-
1
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
B.Chen and G.W.Wornell, "Quantization index modulation: a class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inform. Theory, vol. 47, pp. 1423-1443, 2001.
-
(2001)
IEEE Trans. Inform. Theory
, vol.47
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
2
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Dec.
-
I. Cox, J.Kilian, F.T.Leighton, and T.Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Proc., vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Proc.
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
3
-
-
0035368661
-
Optimal transform domain watermark embedding via linear programming
-
Jun.
-
S. Pereira, S. Voloshynoskiy, and T. Pun, "Optimal transform domain watermark embedding via linear programming," Signal Processing, vol. 81, no. 6, pp. 1251-1260, Jun. 2001.
-
(2001)
Signal Processing
, vol.81
, Issue.6
, pp. 1251-1260
-
-
Pereira, S.1
Voloshynoskiy, S.2
Pun, T.3
-
4
-
-
21844449102
-
Optimization algorithms for quantizing randomized statistics of image regions
-
M. K. Mihcak, R. Venkatesan, and M. Kesal, "Optimization algorithms for quantizing randomized statistics of image regions," in Proceedings of the Fortieth Annual Allerton Conference on Communication, Control and Computing, Oct. 2002.
-
Proceedings of the Fortieth Annual Allerton Conference on Communication, Control and Computing, Oct. 2002
-
-
Mihcak, M.K.1
Venkatesan, R.2
Kesal, M.3
-
5
-
-
33645672927
-
Set theoretic watermarking and its application to semifragile tamper detection
-
August submitted for review
-
O. Altun, G. Sharma, M. Celik, and M. Bocko, "Set theoretic watermarking and its application to semifragile tamper detection," IEEE Trans. Information Forensics And Security, August 2005, submitted for review.
-
(2005)
IEEE Trans. Information Forensics and Security
-
-
Altun, O.1
Sharma, G.2
Celik, M.3
Bocko, M.4
-
6
-
-
33749619545
-
Semi-fragile hierarchical watermarking in a set theoretic framework
-
O. Altun, G. Sharma, M. Celik, and M. Bocko, "Semi-fragile hierarchical watermarking in a set theoretic framework," in Proc. of ICIP, 2005, vol. 1, pp. 1001-1004.
-
Proc. of ICIP, 2005
, vol.1
, pp. 1001-1004
-
-
Altun, O.1
Sharma, G.2
Celik, M.3
Bocko, M.4
-
7
-
-
0034441409
-
Informed embedding: Exploiting image and detector information during watermark insertion
-
M. L. Miller, I. J. Cox, and J. A. Bloom, "Informed embedding: Exploiting image and detector information during watermark insertion," Proc. ofICIP, 2000.
-
Proc. of ICIP, 2000
-
-
Miller, M.L.1
Cox, I.J.2
Bloom, J.A.3
-
8
-
-
0016079335
-
The effects of a visual fidelity criterion on the encoding of images
-
Jul.
-
J. L. Mannos and D. L. Sakrison, "The effects of a visual fidelity criterion on the encoding of images," IEEE Transactions on Information Theory, vol. 20, no. 4, pp. 525-536, Jul. 1974.
-
(1974)
IEEE Transactions on Information Theory
, vol.20
, Issue.4
, pp. 525-536
-
-
Mannos, J.L.1
Sakrison, D.L.2
-
9
-
-
0027541192
-
The foundations of set theoretic estimation
-
Feb.
-
P. L. Combettes, "The foundations of set theoretic estimation," Proceedings of the IEEE, vol. 81, no. 2, pp. 182-208, Feb. 1993.
-
(1993)
Proceedings of the IEEE
, vol.81
, Issue.2
, pp. 182-208
-
-
Combettes, P.L.1
-
10
-
-
0004055894
-
-
Cambridge University Press
-
S. Boyd, "Convex optimization," Cambridge University Press, http://www.stanford.edu/ boyd/cvxbook/.
-
Convex Optimization
-
-
Boyd, S.1
|