-
1
-
-
3843102623
-
Reversible watermark using the difference expansion of a generalized integer transform
-
A. M. Alattar, "Reversible watermark using the difference expansion of a generalized integer transform," IEEE Trans. Image Process., vol. 13, no. 8, pp. 1147-1156, 2004.
-
(2004)
IEEE Trans. Image Process
, vol.13
, Issue.8
, pp. 1147-1156
-
-
Alattar, A.M.1
-
2
-
-
84977427380
-
Divide-and-conquer in multidimensional space
-
Hershey, PA
-
J. L. Bentley and M. I. Shamos, "Divide-and-conquer in multidimensional space," Proc. Eighth Annual ACM Symposium on Theory of Computing, pp. 220-230, Hershey, PA, 1976.
-
(1976)
Proc. Eighth Annual ACM Symposium on Theory of Computing
, pp. 220-230
-
-
Bentley, J.L.1
Shamos, M.I.2
-
3
-
-
0343867221
-
Applications for data hiding
-
W. Bender, W. Butera, D. Gruhl, R. Hwang, F. J. Paiz, and S. Pogreb, "Applications for data hiding," IBM Syst. J., vol. 39, no. 3/4, pp. 547-568, 2000.
-
(2000)
IBM Syst. J
, vol.39
, Issue.3-4
, pp. 547-568
-
-
Bender, W.1
Butera, W.2
Gruhl, D.3
Hwang, R.4
Paiz, F.J.5
Pogreb, S.6
-
4
-
-
1642302769
-
Reversible data hiding
-
Rochester, NY
-
M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, "Reversible data hiding," Proc. IEEE International Conference on Image Processing, pp. 157-160, Rochester, NY, 2002.
-
(2002)
Proc. IEEE International Conference on Image Processing
, pp. 157-160
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
Saber, E.4
-
5
-
-
13244269881
-
Lossless generalized-LSB data embedding
-
M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, "Lossless generalized-LSB data embedding," IEEE Trans. Image Process., vol. 14, no. 2, pp. 253-266, 2005.
-
(2005)
IEEE Trans. Image Process
, vol.14
, Issue.2
, pp. 253-266
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
Saber, E.4
-
6
-
-
0037411306
-
Finding optimal LSB substitution in image hiding by dynamic programming strategy
-
C. C. Chang, J. Y. Hsiao, and C. S. Chan, "Finding optimal LSB substitution in image hiding by dynamic programming strategy," Pattern Recognit., vol. 36, no. 7, pp. 1583-1595, 2003.
-
(2003)
Pattern Recognit
, vol.36
, Issue.7
, pp. 1583-1595
-
-
Chang, C.C.1
Hsiao, J.Y.2
Chan, C.S.3
-
7
-
-
33845650617
-
Reversible steganography for VQ-compressed images using side matching and relocation
-
C. C. Chang and C. Y. Lin, "Reversible steganography for VQ-compressed images using side matching and relocation," IEEE Trans. Inf. Forens. Secur., vol. 1, no. 4, pp. 493-501, 2006.
-
(2006)
IEEE Trans. Inf. Forens. Secur
, vol.1
, Issue.4
, pp. 493-501
-
-
Chang, C.C.1
Lin, C.Y.2
-
8
-
-
33751501445
-
A reversible data hiding scheme based on side match vector quantization
-
C. C. Chang, W. L. Tai, and C. C. Lin, "A reversible data hiding scheme based on side match vector quantization," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 10, pp. 1301-1308, 2006.
-
(2006)
IEEE Trans. Circuits Syst. Video Technol
, vol.16
, Issue.10
, pp. 1301-1308
-
-
Chang, C.C.1
Tai, W.L.2
Lin, C.C.3
-
9
-
-
1642398164
-
Algorithms for processing k-closest-pair queries in spatial databases
-
A. Corral, Y. Manolopoulos, Y. Theodoridis, and M. Vassilakopoulos, "Algorithms for processing k-closest-pair queries in spatial databases," Data Knowl. Eng., vol. 49, no. 1, pp. 67-104, 2004.
-
(2004)
Data Knowl. Eng
, vol.49
, Issue.1
, pp. 67-104
-
-
Corral, A.1
Manolopoulos, Y.2
Theodoridis, Y.3
Vassilakopoulos, M.4
-
10
-
-
0002540034
-
A reliable randomized algorithm for the closest-pair problem
-
M. Dietzfelbinger, T. Hagerup, J. Katajainen, and M. Penttonen, "A reliable randomized algorithm for the closest-pair problem," J. Algorithms, vol. 25, no. 1, pp. 19-51, 1997.
-
(1997)
J. Algorithms
, vol.25
, Issue.1
, pp. 19-51
-
-
Dietzfelbinger, M.1
Hagerup, T.2
Katajainen, J.3
Penttonen, M.4
-
11
-
-
0032284326
-
Fast hierarchical clustering and other applications of dynamic closest pairs
-
San Francisco, CA
-
D. Eppstein, "Fast hierarchical clustering and other applications of dynamic closest pairs," Proc. ACM Symposium on Discrete Algorithms, pp. 619-628, San Francisco, CA, 1998.
-
(1998)
Proc. ACM Symposium on Discrete Algorithms
, pp. 619-628
-
-
Eppstein, D.1
-
12
-
-
0036488240
-
Lossless data embedding-new paradigm in digital watermarking
-
J. Fridrich, M. Goljan, and R. Du, "Lossless data embedding-new paradigm in digital watermarking," Special Issue on Emerging Applications of Multimedia Data Hiding, vol. 2002, no. 2, pp. 185-196, 2002.
-
(2002)
Special Issue on Emerging Applications of Multimedia Data Hiding
, vol.2002
, Issue.2
, pp. 185-196
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
13
-
-
0038190646
-
A still-image encoder based on adaptive resolution vector quantization featuring needless calculation elimination architecture
-
M. Fujibayashi, T. Nozawa, T. Naakayama, K. Mochizuki, M. Konda, K. Kotani, S. Sugawa, and T. Ohmi, "A still-image encoder based on adaptive resolution vector quantization featuring needless calculation elimination architecture," IEEE J. Solid-State Circuits, vol. 38, no. 5, pp. 726-733, 2003.
-
(2003)
IEEE J. Solid-State Circuits
, vol.38
, Issue.5
, pp. 726-733
-
-
Fujibayashi, M.1
Nozawa, T.2
Naakayama, T.3
Mochizuki, K.4
Konda, M.5
Kotani, K.6
Sugawa, S.7
Ohmi, T.8
-
15
-
-
0036616689
-
A digital image watermarking scheme based on vector quantization
-
June
-
M. Jo and H. D. Kim, "A digital image watermarking scheme based on vector quantization," IEICE Trans. Inf. Syst., vol. E85-D, no. 6, pp. 1054-1056, June 2002.
-
(2002)
IEICE Trans. Inf. Syst
, vol.E85-D
, Issue.6
, pp. 1054-1056
-
-
Jo, M.1
Kim, H.D.2
-
16
-
-
28844486742
-
Reversible data embedding into images using wavelet techniques and sorting
-
L. Kamstra and H. J. A. M. Heijmans, "Reversible data embedding into images using wavelet techniques and sorting," IEEE Trans. Image Process., vol. 14, no. 12, pp. 2082-2090, 2005.
-
(2005)
IEEE Trans. Image Process
, vol.14
, Issue.12
, pp. 2082-2090
-
-
Kamstra, L.1
Heijmans, H.J.A.M.2
-
18
-
-
0040304282
-
A simple randomized sieve algorithm for the closest-pair problem
-
S. Khuller and Y. Matias, "A simple randomized sieve algorithm for the closest-pair problem," Inf. Comput., vol. 118, no. 1, pp. 34-37, 1995.
-
(1995)
Inf. Comput
, vol.118
, Issue.1
, pp. 34-37
-
-
Khuller, S.1
Matias, Y.2
-
19
-
-
0026854051
-
Side match and overlap match vector quantizers for images
-
T. Kim, "Side match and overlap match vector quantizers for images," IEEE Trans. Image Process., vol. 1, no. 2, pp. 170-185, 1992.
-
(1992)
IEEE Trans. Image Process
, vol.1
, Issue.2
, pp. 170-185
-
-
Kim, T.1
-
20
-
-
34247589797
-
Real-time event detection and its application to surveillance systems
-
Kos, Greece
-
H. Y. M. Liao, D. Y. Chen, C. W. Su, and H. R. Tyan, "Real-time event detection and its application to surveillance systems," Proc. IEEE International Symposium on Circuits and Systems, pp. 21-24, Kos, Greece, 2006.
-
(2006)
Proc. IEEE International Symposium on Circuits and Systems
, pp. 21-24
-
-
Liao, H.Y.M.1
Chen, D.Y.2
Su, C.W.3
Tyan, H.R.4
-
21
-
-
0018918171
-
An algorithm for vector quantization design
-
Y. Linde, A. Buzo, and R. M. Gary, "An algorithm for vector quantization design," IEEE Trans. Commun., vol. 28, no. 4, pp. 84-95, 1980.
-
(1980)
IEEE Trans. Commun
, vol.28
, Issue.4
, pp. 84-95
-
-
Linde, Y.1
Buzo, A.2
Gary, R.M.3
-
22
-
-
0033907535
-
Digital image watermarking technique based on vector quantization
-
Z. M. Lu and S. H. Sun, "Digital image watermarking technique based on vector quantization," Electron. Lett., vol. 36, no. 4, pp. 303-305, 2000.
-
(2000)
Electron. Lett
, vol.36
, Issue.4
, pp. 303-305
-
-
Lu, Z.M.1
Sun, S.H.2
-
23
-
-
0842332032
-
Digital image watermarking method based on vector quantization with labeled codewords
-
Dec
-
Z. M. Lu, W. Xing, D. G. Xu, and S. H. Sun, "Digital image watermarking method based on vector quantization with labeled codewords," IEICE Trans. Inf. Syst., vol. E86-D, no. 12, pp. 2786-2789, Dec. 2003.
-
(2003)
IEICE Trans. Inf. Syst
, vol.E86-D
, Issue.12
, pp. 2786-2789
-
-
Lu, Z.M.1
Xing, W.2
Xu, D.G.3
Sun, S.H.4
-
24
-
-
0035391983
-
Digital watermarking: Algorithms and applications
-
C. I. Podilchuk and E. J. Delp, "Digital watermarking: Algorithms and applications," IEEE Signal Process., vol. 18, no. 4, pp. 33-46, 2001.
-
(2001)
IEEE Signal Process
, vol.18
, Issue.4
, pp. 33-46
-
-
Podilchuk, C.I.1
Delp, E.J.2
-
26
-
-
0028466006
-
An optimal algorithm for the on-line closest-pair problem
-
C. Schwartz, M. Smid, and J. Snoeyink, "An optimal algorithm for the on-line closest-pair problem," Algorithmica, vol. 12, no. 1, pp. 18-29, 1994.
-
(1994)
Algorithmica
, vol.12
, Issue.1
, pp. 18-29
-
-
Schwartz, C.1
Smid, M.2
Snoeyink, J.3
-
27
-
-
0141862029
-
Reversible data embedding using a difference expansion
-
J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890-896, 2003.
-
(2003)
IEEE Trans. Circuits Syst. Video Technol
, vol.13
, Issue.8
, pp. 890-896
-
-
Tian, J.1
-
28
-
-
0038273964
-
Circular interpretation of bijective transformations in lossless watermarking for media asset management
-
C. D. Vleeschouwer, J. F. Delaigle, and B. Macq, "Circular interpretation of bijective transformations in lossless watermarking for media asset management," IEEE Trans. Multimed., vol. 5, no. 1, pp. 97-105, 2003.
-
(2003)
IEEE Trans. Multimed
, vol.5
, Issue.1
, pp. 97-105
-
-
Vleeschouwer, C.D.1
Delaigle, J.F.2
Macq, B.3
-
29
-
-
84887246903
-
-
B. Yang, Z. M. Lu, and S. H. Sun, Reversible watermarking in the VQ-compressed domain, Proc. Fifth IASTED International Conference on Visualization, Imaging, and Image Processing (VIIP2005), pp. 298-303, Benidorm, Spain, 2005.
-
B. Yang, Z. M. Lu, and S. H. Sun, "Reversible watermarking in the VQ-compressed domain," Proc. Fifth IASTED International Conference on Visualization, Imaging, and Image Processing (VIIP2005), pp. 298-303, Benidorm, Spain, 2005.
-
-
-
-
30
-
-
13644262818
-
Hiding secret data in images via predictive coding
-
Y. H. Yu, C. C. Chang, and Y. C. Hu, "Hiding secret data in images via predictive coding," Pattern Recognit., vol. 38, no. 5, pp. 691-705, 2005.
-
(2005)
Pattern Recognit
, vol.38
, Issue.5
, pp. 691-705
-
-
Yu, Y.H.1
Chang, C.C.2
Hu, Y.C.3
-
31
-
-
32244436344
-
An anomaly intrusion detection system based on vector quantization
-
Jan
-
J. Zheng and M. Hu, "An anomaly intrusion detection system based on vector quantization," IEICE Trans. Inf. Syst., vol. E89-D, no. 1, pp. 201-210, Jan. 2006.
-
(2006)
IEICE Trans. Inf. Syst
, vol.E89-D
, Issue.1
, pp. 201-210
-
-
Zheng, J.1
Hu, M.2
|