-
2
-
-
0032074580
-
Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks and Implications
-
May
-
S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung. Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks and Implications. IEEE Journal on Selected Areas in Communications, 16(4):573-586, May 1998.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 573-586
-
-
Craver, S.1
Memon, N.2
Yeo, B.L.3
Yeung, M.M.4
-
3
-
-
1942422086
-
Analysis and Design of Watermarking Algorithms for Improved Resistance to Compression
-
Feb
-
C. Fei, D. Kundur, and R. H. Kwong. Analysis and Design of Watermarking Algorithms for Improved Resistance to Compression. IEEE Transactions on Image Processing, 13:126-144, Feb 2004.
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, pp. 126-144
-
-
Fei, C.1
Kundur, D.2
Kwong, R.H.3
-
5
-
-
46249115866
-
-
S. S. X. L. Y.-D. K. Gangyi Jiang, Mei Yu. New blind image watermarking in dct domain. In Proceedings of the 6th International Conference on Signal Processing.
-
S. S. X. L. Y.-D. K. Gangyi Jiang, Mei Yu. New blind image watermarking in dct domain. In Proceedings of the 6th International Conference on Signal Processing.
-
-
-
-
6
-
-
0033872149
-
Counterfeiting attack on oblivious blockwise independent invisible watermarking schemes
-
March
-
M. Holliman and N. Memon. Counterfeiting attack on oblivious blockwise independent invisible watermarking schemes. In IEEE Transactions on Image Processing, volume 9, pages 432-441, March 2000.
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
-
7
-
-
0030388964
-
Secure Spread Spectrum Watermarking of Images, Audio and Video
-
I.J.Cox, J. Kilian, T. Shamoon, and T. Leighton. Secure Spread Spectrum Watermarking of Images, Audio and Video. In Proceedings IEEE International Conf on Image Processing, volume 3, pages 243-246, 1996.
-
(1996)
Proceedings IEEE International Conf on Image Processing
, vol.3
, pp. 243-246
-
-
Cox, I.J.1
Kilian, J.2
Shamoon, T.3
Leighton, T.4
-
8
-
-
0001787203
-
Cocktail watermarking on images
-
C.-S. Lu, H.-Y. M. Liao, S.-K. Huang, and C.-J. Sze. Cocktail watermarking on images. In Information Hiding, pages 333-347, 1999.
-
(1999)
Information Hiding
, pp. 333-347
-
-
Lu, C.-S.1
Liao, H.-Y.M.2
Huang, S.-K.3
Sze, C.-J.4
-
9
-
-
20444378085
-
Multipurpose image watermarking algorithm based on multistage vector quantization
-
Z.-M. Lu, D.-G. Xu, and S.-H. Sun. Multipurpose image watermarking algorithm based on multistage vector quantization. IEEE Transactions on Image Processing, 14(6):822-831, 2005.
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.6
, pp. 822-831
-
-
Lu, Z.-M.1
Xu, D.-G.2
Sun, S.-H.3
-
10
-
-
0030103829
-
Towards online Worldwide Access to Vatican Library Materials
-
Mar
-
F. C. Mintzer, et al., Towards online Worldwide Access to Vatican Library Materials. IBM Journal of Research and Development, 40(2): 139-162, Mar 1996.
-
(1996)
IBM Journal of Research and Development
, vol.40
, Issue.2
, pp. 139-162
-
-
Mintzer, F.C.1
-
11
-
-
34548028107
-
-
Master's thesis, Department of Electrical Engineering, Indian Institute of Science, Bangalore, India
-
S. P. Mohanty. Digital Watamerking of Images. Master's thesis, Department of Electrical Engineering, Indian Institute of Science, Bangalore, India, 1999.
-
(1999)
Digital Watamerking of Images
-
-
Mohanty, S.P.1
-
13
-
-
0034509511
-
-
S. P. Mohanty, K. R. Ramakrishnan, and M. S. Kankanhalli. A DCT Domain Visible Watermarking Technique for Images. In Proceedings of the IEEE International Conference on Multimedia and Expo, pages 1029-1032, 2000.
-
S. P. Mohanty, K. R. Ramakrishnan, and M. S. Kankanhalli. A DCT Domain Visible Watermarking Technique for Images. In Proceedings of the IEEE International Conference on Multimedia and Expo, pages 1029-1032, 2000.
-
-
-
-
15
-
-
33745353924
-
Energy-efficient watermark algorithm based on pairing mechanism
-
Y.-T. Pai, S.-J. Ruan, and J. Götze. Energy-efficient watermark algorithm based on pairing mechanism. In Lecture Notes in Computer Science (LNCS), KES (1), pages 1219-1225, 2005.
-
(2005)
Lecture Notes in Computer Science (LNCS), KES (1)
, pp. 1219-1225
-
-
Pai, Y.-T.1
Ruan, S.-J.2
Götze, J.3
-
16
-
-
0020766544
-
Distributions of the Two-Dimensional DCT Coefficients for Images
-
June
-
R. C. Reininger and J. D. Gibson. Distributions of the Two-Dimensional DCT Coefficients for Images. IEEE Trans. Communications, 31(6):835-839, June 1983.
-
(1983)
IEEE Trans. Communications
, vol.31
, Issue.6
, pp. 835-839
-
-
Reininger, R.C.1
Gibson, J.D.2
-
18
-
-
33646195873
-
Vi-WiD: Visible Watermark Based Defense Against Phishing
-
M. Topkara, A. Kamara, M. Atallah, and C. Nita-Rotaru. Vi-WiD: Visible Watermark Based Defense Against Phishing. Lecture Notes in Computer Science (LNCS), IWDW 2005, 3710:470-484, 2005.
-
(2005)
Lecture Notes in Computer Science (LNCS), IWDW 2005
, vol.3710
, pp. 470-484
-
-
Topkara, M.1
Kamara, A.2
Atallah, M.3
Nita-Rotaru, C.4
-
20
-
-
1942517830
-
Dual domain watermarking for authentication and compression of cultural heritage image
-
Y. Zhao, P. Campisi, and D. Kundur. Dual domain watermarking for authentication and compression of cultural heritage image. IEEE Transactions on Image Processing, 13(3):430-448, 2004.
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, Issue.3
, pp. 430-448
-
-
Zhao, Y.1
Campisi, P.2
Kundur, D.3
|