-
3
-
-
33845420452
-
Watermarking is not cryptography
-
Springer
-
Ingemar J Cox, Gwenaë Doërr, Teddy Furon. Watermarking is not cryptography. LNCS 4283, Springer, 2006, pp.1-15.
-
(2006)
LNCS
, vol.4283
, pp. 1-15
-
-
Cox, I.J.1
Doërr, G.2
Furon, T.3
-
4
-
-
21844468273
-
Achieving computational and unconditional security in authentication watermarking: Analysis, insights, and algorithm
-
San Jose, California
-
Fei C, Kundur D, Kwong R H. Achieving computational and unconditional security in authentication watermarking: Analysis, insights, and algorithm. In Proc. SPIE: Security and Watermarking of Multimedia Contents VII, Vol. 5681, San Jose, California, 2005, pp.697-708.
-
(2005)
Proc. SPIE: Security and Watermarking of Multimedia Contents VII
, vol.5681
, pp. 697-708
-
-
Fei, C.1
Kundur, D.2
Kwong, R.H.3
-
5
-
-
36549070448
-
Watermarking security: A survey
-
Luis Perez-Freire, Pedro Comesana, Juan Ramon Troncoso-Pastoriza, Fernando Perez-Gonzalez. Watermarking security: A survey. Transactions on Data Hiding and Multimedia Security 1, 4300, 2006, pp.41-72.
-
(2006)
Transactions on Data Hiding and Multimedia Security 1
, vol.4300
, pp. 41-72
-
-
Perez-Freire, L.1
Comesana, P.2
Ramon Troncoso-Pastoriza, J.3
Perez-Gonzalez, F.4
-
6
-
-
0032634857
-
Multimedia watermarking techniques
-
7
-
Hartung F, Kutter M. Multimedia watermarking techniques. In Proc. IEEE, USA, 1999, 87(7): 1079-1107.
-
(1999)
Proc. IEEE, USA
, vol.87
, pp. 1079-1107
-
-
Hartung, F.1
Kutter, M.2
-
7
-
-
0027697301
-
The trustworthy digital camera: Restoring credibility to the photographic image
-
4
-
Friedman G L. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Transaction on Consumer Electronics, Rosemont, IL, USA, 1993, 39(4): 905-910.
-
(1993)
IEEE Transaction on Consumer Electronics, Rosemont, IL, USA
, vol.39
, pp. 905-910
-
-
Friedman, G.L.1
-
8
-
-
3042757763
-
A semi-fragile watermark scheme for image authentication
-
Brisbane, Australia
-
Xiang Zhou, Xiaohui Duan, Daoxian Wang. A semi-fragile watermark scheme for image authentication. In Proc. IEEE, 10th International Multimedia Modeling Conference (MMM'04), Brisbane, Australia, 2004, pp.374-377.
-
(2004)
Proc. IEEE, 10th International Multimedia Modeling Conference (MMM'04)
, pp. 374-377
-
-
Zhou, X.1
Duan, X.2
Wang, D.3
-
9
-
-
0344235334
-
Fragile watermark based on the Gaussian mixture model in the wavelet domain for image authentication
-
Barcelona, Spain
-
Hua Fiun, Xiuo-Ping Zhang. Fragile watermark based on the Gaussian mixture model in the wavelet domain for image authentication. IEEE International Conference on Image Processing, Barcelona, Spain, Vol. 1, 2003, pp.505-508.
-
(2003)
IEEE International Conference on Image Processing
, vol.1
, pp. 505-508
-
-
Fiun, H.1
Zhang, X.2
-
10
-
-
31344433959
-
New semi-fragile image authentication watermarking techniques using random bias and non-uniform quantization
-
1
-
Kurato Maeno, Qibin Sun, Shih-Fu Chang, Masayuki Suto. New semi-fragile image authentication watermarking techniques using random bias and non-uniform quantization. IEEE Transactions on Multimedia, 2006, 8(1): 32-45.
-
(2006)
IEEE Transactions on Multimedia
, vol.8
, pp. 32-45
-
-
Kurato, M.1
Qibin, S.2
Shih-Fu, C.3
Masayuki, S.4
-
11
-
-
33845568061
-
A secure semi-fragile watermarking for image authentication based on integer wavelet transform with parameters
-
Newcastle, New South Wales, Australia
-
Xiaoyun Wu, Junquan Hu, Zhixiong Gu, Jiwu Huang. A secure semi-fragile watermarking for image authentication based on integer wavelet transform with parameters. In Proc. the Australasian Workshop on Grid Computing and E-Research, Newcastle, New South Wales, Australia, Vol. 44, 2005, pp.75-80.
-
(2005)
Proc. the Australasian Workshop on Grid Computing and E-Research
, vol.44
, pp. 75-80
-
-
Wu, X.1
Hu, J.2
Gu, Z.3
Huang, J.4
-
13
-
-
0036292412
-
A robust DWT-based blind data hiding algorithm
-
Phoenix-Scottsdale, AZ, USA
-
Liu H M, Liu J F, Huang J W, Huang D R, Shi Y Q. A robust DWT-based blind data hiding algorithm. In Proc. IEEE on Circuits and Systems, Phoenix-Scottsdale, AZ, USA, Vol. 2, 2002, pp.672-675.
-
(2002)
Proc. IEEE on Circuits and Systems
, vol.2
, pp. 672-675
-
-
Liu, H.M.1
Liu, J.F.2
Huang, J.W.3
Huang, D.R.4
Shi, Y.Q.5
-
14
-
-
33847332606
-
A new uncompressed-domain video watermarking approach robust to h.264/AVC compression
-
Pattern Recognition, and Applications, Innsburk, Austria
-
Dima Pröfrock, Mathias Schlauweg, Erika Müller Richard Wagner. A new uncompressed-domain video watermarking approach robust to h.264/AVC compression. In Proc. the 24th IASTED International Conference on Signal Processing, Pattern Recognition, and Applications, Innsburk, Austria, 2006, pp.99-104.
-
(2006)
Proc. the 24th IASTED International Conference on Signal Processing
, pp. 99-104
-
-
Pröfrock, D.1
Schlauweg, M.2
Erika Müller Richard, Wagner.3
-
15
-
-
84864177287
-
-
http://www.math.cuhk.edu.hk/-rchan/paper/impulse/de-finitions.html
-
-
-
-
16
-
-
0035167831
-
Watermark security via wavelet filter parameterization
-
Thessaloniki, Greece
-
Meerwald, Uhl A. Watermark security via wavelet filter parameterization. In Proc. IEEE International Conference on Image Processing, Thessaloniki, Greece, Vol. 3, 2001, pp.1027-1030.
-
(2001)
Proc. IEEE International Conference on Image Processing
, vol.3
, pp. 1027-1030
-
-
Meerwald1
Uhl, A.2
-
17
-
-
85013615185
-
A novel approach to decoding: Exploiting anticipated attack information using genetic programming
-
5
-
Khan A. A novel approach to decoding: Exploiting anticipated attack information using genetic programming. International Journal of Knowledge-Based Intelligent Engineering Systems, 2006, 10(5): 337-347.
-
(2006)
International Journal of Knowledge-Based Intelligent Engineering Systems
, vol.10
, pp. 337-347
-
-
Khan, A.1
-
19
-
-
34249668816
-
Genetic perceptual shaping: Utilizing cover image and conceivable attack information using genetic programming
-
4
-
A Khan, Anwar M Mirza. Genetic perceptual shaping: Utilizing cover image and conceivable attack information using genetic programming. Information Fusion, Elsevier Science, 2007, 8(4): 354-365.
-
(2007)
Information Fusion, Elsevier Science
, vol.8
, pp. 354-365
-
-
Khan, A.1
Mirza Anwar, M.2
|