-
1
-
-
38549089300
-
Security issues in digital watermarking
-
Toulouse, France
-
Bartolini, F., Barni, M., Furon, T.: Security issues in digital watermarking. In: Proc. of 11th European Signal Processing Conference (EUSIPCO). Volume 1., Toulouse, France (2002) 282-302,441-461
-
(2002)
Proc. of 11th European Signal Processing Conference (EUSIPCO)
, vol.1
-
-
Bartolini, F.1
Barni, M.2
Furon, T.3
-
2
-
-
33646202789
-
Special session: Watermarking security
-
Edward J. Wong, DeLp III, P.W, eds, San Jose, California, USA, SPIE
-
Barni, M., Pérez-González, F.: Special session: watermarking security. In Edward J. DeLp III, Wong, P.W., eds.: Security, Steganography, and Watermarking of Multimedia Contents VII. Volume 5681., San Jose, California, USA, SPIE (2005) 685-768
-
(2005)
Security, Steganography, and Watermarking of Multimedia Contents VII
, vol.5681
, pp. 685-768
-
-
Barni, M.1
Pérez-González, F.2
-
4
-
-
38549142205
-
Special session on watermarking security
-
Barni, M, Cox, I, Kalker, T, Kim, H.J, eds, Siena, Italy, Springer
-
Pérez-González, F., Furon, T.: Special session on watermarking security. In Barni, M., Cox, I., Kalker, T., Kim, H.J., eds.: Fourth International Workshop on Digital Watermarking. Volume 3710., Siena, Italy, Springer (2005) 201-274
-
(2005)
Fourth International Workshop on Digital Watermarking
, vol.3710
, pp. 201-274
-
-
Pérez-González, F.1
Furon, T.2
-
9
-
-
33646195486
-
A survey of watermarking security
-
Barni, M, ed, Proc. of Int. Work. on Digital Watermarking. of, Siena, Italy, Springer-Verlag
-
Furon, T.: A survey of watermarking security. In Barni, M., ed.: Proc. of Int. Work. on Digital Watermarking. Volume 3710 of Lecture Notes on Computer Science., Siena, Italy, Springer-Verlag (2005) 201-215
-
(2005)
Lecture Notes on Computer Science
, vol.3710
, pp. 201-215
-
-
Furon, T.1
-
10
-
-
0032680807
-
Information hiding-a survey
-
Petitcolas, F., Anderson, R., Kuhn, M.: Information hiding-a survey. Proceedings of the IEEE 87 (1999) 1062-1078
-
(1999)
Proceedings of the IEEE
, vol.87
, pp. 1062-1078
-
-
Petitcolas, F.1
Anderson, R.2
Kuhn, M.3
-
11
-
-
84997769409
-
A digital watermark
-
Austin, Texas, USA
-
van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proc. IEEE Int. Conference on Image Processing, Austin, Texas, USA (1994) 86-89
-
(1994)
Proc. IEEE Int. Conference on Image Processing
, pp. 86-89
-
-
van Schyndel, R.G.1
Tirkel, A.Z.2
Osborne, C.F.3
-
13
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6 (1997) 1673-1687
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
14
-
-
0032073388
-
Performance analysis of a 2d-multipulse amplitude modulation scheme for data hiding and watermarking of still images
-
Hernández, J.R., Pérez-González, F., Rodríguez, J.M., Nieto, G.: Performance analysis of a 2d-multipulse amplitude modulation scheme for data hiding and watermarking of still images. IEEE J. Select. Areas Commun. 16 (1998) 510-524
-
(1998)
IEEE J. Select. Areas Commun
, vol.16
, pp. 510-524
-
-
Hernández, J.R.1
Pérez-González, F.2
Rodríguez, J.M.3
Nieto, G.4
-
15
-
-
0031335088
-
Fast public-key watermarking of compressed video
-
Santa Barbara, California, USA
-
Hartung, F., Girod, B.: Fast public-key watermarking of compressed video. In: Proc. IEEE ICIP'97. Volume I., Santa Barbara, California, USA (1997) 528-531
-
(1997)
Proc. IEEE ICIP'97
, vol.1
, pp. 528-531
-
-
Hartung, F.1
Girod, B.2
-
16
-
-
0001726259
-
Techniques for data hiding
-
San Jose, CA
-
Bender, W., Gruhl, D., Morimoto, N.: Techniques for data hiding. In: Proc. of the SPIE, San Jose, CA (1995) 2420-2440
-
(1995)
Proc. of the SPIE
, pp. 2420-2440
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
-
18
-
-
0041809184
-
Key-dependent random image transforms and their applications in image watermarking
-
Las Vegas, NV, USA
-
Fridrich, J.: Key-dependent random image transforms and their applications in image watermarking. In: Proc. International Conference on Imaging Science, Systems, and Technology, Las Vegas, NV, USA (1999) 237-243
-
(1999)
Proc. International Conference on Imaging Science, Systems, and Technology
, pp. 237-243
-
-
Fridrich, J.1
-
19
-
-
0042322192
-
Protection of wavelet-based watermarking systems using filter parametrization
-
Dietl, W., Meerwald, P., Uhl, A.: Protection of wavelet-based watermarking systems using filter parametrization. Elsevier Signal Processing 83 (2003) 2095-2116
-
(2003)
Elsevier Signal Processing
, vol.83
, pp. 2095-2116
-
-
Dietl, W.1
Meerwald, P.2
Uhl, A.3
-
20
-
-
0035158798
-
-
Seo, Y., Kim, M., Park, H., Jung, H., Chung, H., Huh, Y., Lee, J., Center, V., ETRI, T.: A secure watermarking for JPEG-2000. In: Proc. IEEE Int. Conf. Image Processing. 2., Thessaloniki, Greece (2001) 530-533
-
Seo, Y., Kim, M., Park, H., Jung, H., Chung, H., Huh, Y., Lee, J., Center, V., ETRI, T.: A secure watermarking for JPEG-2000. In: Proc. IEEE Int. Conf. Image Processing. Volume 2., Thessaloniki, Greece (2001) 530-533
-
-
-
-
21
-
-
0036474718
-
A wavelet-based watermarking algorithm for ownership verificationof digital images
-
Wang, Y., Doherty, J., Dyck, R.V.: A wavelet-based watermarking algorithm for ownership verificationof digital images. IEEE Trans. on Image Processing 11 (2002) 77-88
-
(2002)
IEEE Trans. on Image Processing
, vol.11
, pp. 77-88
-
-
Wang, Y.1
Doherty, J.2
Dyck, R.V.3
-
22
-
-
0031378592
-
An invisible watermarking technique for image verification
-
Yeung, M., Mintzer, F.: An invisible watermarking technique for image verification. In: Proc. IEEE Int. Conf. Image Processing. Volume 2. (1997) 680-683
-
(1997)
Proc. IEEE Int. Conf. Image Processing
, vol.2
, pp. 680-683
-
-
Yeung, M.1
Mintzer, F.2
-
23
-
-
0036999125
-
Power-spectrum condition for energy-efficient watermarking. Multimedia
-
Su, J., Girod, B.: Power-spectrum condition for energy-efficient watermarking. Multimedia, IEEE Transactions on 4 (2002) 551-560
-
(2002)
IEEE Transactions on
, vol.4
, pp. 551-560
-
-
Su, J.1
Girod, B.2
-
24
-
-
0032296690
-
Chaotic watermarks for embedding in the spatial digital image domain
-
Chicago, IL, USA
-
Voyatzis, G., Pitas, I.: Chaotic watermarks for embedding in the spatial digital image domain. In: Proc. IEEE Int. Conf. Image Processing. Volume 2., Chicago, IL, USA (1998) 432-436
-
(1998)
Proc. IEEE Int. Conf. Image Processing
, vol.2
, pp. 432-436
-
-
Voyatzis, G.1
Pitas, I.2
-
25
-
-
0030386584
-
Applications of toral automorphisms in image watermarking
-
Laussane, Switzerland
-
Voyatzis, G., Pitas, I.: Applications of toral automorphisms in image watermarking. In: Proc. IEEE Int. Conf. Image Processing. Volume 2., Laussane, Switzerland (1996) 237-240
-
(1996)
Proc. IEEE Int. Conf. Image Processing
, vol.2
, pp. 237-240
-
-
Voyatzis, G.1
Pitas, I.2
-
26
-
-
0038527410
-
Improved spread spectrum: A new modulation technique for robust watermarking
-
Malvar, H.S., Florencio, D.A.F.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Transactions on Signal Processing 51 (2003) 898-905
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, pp. 898-905
-
-
Malvar, H.S.1
Florencio, D.A.F.2
-
27
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Information Theory 47 (2001) 1423-1443
-
(2001)
IEEE Trans. on Information Theory
, vol.47
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
28
-
-
0037737759
-
Scalar Costa Scheme for information embedding
-
Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery
-
Eggers, J.J., Bäuml, R., Tzschoppe, R., Girod, B.: Scalar Costa Scheme for information embedding. IEEE Transactions on Signal Processing 51 (2003) 1003-1019 Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery.
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, pp. 1003-1019
-
-
Eggers, J.J.1
Bäuml, R.2
Tzschoppe, R.3
Girod, B.4
-
29
-
-
33644995185
-
Analysis and design of secure watermark-based authentication systems
-
Fei, C., Kundur, D., Kwong, R.H.: Analysis and design of secure watermark-based authentication systems. IEEE Transactions on Information Forensics and Security 1 (2006) 43-55
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, pp. 43-55
-
-
Fei, C.1
Kundur, D.2
Kwong, R.H.3
-
30
-
-
21844445258
-
Rational Dither Modulation: A high-rate data-hiding method robust to gain attacks
-
Third supplement on secure media
-
Pérez-González, F., Mosquera, C., Barni, M., Abrardo, A.: Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks. IEEE Trans. on Signal Processing 53 (2005) 3960-3975 Third supplement on secure media.
-
(2005)
IEEE Trans. on Signal Processing
, vol.53
, pp. 3960-3975
-
-
Pérez-González, F.1
Mosquera, C.2
Barni, M.3
Abrardo, A.4
-
31
-
-
33749606410
-
Minmax strategies for QIM watermarking subject to attacks with memory
-
Genova, Italy
-
Moulin, P., Goteti, A.K.: Minmax strategies for QIM watermarking subject to attacks with memory. In: IEEE International Conference on Image Processing, ICIP 2005. Volume 1., Genova, Italy (2005) 985-988
-
(2005)
IEEE International Conference on Image Processing, ICIP
, vol.1
, pp. 985-988
-
-
Moulin, P.1
Goteti, A.K.2
-
32
-
-
0036451748
-
JANIS: Just Another N-order side-Informed watermarking Scheme
-
Rochester, NY, USA
-
Furon, T., Macq, B., Hurley, N., Silvestre, G.: JANIS: Just Another N-order side-Informed watermarking Scheme. In: IEEE International Conference on Image Processing, ICIP'02. Volume 3., Rochester, NY, USA (2002) 153-156
-
(2002)
IEEE International Conference on Image Processing, ICIP'02
, vol.3
, pp. 153-156
-
-
Furon, T.1
Macq, B.2
Hurley, N.3
Silvestre, G.4
-
33
-
-
2942568431
-
Applying informed coding and embedding to design a robust high-capacity watermarking
-
Miller, M.L., Doërr, G.J., Cox, I.J.: Applying informed coding and embedding to design a robust high-capacity watermarking. IEEE Transactions on Image Processing 13 (2004) 792-807
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, pp. 792-807
-
-
Miller, M.L.1
Doërr, G.J.2
Cox, I.J.3
-
34
-
-
84957018842
-
Low cost attacks on tamper resistant devices
-
International Workshop on Security Protocols. of, Paris, France, Springer Verlag
-
Anderson, R., Kuhn, M.: Low cost attacks on tamper resistant devices. In: International Workshop on Security Protocols. Volume 1361 of Lecture Notes in Computer Science., Paris, France, Springer Verlag (1997) 125-136
-
(1997)
Lecture Notes in Computer Science
, vol.1361
, pp. 125-136
-
-
Anderson, R.1
Kuhn, M.2
-
35
-
-
84944404911
-
Zero-knowledge watermark detection and proof of ownership
-
Information Hiding, Fourth International Workshop. of, Springer
-
Adelsbach, A., Sadeghi, A.R.: Zero-knowledge watermark detection and proof of ownership. In: Information Hiding, Fourth International Workshop. Volume 2137 of Lecture Notes in Computer Science., Springer (2001) 273-288
-
(2001)
Lecture Notes in Computer Science
, vol.2137
, pp. 273-288
-
-
Adelsbach, A.1
Sadeghi, A.R.2
-
37
-
-
0003434530
-
Resistance of watermarked documents to collusional attacks
-
Technical report, NEC Research Institute, Princeton, NJ
-
Killian, J., Leighton, F.T., Matheson, L.R., Shamoon, T., Tarjan, R.E.: Resistance of watermarked documents to collusional attacks. Technical report, NEC Research Institute, Princeton, NJ (1997)
-
(1997)
-
-
Killian, J.1
Leighton, F.T.2
Matheson, L.R.3
Shamoon, T.4
Tarjan, R.E.5
-
38
-
-
0003302360
-
Public watermarks and resistance to tampering
-
Santa Barbara, California, USA
-
Cox, L.J., Linnartz, J.P.M.G.: Public watermarks and resistance to tampering. In: Proc. IEEE Int. Conf. on Image Processing. Volume 3., Santa Barbara, California, USA (1997) 3-6
-
(1997)
Proc. IEEE Int. Conf. on Image Processing
, vol.3
, pp. 3-6
-
-
Cox, L.J.1
Linnartz, J.P.M.G.2
-
39
-
-
84947902426
-
An information-theoretic approach to steganography and watermarking
-
Pfitzmann, A, ed, 3rd Int. Workshop on Information Hiding, IH'99. of, Dresden, Germany, Springer Verlag
-
Mitthelholzer, T.: An information-theoretic approach to steganography and watermarking. In Pfitzmann, A., ed.: 3rd Int. Workshop on Information Hiding, IH'99. Volume 1768 of Lecture Notes in Computer Science., Dresden, Germany, Springer Verlag (1999) 1-17
-
(1999)
Lecture Notes in Computer Science
, vol.1768
, pp. 1-17
-
-
Mitthelholzer, T.1
-
40
-
-
84957868624
-
An information-theoretic model for steganography
-
Aucsmith, D, ed, 2nd Int. Workshop on Information Hiding, IH'98. of, Portland, OR, USA, Springer Verlag
-
Cachin, C.: An information-theoretic model for steganography. In Aucsmith, D., ed.: 2nd Int. Workshop on Information Hiding, IH'98. Volume 1525 of Lecture Notes in Computer Science., Portland, OR, USA, Springer Verlag (1998) 306-318
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 306-318
-
-
Cachin, C.1
-
41
-
-
84957886335
-
Modeling the security of steganographic systems
-
Aucsmith, D, ed, Information Hiding International Workshop. of, Portland, OR, USA, Springer
-
Zöllner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the security of steganographic systems. In Aucsmith, D., ed.: Information Hiding International Workshop. Volume 1525 of Lecture Notes in Computer Science., Portland, OR, USA, Springer (1998) 344-354
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 344-354
-
-
Zöllner, J.1
Federrath, H.2
Klimant, H.3
Pfitzmann, A.4
Piotraschke, R.5
Westfeld, A.6
Wicke, G.7
Wolf, G.8
-
42
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon, C.E.: Communication theory of secrecy systems. Bell system technical journal 28 (1949) 656-715
-
(1949)
Bell system technical journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
44
-
-
38549142193
-
-
Furon, T., et al.: Security Analysis. European Project IST-1999-10987 CERTI-MARK, Deliverable D.5.5 (2002)
-
Furon, T., et al.: Security Analysis. European Project IST-1999-10987 CERTI-MARK, Deliverable D.5.5 (2002)
-
-
-
-
47
-
-
0041320695
-
A general framework for robust watermarking security
-
Special issue on Security of Data Hiding Technologies, invited paper
-
Barni, M., Bartolini, F., Furon, T.: A general framework for robust watermarking security. Signal Processing 83 (2003) 2069-2084 Special issue on Security of Data Hiding Technologies, invited paper.
-
(2003)
Signal Processing
, vol.83
, pp. 2069-2084
-
-
Barni, M.1
Bartolini, F.2
Furon, T.3
-
48
-
-
0242660404
-
Advantages and drawbacks of multiplicative spread spectrum watermarking
-
Delp III, E.J, Wong, P.W, eds
-
Barni, M., Bartolini, F., Rosa, A.D.: Advantages and drawbacks of multiplicative spread spectrum watermarking. In Delp III, E.J., Wong, P.W., eds.: Security and Watermarking of Multimedia Contents V. Proceedings of SPIE (2003) 290-299
-
(2003)
Security and Watermarking of Multimedia Contents V. Proceedings of SPIE
, pp. 290-299
-
-
Barni, M.1
Bartolini, F.2
Rosa, A.D.3
-
49
-
-
21844463487
-
Watermarking security: Theory and practice
-
Cayre, F., Fontaine, C., Furon, T.: Watermarking security: Theory and practice. IEEE Trans. Signal Processing 53 (2005) 3976-3987
-
(2005)
IEEE Trans. Signal Processing
, vol.53
, pp. 3976-3987
-
-
Cayre, F.1
Fontaine, C.2
Furon, T.3
-
50
-
-
0001735517
-
On the mathematical foundations of theoretical statistics
-
Fisher, R.A.: On the mathematical foundations of theoretical statistics. Philosophical Transactions of the Royal Society 222 (1922) 309-368
-
(1922)
Philosophical Transactions of the Royal Society
, vol.222
, pp. 309-368
-
-
Fisher, R.A.1
-
51
-
-
33746599638
-
An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios
-
Montreux, Switzerland
-
Comesaña, P., Pérez-Freire;, L., Pérez- González, F.: An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios. In: 6th International Workshop on Image Analysis for Multimedia Interactive Services, Montreux, Switzerland (2005)
-
(2005)
6th International Workshop on Image Analysis for Multimedia Interactive Services
-
-
Comesaña, P.1
Pérez-Freire, L.2
Pérez- González, F.3
-
52
-
-
33746628959
-
Fundamentals of data hiding security and their application to spread-spectrum analysis
-
7th Information Hiding Workshop, IH05, Barcelona, Spain, Springer Verlag
-
Comesaña, P., Pérez-Freire, L., Pérez- González, F.: Fundamentals of data hiding security and their application to spread-spectrum analysis. In: 7th Information Hiding Workshop, IH05. Lecture Notes in Computer Science, Barcelona, Spain, Springer Verlag (2005) 146-160
-
(2005)
Lecture Notes in Computer Science
, pp. 146-160
-
-
Comesaña, P.1
Pérez-Freire, L.2
Pérez- González, F.3
-
53
-
-
33746637553
-
Information-theoretic analysis of security in side-informed data hiding
-
7th Information Hiding Workshop, IH05, Barcelona, Spain, Springer Verlag
-
Pérez-Freire, L., Comesaña, P., Pérez- González, F.: Information-theoretic analysis of security in side-informed data hiding. In: 7th Information Hiding Workshop, IH05. Lecture Notes in Computer Science, Barcelona, Spain, Springer Verlag (2005) 131-145
-
(2005)
Lecture Notes in Computer Science
, pp. 131-145
-
-
Pérez-Freire, L.1
Comesaña, P.2
Pérez- González, F.3
-
54
-
-
33845637704
-
Security of lattice-based data hiding against the Known Message Attack
-
Accepted for publication
-
Pérez-Freire, L., Pérez-González, F., Furon, T., Comesaña, P.: Security of lattice-based data hiding against the Known Message Attack. IEEE Transactions on Information Forensics and Security (2006) Accepted for publication.
-
(2006)
IEEE Transactions on Information Forensics and Security
-
-
Pérez-Freire, L.1
Pérez-González, F.2
Furon, T.3
Comesaña, P.4
-
56
-
-
84957877087
-
Shedding more light on image watermarks
-
Aucsmith, D, ed, 2nd Int. Workshop on Information Hiding, IH'98. of, Portland, OR, USA, Springer Verlag
-
Hernández, J.R., Pérez-González, F.: Shedding more light on image watermarks. In Aucsmith, D., ed.: 2nd Int. Workshop on Information Hiding, IH'98. Volume 1525 of Lecture Notes in Computer Science., Portland, OR, USA, Springer Verlag (1998) 191-207
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 191-207
-
-
Hernández, J.R.1
Pérez-González, F.2
-
57
-
-
4744367575
-
-
Doërr, G., Dugelay, J.L.: Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Trans. Sig. Proc., Supplement on Secure Media 52 (2004) 2955-2964
-
Doërr, G., Dugelay, J.L.: Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Trans. Sig. Proc., Supplement on Secure Media 52 (2004) 2955-2964
-
-
-
-
60
-
-
17644366813
-
Mutual information and minimum mean-square error in Gaussian channels
-
Guo, D., Shamai, S., Verdú, S.: Mutual information and minimum mean-square error in Gaussian channels. IEEE Transactions on Information Theory 51 (2005) 1261-1282
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, pp. 1261-1282
-
-
Guo, D.1
Shamai, S.2
Verdú, S.3
-
61
-
-
84872524343
-
Additive non-Gaussian noise channels: Mutual information and conditional mean estimation
-
ISIT, Adelaide, Australia
-
Guo, D., Shamai, S., Verdú, S.: Additive non-Gaussian noise channels: Mutual information and conditional mean estimation. In: IEEE International Symposium on Information Theory (ISIT), Adelaide, Australia (2005) 719-723
-
(2005)
IEEE International Symposium on Information Theory
, pp. 719-723
-
-
Guo, D.1
Shamai, S.2
Verdú, S.3
-
62
-
-
33144485285
-
Gradient of mutual information in linear vector Gaussian channels
-
Palomar, D.P., Verdú, S.: Gradient of mutual information in linear vector Gaussian channels. IEEE Transactions on Information Theory 52 (2006) 141-154
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, pp. 141-154
-
-
Palomar, D.P.1
Verdú, S.2
-
63
-
-
38549142202
-
-
P.Bas, Cayre, F.: Natural Watermarking: a secure spread spectrum technique for WOA. In: 8th Information Hiding Workshop, IH06. Lecture Notes in Computer Science, Old Town Alexandria, Virginia, USA, Springer Verlag (2006)
-
P.Bas, Cayre, F.: Natural Watermarking: a secure spread spectrum technique for WOA. In: 8th Information Hiding Workshop, IH06. Lecture Notes in Computer Science, Old Town Alexandria, Virginia, USA, Springer Verlag (2006)
-
-
-
-
64
-
-
11244290478
-
Independent Component Analysis
-
John Wiley & Sons
-
Hyvärinen, A., Karhunen, J., Oja, E.: Independent Component Analysis. Adaptive and learning systems for signal processing, communications and control. John Wiley & Sons (2001)
-
(2001)
Adaptive and learning systems for signal processing, communications and control
-
-
Hyvärinen, A.1
Karhunen, J.2
Oja, E.3
-
66
-
-
33645670509
-
Secret dither estimation in lattice-quantization data hiding: A set-membership approach
-
Edward J. Wong, Delp III, P.W, eds, San Jose, California, USA, SPIE
-
Pérez-Freire, L., Pérez-González, F., Comesaña, P.: Secret dither estimation in lattice-quantization data hiding: a set-membership approach. In Edward J. Delp III, Wong, P.W., eds.: Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, California, USA, SPIE (2006)
-
(2006)
Security, Steganography, and Watermarking of Multimedia Contents VIII
-
-
Pérez-Freire, L.1
Pérez-González, F.2
Comesaña, P.3
-
67
-
-
38549143496
-
-
Conway, J., Sloane, N.: Sphere Packings, Lattices and Groups. 3rd edn. 290 of Comprehensive Studies in Mathematics. Springer (1999)
-
Conway, J., Sloane, N.: Sphere Packings, Lattices and Groups. 3rd edn. Volume 290 of Comprehensive Studies in Mathematics. Springer (1999)
-
-
-
-
69
-
-
0032024437
-
Copyright labeling of digitized image data
-
Burgett, S., Koch, E., Zhao, J.: Copyright labeling of digitized image data. IEEE Communications Magazine 36 (1998) 94 100
-
(1998)
IEEE Communications Magazine
, vol.36
, pp. 94-100
-
-
Burgett, S.1
Koch, E.2
Zhao, J.3
-
70
-
-
0036999125
-
Power-spectrum condition for energy-efficient watermarking
-
Su, J., Girod, B.: Power-spectrum condition for energy-efficient watermarking. IEEE Transactions on Multimedia 4 (2002) 551-560
-
(2002)
IEEE Transactions on Multimedia
, vol.4
, pp. 551-560
-
-
Su, J.1
Girod, B.2
-
71
-
-
35248849238
-
Cryptanalysis of discrete-sequence spread spectrum watermarks
-
Petitcolas, F.A.P, ed, Noordwijkerhout, The Netherlands, Springer-Verlag
-
th International Workshop on Digital Watermarking, Noordwijkerhout, The Netherlands, Springer-Verlag (2002) 226-246
-
(2002)
th International Workshop on Digital Watermarking
, pp. 226-246
-
-
Mihçak, M.K.1
Venkatesan, R.2
Kesal, M.3
-
72
-
-
0035369792
-
-
Special Issue on Information Theoretic Issues in Digital Watermarking
-
Voloshynovskiy, S., Pereira, S., Iquise, V., Pun, T.: Attack modeling: Towards a second generation benchmark. Signal Processing, Special Issue on Information Theoretic Issues in Digital Watermarking 81 (2001) 1177-1214
-
(2001)
Attack modeling: Towards a second generation benchmark. Signal Processing
, vol.81
, pp. 1177-1214
-
-
Voloshynovskiy, S.1
Pereira, S.2
Iquise, V.3
Pun, T.4
-
73
-
-
0042826822
-
Independent component analysis: Algorithms and applications
-
Hyvärinen, A., Oja, E.: Independent component analysis: Algorithms and applications. Neural Networks 13 (2000) 411-430
-
(2000)
Neural Networks
, vol.13
, pp. 411-430
-
-
Hyvärinen, A.1
Oja, E.2
-
74
-
-
33746618589
-
Watermarking security: Application to a WSS technique for still images
-
Cox, I.J, Kalker, T, Lee, H, eds, Seoul, Korea, Springer
-
Cayre, F., Fontaine, C., Furon, T.: Watermarking security: application to a WSS technique for still images. In Cox, I.J., Kalker, T., Lee, H., eds.: Third International Workshop on Digital Watermarking. Volume 3304., Seoul, Korea, Springer (2004)
-
(2004)
Third International Workshop on Digital Watermarking
, vol.3304
-
-
Cayre, F.1
Fontaine, C.2
Furon, T.3
-
75
-
-
0002629270
-
Maximum likelihood from incomplete data via the em algorithm
-
Dempster, A.P., Laird, N.M., Rubin, D.B.: Maximum likelihood from incomplete data via the em algorithm. Journal of the Royal Statistical Society, Series B (Methodological) 39 (1977) 1-38
-
(1977)
Journal of the Royal Statistical Society, Series B (Methodological)
, vol.39
, pp. 1-38
-
-
Dempster, A.P.1
Laird, N.M.2
Rubin, D.B.3
-
76
-
-
4544241479
-
Danger of low-dimensional watermarking subspaces
-
Montreal, Canada
-
Doërr, G., Dugelay, J.L.: Danger of low-dimensional watermarking subspaces. In: IEEE International Conference on Acoustics, Speech, and Signal Processing. Volume 3., Montreal, Canada (2004) 93-96
-
(2004)
IEEE International Conference on Acoustics, Speech, and Signal Processing
, vol.3
, pp. 93-96
-
-
Doërr, G.1
Dugelay, J.L.2
-
77
-
-
21844460192
-
Watermark attack based on blind estimation without priors
-
Proc. International Workshop on Digital Watermarking, IWDW. of, Seoul, Korea, Springer
-
Du, J., Lee, C., Lee, H., Suh, Y.: Watermark attack based on blind estimation without priors. In: Proc. International Workshop on Digital Watermarking, IWDW. Volume 2613 of Lecture Notes in Computer Science., Seoul, Korea, Springer (2002)
-
(2002)
Lecture Notes in Computer Science
, vol.2613
-
-
Du, J.1
Lee, C.2
Lee, H.3
Suh, Y.4
-
78
-
-
0027541192
-
The foundations of set theoretic estimation
-
Combettes, P.L.: The foundations of set theoretic estimation. Proceedings of the IEEE 81 (1993) 182-208
-
(1993)
Proceedings of the IEEE
, vol.81
, pp. 182-208
-
-
Combettes, P.L.1
-
79
-
-
0024750676
-
Set membership identification in digital signal processing
-
Deller, J.R.: Set membership identification in digital signal processing. IEEE ASSP Magazine 6 (1989) 4-20
-
(1989)
IEEE ASSP Magazine
, vol.6
, pp. 4-20
-
-
Deller, J.R.1
-
80
-
-
0027648997
-
An optimal volume ellipsoid algorithm for parameter set estimation
-
Cheung, M.F., Yurkovich, S., Passino, K.M.: An optimal volume ellipsoid algorithm for parameter set estimation. IEEE Transactions on Automatic Control 38 (1993) 1292-1296
-
(1993)
IEEE Transactions on Automatic Control
, vol.38
, pp. 1292-1296
-
-
Cheung, M.F.1
Yurkovich, S.2
Passino, K.M.3
-
81
-
-
33646182858
-
Security of DM quantization watermarking schemes: A practical study for digital images
-
Barni, M, Cox, I, Kalker, T, Kim, H.J, eds, Siena, Italy, Springer
-
Bas, P., Hurri, J.: Security of DM quantization watermarking schemes: a practical study for digital images. In Barni, M., Cox, I., Kalker, T., Kim, H.J., eds.: Fourth International Workshop on Digital Watermarking. Volume 3710., Siena, Italy, Springer (2005) 186-200
-
(2005)
Fourth International Workshop on Digital Watermarking
, vol.3710
, pp. 186-200
-
-
Bas, P.1
Hurri, J.2
-
82
-
-
8844265283
-
Searching for the stego-key
-
San Jose, CA, USA
-
Fridrich, J., Goljan, M., Soukal, D.: Searching for the stego-key. In: Proc. of Security and Watermarking of Multimedia Contents VI. Proceedings of SPIE, San Jose, CA, USA (2004) 70-82
-
(2004)
Proc. of Security and Watermarking of Multimedia Contents VI. Proceedings of SPIE
, pp. 70-82
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
83
-
-
84937814312
-
High capacity despite better steganalysis (F5-A steganographic algorithm)
-
Int. Workshop on Information Hiding, IH'01. of, New York, NY, USA, Springer Verlag
-
Westfeld, A.: High capacity despite better steganalysis (F5-A steganographic algorithm). In: Int. Workshop on Information Hiding, IH'01. Volume 2137 of Lecture Notes in Computer Science., New York, NY, USA, Springer Verlag (2001) 289-302
-
(2001)
Lecture Notes in Computer Science
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
84
-
-
85084160704
-
Defending against statistical steganalysis
-
Washington DC, USA
-
Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium, Washington DC, USA (2001) 323-336
-
(2001)
10th USENIX Security Symposium
, pp. 323-336
-
-
Provos, N.1
-
85
-
-
22044455110
-
Forensic steganalysis: Determining the stego key in spatial domain steganography
-
San Jose, CA, USA
-
Fridrich, J., Goljan, M., Soukal, D., Holotyak, T.: Forensic steganalysis: determining the stego key in spatial domain steganography. In: Proc. of Security and Watermarking of Multimedia Contents VII. Proceedings of SPIE, San Jose, CA, USA (2005)
-
(2005)
Proc. of Security and Watermarking of Multimedia Contents VII. Proceedings of SPIE
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
Holotyak, T.4
-
86
-
-
0033703669
-
Further attacks on Yeung-Mintzer fragile watermarking scheme
-
San Jose, CA, USA
-
Fridrich, J., Goljan, M., Soukal, D., Memon, N.: Further attacks on Yeung-Mintzer fragile watermarking scheme. In: Proc. of Security and Watermarking of Multimedia Contents II. Proceedings of SPIE, San Jose, CA, USA (2000) 428-437
-
(2000)
Proc. of Security and Watermarking of Multimedia Contents II. Proceedings of SPIE
, pp. 428-437
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
Memon, N.4
-
87
-
-
0007751316
-
Analysis of the sensitivity attack against electronic watermarks in images
-
Aucsmith, D, ed, 2nd International Workshop on Information Hiding, IH'98. of, Portland, OR, USA, Springer Verlag
-
Linnartz, J.P.M.G., van Dijk, M.: Analysis of the sensitivity attack against electronic watermarks in images. In Aucsmith, D., ed.: 2nd International Workshop on Information Hiding, IH'98. Volume 1525 of Lecture Notes in Computer Science., Portland, OR, USA, Springer Verlag (1998) 258-272
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 258-272
-
-
Linnartz, J.P.M.G.1
van Dijk, M.2
-
88
-
-
0032311781
-
Watermark estimation through detector analysis
-
Chicago, IL, USA
-
Kalker, T., Linnartz, J.P., van Dijk, M.: Watermark estimation through detector analysis. In: IEEE International Conference on Image Processing, ICIP'98, Chicago, IL, USA (1998) 425-429
-
(1998)
IEEE International Conference on Image Processing, ICIP'98
, pp. 425-429
-
-
Kalker, T.1
Linnartz, J.P.2
van Dijk, M.3
-
89
-
-
21844452953
-
New sensitivity analysis attack
-
Edward J. Wong, Delp III, P.W, eds, SPIE
-
El Choubassi, M., Moulin, P.: New sensitivity analysis attack. In Edward J. Delp III, Wong, P.W., eds.: Security, Steganography and Watermarking of Multimedia contents VII, SPIE (2005) 734-745
-
(2005)
Security, Steganography and Watermarking of Multimedia contents VII
, pp. 734-745
-
-
El Choubassi, M.1
Moulin, P.2
-
91
-
-
33646190288
-
Oracle attacks and covert channels
-
Barni, M, Cox, I, Kalker, T, Kim, H.J, eds, Fourth International Workshop on Digital Watermarking. of, Siena, Italy, Springer
-
Venturini I.: Oracle attacks and covert channels. In Barni, M., Cox, I., Kalker, T., Kim, H.J., eds.: Fourth International Workshop on Digital Watermarking. Volume 3710 of Lecture Notes in Computer Science., Siena, Italy, Springer (2005) 171-185
-
(2005)
Lecture Notes in Computer Science
, vol.3710
, pp. 171-185
-
-
Venturini, I.1
-
92
-
-
33645698671
-
-
Choubassi, M.E., Moulin, P.: On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks. In III, E.J.D., Wong, P.W., eds.: Security, Steganography, and Watermarking of Multimedia Contents VIII. 6072., SPIE (2006)
-
Choubassi, M.E., Moulin, P.: On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks. In III, E.J.D., Wong, P.W., eds.: Security, Steganography, and Watermarking of Multimedia Contents VIII. Volume 6072., SPIE (2006)
-
-
-
-
93
-
-
33646763554
-
Randomized detection for spread-spectrum watermarking: Defending against sensitivity and other attacks
-
Philadelphia, USA
-
Venkatesan, R., Jakubowski, M.H.: Randomized detection for spread-spectrum watermarking: defending against sensitivity and other attacks. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Volume 2., Philadelphia, USA (2005) 9-12
-
(2005)
IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
, vol.2
, pp. 9-12
-
-
Venkatesan, R.1
Jakubowski, M.H.2
-
94
-
-
33646182640
-
The return of the sensitivity attack
-
Barni, M, Cox, I, Kalker, T, Kim, H.J, eds, International Workshop on Digital Watermarking. of, Siena, Italy, Springer
-
Comesaña, P., Pérez-Freire, L., Pérez- González, F.: The return of the sensitivity attack. In Barni, M., Cox, I., Kalker, T., Kim, H.J., eds.: International Workshop on Digital Watermarking. Volume 3710 of Lecture Notes in Computer Science., Siena, Italy, Springer (2005) 260-274
-
(2005)
Lecture Notes in Computer Science
, vol.3710
, pp. 260-274
-
-
Comesaña, P.1
Pérez-Freire, L.2
Pérez- González, F.3
-
95
-
-
38549147301
-
On the need for image dependent keys for watermarking
-
Newark, NJ, USA
-
Holliman, M., Memon, N., Yeung, M.: On the need for image dependent keys for watermarking. In: Proceedings of IEEE Content Security and Data Hiding in Digital Media, Newark, NJ, USA (1999)
-
(1999)
Proceedings of IEEE Content Security and Data Hiding in Digital Media
-
-
Holliman, M.1
Memon, N.2
Yeung, M.3
-
96
-
-
84962762130
-
Robust hash functions for digital watermarking
-
Las Vegas, Nevada, USA
-
Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proceedings of the International Conference on Information Technology: Coding and Computing, Las Vegas, Nevada, USA (2000) 173-178
-
(2000)
Proceedings of the International Conference on Information Technology: Coding and Computing
, pp. 173-178
-
-
Fridrich, J.1
Goljan, M.2
-
99
-
-
0032072064
-
Watermarking of uncompressed and compressed video
-
Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Processing 66 (1998) 283-301
-
(1998)
Signal Processing
, vol.66
, pp. 283-301
-
-
Hartung, F.1
Girod, B.2
-
100
-
-
0442326757
-
Transformed-key asymmetric watermarking system
-
Choi, H., Lee, K., Kim, T.: Transformed-key asymmetric watermarking system. IEEE Signal Processing Letters 11 (2004) 251-254
-
(2004)
IEEE Signal Processing Letters
, vol.11
, pp. 251-254
-
-
Choi, H.1
Lee, K.2
Kim, T.3
-
101
-
-
1642299017
-
An asymmetric watermarking system with many embedding watermarks corresponding to one detection watermark
-
Kim, T.Y., Choi, H., Lee, K., Kim, T.: An asymmetric watermarking system with many embedding watermarks corresponding to one detection watermark. IEEE Signal Processing Letters 11 (2004) 375-377
-
(2004)
IEEE Signal Processing Letters
, vol.11
, pp. 375-377
-
-
Kim, T.Y.1
Choi, H.2
Lee, K.3
Kim, T.4
-
102
-
-
0032684844
-
Key independent watermark detection
-
Florence
-
van Schyndel, R.G., Tirkel, A.Z., Svalbe, I.D.: Key independent watermark detection, In: IEEE International Conference on Multimedia Computing Systems (ICMCS99), Florence (1999) 580-585
-
(1999)
IEEE International Conference on Multimedia Computing Systems (ICMCS99)
, pp. 580-585
-
-
van Schyndel, R.G.1
Tirkel, A.Z.2
Svalbe, I.D.3
-
103
-
-
84937053333
-
Public key watermarking by eigenvectors of linear transforms
-
Tampere, Finland
-
Eggers, J., Su, J., Girod, B.: Public key watermarking by eigenvectors of linear transforms. In: Proceedings of the European Signal Processing Conference, Tampere, Finland (2000)
-
(2000)
Proceedings of the European Signal Processing Conference
-
-
Eggers, J.1
Su, J.2
Girod, B.3
-
104
-
-
0010813198
-
Asymmetric watermarking schemes
-
Invited paper
-
Eggers, J.J., Su, J.K., Girod, B.: Asymmetric watermarking schemes. In: Sicherheit in Mediendaten, Springer Reihe: Informatik Aktuell (2000) Invited paper.
-
(2000)
Sicherheit in Mediendaten, Springer Reihe: Informatik Aktuell
-
-
Eggers, J.J.1
Su, J.K.2
Girod, B.3
-
105
-
-
0002884288
-
An asymmetric public detection watermarking technique
-
Pfitzmann, A, ed, Dresden, Germany, Springer Verlag
-
Furon, T., Duhamel, P.: An asymmetric public detection watermarking technique. In Pfitzmann, A., ed.: Proc. of the third Int. Workshop on Information Hiding, Dresden, Germany, Springer Verlag (1999) 88-100
-
(1999)
Proc. of the third Int. Workshop on Information Hiding
, pp. 88-100
-
-
Furon, T.1
Duhamel, P.2
-
106
-
-
0037851028
-
An asymmetric watermarking method
-
Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery
-
Furon, T., Duhamel, P.: An asymmetric watermarking method. IEEE Trans. on Signal Processing 51 (2003) 981-995 Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery.
-
(2003)
IEEE Trans. on Signal Processing
, vol.51
, pp. 981-995
-
-
Furon, T.1
Duhamel, P.2
-
107
-
-
38549142201
-
An unified approach of asymmetric watermarking schemes
-
P.W. Wong, E. Delp, eds, USA, SPIE
-
Furon, T., Venturini, I., Duhamel, P.: An unified approach of asymmetric watermarking schemes. In P.W. Wong, E. Delp, eds.: Security and Watermarking of Multimedia Contents III, San Jose, Cal., USA, SPIE (2001)
-
(2001)
Security and Watermarking of Multimedia Contents III, San Jose, Cal
-
-
Furon, T.1
Venturini, I.2
Duhamel, P.3
-
109
-
-
0036028641
-
-
Hurley, N.J., Silvestre, G.C.M.: Nth-order audio watermarking. In III, E.J.D., Wong, P.W., eds.: Security and Watermarking of Multimedia Contents IV. 4675 of Proc. of SPIE., San José, CA, USA (2002) 102-109
-
Hurley, N.J., Silvestre, G.C.M.: Nth-order audio watermarking. In III, E.J.D., Wong, P.W., eds.: Security and Watermarking of Multimedia Contents IV. Volume 4675 of Proc. of SPIE., San José, CA, USA (2002) 102-109
-
-
-
-
110
-
-
84960935137
-
Secure detection of public watermarks with fractal decision boundary
-
Toulouse, France
-
Mansour, M.F., Tewfik, A.H.: Secure detection of public watermarks with fractal decision boundary. In: Proc. XI European Signal Processing Conference, EUSIPCO'02, Toulouse, France (2002)
-
(2002)
Proc. XI European Signal Processing Conference, EUSIPCO'02
-
-
Mansour, M.F.1
Tewfik, A.H.2
-
112
-
-
0024611659
-
The knowledge complexity of interactive proof-systems
-
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. In: SIAM Journal of Computing. Volume 18. (1989) 186-208
-
(1989)
SIAM Journal of Computing
, vol.18
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
113
-
-
0000867507
-
Minimum disclosure proofs of knowledge
-
Brassard, G., Chaum, D., Crépeau, C.: Minimum disclosure proofs of knowledge. Journal of Computer and System Sciences 37 (1988) 156-189
-
(1988)
Journal of Computer and System Sciences
, vol.37
, pp. 156-189
-
-
Brassard, G.1
Chaum, D.2
Crépeau, C.3
-
114
-
-
84983104598
-
On defining proofs of knowledge
-
Proceedings of Crypto'92. of, Springer-Verlag
-
Mihil Bellare, O.G.: On defining proofs of knowledge. In: Proceedings of Crypto'92. Volume 740 of Lecture Notes in Computer Science., Springer-Verlag (1992) 390-420
-
(1992)
Lecture Notes in Computer Science
, vol.740
, pp. 390-420
-
-
Mihil Bellare, O.G.1
-
117
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21 (1978) 120-176
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-176
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
118
-
-
35248829262
-
Zero knowledge watermark detection
-
Information Hiding: Third International Workshop. of, Springer
-
Craver, S.: Zero knowledge watermark detection. In: Information Hiding: Third International Workshop. Volume 1768 of Lecture Notes in Computer Science., Springer (2000) 101-116
-
(2000)
Lecture Notes in Computer Science
, vol.1768
, pp. 101-116
-
-
Craver, S.1
-
119
-
-
0030409662
-
A method for signature casting on digital images
-
Pitas, I.: A method for signature casting on digital images. In: Proceedings of ICIP. Volume 3. (1996) 215-218
-
(1996)
Proceedings of ICIP
, vol.3
, pp. 215-218
-
-
Pitas, I.1
-
120
-
-
24744452204
-
Cryptography meets watermarking: Detecting watermarks with minimal- or zero-knowledge disclosure
-
Adelsbach, A., Katzenbeisser, S., Sadeghi, A.R.: Cryptography meets watermarking: Detecting watermarks with minimal- or zero-knowledge disclosure. In: XI European Signal Processing Conference. Volume I. (2003) 446-449
-
(2003)
XI European Signal Processing Conference
, vol.1
, pp. 446-449
-
-
Adelsbach, A.1
Katzenbeisser, S.2
Sadeghi, A.R.3
-
121
-
-
1442310343
-
Commitment schemes and zero-knowledge protocols
-
Lectures on data security: modern cryptology in theory and practise. of, Springer-Verlag
-
Damgård, I.: Commitment schemes and zero-knowledge protocols. In: Lectures on data security: modern cryptology in theory and practise. Volume 1561 of Lecture Notes in Computer Science., Springer-Verlag (1998) 63-86
-
(1998)
Lecture Notes in Computer Science
, vol.1561
, pp. 63-86
-
-
Damgård, I.1
-
123
-
-
84957685616
-
A practical and provably secure scheme for publicly verifiable secret sharing and its applications
-
Proceedings of EUROCRYPT'98. of, Springer
-
Fujisaki, E., Okamoto, T.: A practical and provably secure scheme for publicly verifiable secret sharing and its applications. In: Proceedings of EUROCRYPT'98. Volume 1403 of Lecture Notes in Computer Science., Springer (1998) 32-46
-
(1998)
Lecture Notes in Computer Science
, vol.1403
, pp. 32-46
-
-
Fujisaki, E.1
Okamoto, T.2
-
124
-
-
84958774556
-
A statistically-hiding integer commitment scheme based on groups with hidden order
-
ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security. of, Spriger-Verlag
-
Damgård, I., Fujisaki, E.: A statistically-hiding integer commitment scheme based on groups with hidden order. In: ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security. Volume 2501 of Lecture Notes in Computer Science., Spriger-Verlag (2002) 125-142
-
(2002)
Lecture Notes in Computer Science
, vol.2501
, pp. 125-142
-
-
Damgård, I.1
Fujisaki, E.2
-
125
-
-
38549143493
-
-
Piva, A., Corazzi, D., Rosa, A.D., Barni, M.: Zero knowledge st-dm watermarking. In III, E.J.D., Wong, P.W., eds.: Security, Steganography, and Watermarking of Multimedia Contents VIII, SPIE, San José, California, USA (2006)
-
Piva, A., Corazzi, D., Rosa, A.D., Barni, M.: Zero knowledge st-dm watermarking. In III, E.J.D., Wong, P.W., eds.: Security, Steganography, and Watermarking of Multimedia Contents VIII, SPIE, San José, California, USA (2006)
-
-
-
-
129
-
-
33646128241
-
Non-interactive watermark detection for a correlation-based watermarking scheme
-
Communications and Multimedia Security: 9th IFIP TC-6 TC-11International Conference, CMS, of, Spriger-Verlag
-
Adelsbach, A., Rohe, M., Sadeghi, A.R.: Non-interactive watermark detection for a correlation-based watermarking scheme. In: Communications and Multimedia Security: 9th IFIP TC-6 TC-11International Conference, CMS 2005. Volume 3677 of Lecture Notes in Computer Science., Spriger-Verlag (2005) 129-139
-
(2005)
Lecture Notes in Computer Science
, vol.3677
, pp. 129-139
-
-
Adelsbach, A.1
Rohe, M.2
Sadeghi, A.R.3
-
130
-
-
13244278081
-
Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding
-
Abrardo, A., Barni, M.: Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding. IEEE Transactions on Signal Processing 53 (2005) 824-833
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, pp. 824-833
-
-
Abrardo, A.1
Barni, M.2
-
131
-
-
0036030621
-
Defining security in steganographic systems
-
Edward J. Wong, Delp III, P.W, eds, San Jose, California, USA, SPIE
-
Katzenbeisser, S., Petitcolas, F.A.P.: Defining security in steganographic systems. In Edward J. Delp III, Wong, P.W., eds.: Security, Steganography, and Watermarking of Multimedia Contents IV. Volume 4675., San Jose, California, USA, SPIE (2002) 50-56
-
(2002)
Security, Steganography, and Watermarking of Multimedia Contents IV
, vol.4675
, pp. 50-56
-
-
Katzenbeisser, S.1
Petitcolas, F.A.P.2
-
132
-
-
3042519430
-
An information-theoretic model for steganography
-
Cachin, C.: An information-theoretic model for steganography. Information and Computation 192 (2004) 41-56
-
(2004)
Information and Computation
, vol.192
, pp. 41-56
-
-
Cachin, C.1
|