-
1
-
-
0015287895
-
An algorithm for calculating the capacity of an arbitrary discrete memoryless channel
-
S. Arimoto. An algorithm for calculating the capacity of an arbitrary discrete memoryless channel. IEEE Transactions on Information Theory, IT-18(1):14-20, 1972.
-
(1972)
IEEE Transactions on Information Theory
, vol.IT-18
, Issue.1
, pp. 14-20
-
-
Arimoto, S.1
-
3
-
-
0015376113
-
Computation of channel capacity and rate distortion functions
-
R. E. Blahut. Computation of channel capacity and rate distortion functions. IEEE Transactions on Information Theory, IT-18(4):460-473, 1972.
-
(1972)
IEEE Transactions on Information Theory
, vol.IT-18
, Issue.4
, pp. 460-473
-
-
Blahut, R.E.1
-
4
-
-
0035333687
-
Quantization index modulation: A class of probably good methods for digital watermarking and information embedding
-
B. Chen and G. W. Wornell. Quantization index modulation: A class of probably good methods for digital watermarking and information embedding. IEEE Trans. on Information Theory, 47(4):1423-1443, 2001.
-
(2001)
IEEE Trans. on Information Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
5
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Dec
-
I. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6:1673-1687, Dec. 1997.
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, pp. 1673-1687
-
-
Cox, I.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
6
-
-
0037737759
-
Scalar costa scheme for information embedding
-
J. Eggers, R. Bäuml, R. Tzschoppe, and B. Girod. Scalar costa scheme for information embedding. IEEE Transactions on Signal Processing, 51:1003-1019, 2003.
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, pp. 1003-1019
-
-
Eggers, J.1
Bäuml, R.2
Tzschoppe, R.3
Girod, B.4
-
8
-
-
0038527410
-
Improved spread spectrum: A new modulation technique for robust watermarking
-
D. F. HS Malvar. Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Transactions on Signal Processing, 2003.
-
(2003)
IEEE Transactions on Signal Processing
-
-
Malvar, D.F.H.1
-
9
-
-
0141638482
-
-
C.-T. Hsu and J.-L. Wu. A DWT-DFT composite watermarking scheme robust to both affine transform and jpeg compression. IEEE Transactions on Circuits System and Video Technology, 2003.
-
C.-T. Hsu and J.-L. Wu. A DWT-DFT composite watermarking scheme robust to both affine transform and jpeg compression. IEEE Transactions on Circuits System and Video Technology, 2003.
-
-
-
-
12
-
-
0038188753
-
Performance analysis of existing and new methods for data hiding with known-host information in additive channels
-
F. Perez-Gonzalez, F. Balado, and J. Martin. Performance analysis of existing and new methods for data hiding with known-host information in additive channels. IEEE Transactions on Signal Processing, 51(4):960-980, 2003.
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, Issue.4
, pp. 960-980
-
-
Perez-Gonzalez, F.1
Balado, F.2
Martin, J.3
-
13
-
-
9744279131
-
Robust image-adaptive data hiding using erasure and error correction
-
Dec
-
K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, and S. Chandrasekaran. Robust image-adaptive data hiding using erasure and error correction. IEEE Transactions on Image Processing, 13(12):1627-1639, Dec. 2004.
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, Issue.12
, pp. 1627-1639
-
-
Solanki, K.1
Jacobsen, N.2
Madhow, U.3
Manjunath, B.S.4
Chandrasekaran, S.5
-
14
-
-
21844444135
-
Additive non-gaussian noise attacks on the scalar costa scheme (SCS)
-
San Jose, CA, Jan
-
R. Tzschoppe, R. Bauml, R. Fischer, J. Huber, and A. Kaup. Additive non-gaussian noise attacks on the scalar costa scheme (SCS). In Proc. SPIE International Conference on Electronic Images'05, volume 5681, San Jose, CA, Jan. 2005.
-
(2005)
Proc. SPIE International Conference on Electronic Images'05
, vol.5681
-
-
Tzschoppe, R.1
Bauml, R.2
Fischer, R.3
Huber, J.4
Kaup, A.5
-
15
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
June
-
M. Utku-Celik, G. Sharma, E. Saber, and A. Murat-Tekalp. Hierarchical watermarking for secure image authentication with localization. IEEE Transactions on Image Processing, 11(6):585-595, June 2002.
-
(2002)
IEEE Transactions on Image Processing
, vol.11
, Issue.6
, pp. 585-595
-
-
Utku-Celik, M.1
Sharma, G.2
Saber, E.3
Murat-Tekalp, A.4
-
16
-
-
21844446385
-
Worst case additive attack against quantization-based data-hiding methods
-
San Jose, CA, Jan
-
J. Vila-Forcen, S. Voloshynovskiy, O. Koval, F. Perez-Gonzalez, and T. Pun. Worst case additive attack against quantization-based data-hiding methods. In Proc. SPIE International Conference on Electronic Images'05, volume 5681, San Jose, CA, Jan. 2005.
-
(2005)
Proc. SPIE International Conference on Electronic Images'05
, vol.5681
-
-
Vila-Forcen, J.1
Voloshynovskiy, S.2
Koval, O.3
Perez-Gonzalez, F.4
Pun, T.5
-
17
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
Oct
-
P. Wong and N. Memon. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing, 10(10):1593-1601, Oct. 2001.
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.1
Memon, N.2
|