. Illinois, Elect. Comput. Eng. Dept., Urbana-Champaign, IL, 2005.
-
(2005)
Novel Algorithms for Sensitivity Analysis Attacks
-
-
El Choubassi, M.1
-
11
-
-
0027681636
-
Distribution shape of two-dimensional DCT coefficients of natural images
-
Oct
-
F. Müller, "Distribution shape of two-dimensional DCT coefficients of natural images," Electron. Lett., vol. 29, no. 22, pp. 1935-1936, Oct. 1993.
-
(1993)
Electron. Lett
, vol.29
, Issue.22
, pp. 1935-1936
-
-
Müller, F.1
-
12
-
-
0038527410
-
Improved spread spectrum: A new modulation technique for robust watermarking
-
Apr
-
H. Malvar and D. Floroncio, "Improved spread spectrum: A new modulation technique for robust watermarking," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 898-905, Apr. 2003.
-
(2003)
IEEE Trans. Signal Process
, vol.51
, Issue.4
, pp. 898-905
-
-
Malvar, H.1
Floroncio, D.2
-
13
-
-
0030384775
-
Techniques for data hiding
-
W. Bender, D. Gruhl, N. Marimoto, and A. Lu, "Techniques for data hiding," IBM Syst. J., vol. 35, pp. 313-336, 1996.
-
(1996)
IBM Syst. J
, vol.35
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Marimoto, N.3
Lu, A.4
-
14
-
-
0035417219
-
Attacks on digital watermarks: Classification, estimation-based attacks, and benchmarks
-
Aug
-
S. Voloshynovskiy, S. Pereira, and T. Pun, "Attacks on digital watermarks: Classification, estimation-based attacks, and benchmarks," IEEE Commun. Mag., vol. 39, no. 8, pp. 2-10, Aug. 2001.
-
(2001)
IEEE Commun. Mag
, vol.39
, Issue.8
, pp. 2-10
-
-
Voloshynovskiy, S.1
Pereira, S.2
Pun, T.3
-
15
-
-
0033882559
-
DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure
-
Jan
-
J. R. Hernández, M. Amado, and F. Pérez-González, "DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure," IEEE Trans. Signal Process., vol. 9, no. 1, pp. 55-68, Jan. 2000.
-
(2000)
IEEE Trans. Signal Process
, vol.9
, Issue.1
, pp. 55-68
-
-
Hernández, J.R.1
Amado, M.2
Pérez-González, F.3
-
17
-
-
28944435491
-
Data-hiding codes, (tutorial paper)
-
Dec
-
P. Moulin and R. Koetter, ""Data-hiding codes," (tutorial paper)," Proc. IEEE, vol. 93, no. 12, pp. 2083-2127, Dec. 2005.
-
(2005)
Proc. IEEE
, vol.93
, Issue.12
, pp. 2083-2127
-
-
Moulin, P.1
Koetter, R.2
|