-
1
-
-
21844452952
-
Watermarking security part I: Theory
-
San Jose, USA
-
Cayre, F., Fontaine, C., Furon, T.: Watermarking security part I: Theory. In: Proceedings of SPIE, Security, Steganography and Watermarking of Multimedia Contents VII, vol. 5681, San Jose, USA (2005)
-
(2005)
Proceedings of SPIE, Security, Steganography and Watermarking of Multimedia Contents VII
, vol.5681
-
-
Cayre, F.1
Fontaine, C.2
Furon, T.3
-
2
-
-
33746628959
-
Fundamentals of data hiding security and their application to spread-spectrum analysis
-
7th Information Hiding Workshop, IH05, Barcelona, Spain, Springer, Heidelberg
-
Comesaña, P., Pérez-Freiré, L., Pérez- González, F.: Fundamentals of data hiding security and their application to spread-spectrum analysis. In: 7th Information Hiding Workshop, IH05, Barcelona, Spain. LNCS, Springer, Heidelberg (2005)
-
(2005)
LNCS
-
-
Comesaña, P.1
Pérez-Freiré, L.2
Pérez- González, F.3
-
3
-
-
33746637553
-
Information-theoretic analysis of security in side-informed data hiding
-
7th Information Hiding Workshop, IH05, Barcelona, Spain, Springer, Heidelberg
-
Pérez-Freiré, L., Comesaña, P., Pérez- González, F.: Information-theoretic analysis of security in side-informed data hiding. In: 7th Information Hiding Workshop, IH05, Barcelona, Spain. LNCS, Springer, Heidelberg (2005)
-
(2005)
LNCS
-
-
Pérez-Freiré, L.1
Comesaña, P.2
Pérez- González, F.3
-
4
-
-
33646182858
-
Security of dm quantization watermarking scheme: A practical study for digital images
-
International Workshop on Digital Watermarking, Sienna, Italy, Springer Verlag, Berlin, Germany
-
Bas, P., Hurri, J.: Security of dm quantization watermarking scheme: a practical study for digital images. In: International Workshop on Digital Watermarking, Sienna, Italy. LNCS, Springer Verlag, Berlin, Germany (2005)
-
(2005)
LNCS
-
-
Bas, P.1
Hurri, J.2
-
5
-
-
21844449972
-
Watermarking security part II: Practice
-
San Jose, USA
-
Cayre, F., Fontaine, C., Furon, T.: Watermarking security part II: Practice. In: Proceedings of SPIE, Security, Steganography and Watermarking of Multimedia Contents VII, vol. 5681, San Jose, USA (2005)
-
(2005)
Proceedings of SPIE, Security, Steganography and Watermarking of Multimedia Contents VII
, vol.5681
-
-
Cayre, F.1
Fontaine, C.2
Furon, T.3
-
6
-
-
14844326111
-
Model-based steganography
-
International Workshop on Digital Watermarking IWDW, Springer, Heidelberg
-
Sallee.: Model-based steganography. In: International Workshop on Digital Watermarking (IWDW). LNCS, vol. 2, Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2
-
-
Sallee1
-
7
-
-
0003905759
-
-
John Wiley & Sons, New York, NY
-
Hyvärinen, A., Karhunen, J., Oja, E.: Independent Component Analysis. John Wiley & Sons, New York, NY (2001)
-
(2001)
Independent Component Analysis
-
-
Hyvärinen, A.1
Karhunen, J.2
Oja, E.3
-
8
-
-
0038527410
-
Improved spread spectrum: A new modulation technique for robust watermarking
-
Malvar, Florencio.: Improved spread spectrum: A new modulation technique for robust watermarking. IEEE Transactions on Signal Processing, vol. 51 (2003)
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
-
-
Malvar, F.1
-
9
-
-
4544241479
-
Danger of low-dimensional watermarking subspaces
-
Montreal, Canada
-
Doërr, G.J., Dugelay, J.L.: Danger of low-dimensional watermarking subspaces. In: ICASSP 2004. 29th IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 17-21. Montreal, Canada (2004)
-
(2004)
ICASSP 2004. 29th IEEE International Conference on Acoustics, Speech, and Signal Processing
, pp. 17-21
-
-
Doërr, G.J.1
Dugelay, J.L.2
-
10
-
-
0032629347
-
Fast and robust fixed-point algorithms for independent component analysis
-
Hyvärinen, A.: Fast and robust fixed-point algorithms for independent component analysis. IEEE Transactions on Neural Networks 10(3), 626-634 (1999)
-
(1999)
IEEE Transactions on Neural Networks
, vol.10
, Issue.3
, pp. 626-634
-
-
Hyvärinen, A.1
-
11
-
-
0002719797
-
The Hungarian method of solving the assignment problem
-
Kuhn, H.W.: The Hungarian method of solving the assignment problem. Naval Res. Logistics Quart. 2, 83-97 (1955)
-
(1955)
Naval Res. Logistics Quart
, vol.2
, pp. 83-97
-
-
Kuhn, H.W.1
-
12
-
-
0037737759
-
Scalar costa scheme for information embedding
-
Eggers, J.J., Buml, R., Tzschoppe, R., Girod, B.: Scalar costa scheme for information embedding. IEEE Trans. on Signal Processing 51(4), 1003-1019 (2003)
-
(2003)
IEEE Trans. on Signal Processing
, vol.51
, Issue.4
, pp. 1003-1019
-
-
Eggers, J.J.1
Buml, R.2
Tzschoppe, R.3
Girod, B.4
|