-
1
-
-
28944435491
-
Data hiding codes
-
Dec
-
P. Moulin and R. Koetter, "Data hiding codes," Proc. IEEE, vol. 93, no. 12, pp. 2083-2126, Dec. 2005.
-
(2005)
Proc. IEEE
, vol.93
, Issue.12
, pp. 2083-2126
-
-
Moulin, P.1
Koetter, R.2
-
2
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Dec
-
I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Pmcess., vol. 6, no. 12, pp. 1837-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Pmcess
, vol.6
, Issue.12
, pp. 1837-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
3
-
-
33746649585
-
Media hash-dependent image watermarking resilient against both geometric attacks and estimate attacks based on false positive-oriented detection
-
Aug
-
C.-S. Lu, S.-W. Sun, C.-Y. Hsu, and P.-C. Chang, "Media hash-dependent image watermarking resilient against both geometric attacks and estimate attacks based on false positive-oriented detection.," IEEE Trans. Multimedia, vol. 8, no. 4, pp. 668-685, Aug. 2006.
-
(2006)
IEEE Trans. Multimedia
, vol.8
, Issue.4
, pp. 668-685
-
-
Lu, C.-S.1
Sun, S.-W.2
Hsu, C.-Y.3
Chang, P.-C.4
-
4
-
-
0038156437
-
Data hiding in images and video: Part I: fundamental issues and solutions
-
June
-
M. Wu and B. Liu, "Data hiding in images and video: Part I: fundamental issues and solutions," IEEE Trans. Image Process., vol. 12, no. 6, pp. 685-695, June 2003.
-
(2003)
IEEE Trans. Image Process
, vol.12
, Issue.6
, pp. 685-695
-
-
Wu, M.1
Liu, B.2
-
5
-
-
0032072279
-
Image-adaptive watermarking using visual models
-
C. I. Podilchuk and W. Zeng, "Image-adaptive watermarking using visual models," IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 525-539, 1998.
-
(1998)
IEEE J. Sel. Areas Commun
, vol.16
, Issue.4
, pp. 525-539
-
-
Podilchuk, C.I.1
Zeng, W.2
-
6
-
-
0035335388
-
Geometric distortion resilient public watermarking for images
-
May
-
C.-Y. Lin, M. Wu, Y. M. Lui, J. Bloom, M. Miller, and I. Cox, "Geometric distortion resilient public watermarking for images," IEEE Trans. Image Process., vol. 10, no. 5, pp. 767-782, May 2001.
-
(2001)
IEEE Trans. Image Process
, vol.10
, Issue.5
, pp. 767-782
-
-
Lin, C.-Y.1
Wu, M.2
Lui, Y.M.3
Bloom, J.4
Miller, M.5
Cox, I.6
-
7
-
-
0036817886
-
Reliable information bit hiding
-
J. Huang and Y. Q. Shi, "Reliable information bit hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 12, no. 10, pp. 916-920, 2002.
-
(2002)
IEEE Trans. Circuits Syst. Video Technol
, vol.12
, Issue.10
, pp. 916-920
-
-
Huang, J.1
Shi, Y.Q.2
-
8
-
-
0035485860
-
Diversity and attack characterization for improved robust watermarking
-
D. Kundur and D. Hatzinakos, "Diversity and attack characterization for improved robust watermarking," IEEE Trans. Signal Process., vol. 49, no. 10, pp. 2383-2396, 2001.
-
(2001)
IEEE Trans. Signal Process
, vol.49
, Issue.10
, pp. 2383-2396
-
-
Kundur, D.1
Hatzinakos, D.2
-
9
-
-
0035333687
-
-
B. Chen, G., and W. Wornell, Quantization index modulation: A class of provably good methods for digital watermarking and information embedding, IEEE Trans. Inform. Theory, 47, no. 4, pp. 1423-1443, May 2001.
-
B. Chen, G., and W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inform. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
-
-
-
-
10
-
-
20444458008
-
Estimating and undoing rotation for print-scan resilient data hiding
-
Singapore
-
K. Solanki, U. Madhow, B. S. Manjunth, and S. Chandrasekaran, "Estimating and undoing rotation for print-scan resilient data hiding," in 2004 IEEE Int. Conf. Image Processing (ICIP), Singapore, 2004, pp. 39-42.
-
(2004)
2004 IEEE Int. Conf. Image Processing (ICIP)
, pp. 39-42
-
-
Solanki, K.1
Madhow, U.2
Manjunth, B.S.3
Chandrasekaran, S.4
-
11
-
-
20444499348
-
A RST resilient object-based video watermarking scheme
-
Singapore
-
D. He and Q. Sun, "A RST resilient object-based video watermarking scheme," in 2004 IEEE Int. Conf. Image Processing (ICIP), Singapore, 2004, pp. 737-740.
-
(2004)
2004 IEEE Int. Conf. Image Processing (ICIP)
, pp. 737-740
-
-
He, D.1
Sun, Q.2
-
12
-
-
8844241476
-
Statistical amplitude scale estimation for quantization-based watermarking
-
San Jose, CA: SPIE, Jan
-
I. D. Shterev, R. L. L. Lagendijk, and R. Heusdens, "Statistical amplitude scale estimation for quantization-based watermarking," in SPIE Security, Steganography, and Watermarking of Multimedia Contents VI. San Jose, CA: SPIE, Jan. 2004, vol. 5306.
-
(2004)
SPIE Security, Steganography, and Watermarking of Multimedia Contents VI
, vol.5306
-
-
Shterev, I.D.1
Lagendijk, R.L.L.2
Heusdens, R.3
-
13
-
-
33645697056
-
Scale estimation in two-band filter attacks on QIM watermark
-
San Jose, CA: SPIE, Jan
-
J. Wang, I. D. Shterev, and R. L. L. Lagendijk, "Scale estimation in two-band filter attacks on QIM watermark," in SPIE Security. Steganography, and Watermarking of Multimedia Contents VI. San Jose, CA: SPIE, Jan. 2006, vol. 6072, pp. B1-B10.
-
(2006)
SPIE Security. Steganography, and Watermarking of Multimedia Contents VI
, vol.6072
-
-
Wang, J.1
Shterev, I.D.2
Lagendijk, R.L.L.3
-
14
-
-
0141638482
-
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression
-
Aug
-
X. Kang, J. Huang, Y. Q. Shi, and Y. Lin, "A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 776-786, Aug. 2003.
-
(2003)
IEEE Trans. Circuits Syst. Video Technol
, vol.13
, Issue.8
, pp. 776-786
-
-
Kang, X.1
Huang, J.2
Shi, Y.Q.3
Lin, Y.4
-
15
-
-
0042823352
-
Secure hybrid robust watermarking against tampering and copy attack
-
F. Deguillaume, S. Voloshynovskiy, and T. Pun, "Secure hybrid robust watermarking against tampering and copy attack," Signal Process., vol. 83, pp. 2133-2170, 2003.
-
(2003)
Signal Process
, vol.83
, pp. 2133-2170
-
-
Deguillaume, F.1
Voloshynovskiy, S.2
Pun, T.3
-
16
-
-
33749572568
-
An image watermarking algorithm robust to geometric distortion
-
Proc. of 2002 Int. Workshop on Digital Watermarking IWDW2002, Seoul, Korea
-
X. Kang, J. Huang, and Y. Q. Shi, "An image watermarking algorithm robust to geometric distortion," in Proc. of 2002 Int. Workshop on Digital Watermarking (IWDW2002), Lecture Notes in Computer Science, Seoul, Korea, 2002, vol. 2613, pp. 212-223.
-
(2002)
Lecture Notes in Computer Science
, vol.2613
, pp. 212-223
-
-
Kang, X.1
Huang, J.2
Shi, Y.Q.3
-
17
-
-
18844450187
-
Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting
-
May
-
H. V. Zhao, M. Wu, Z. J. Wang, and K. J. R. Liu, "Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting.," IEEE Trans. Image Process., vol. 14, no. 5, pp. 646-661, May 2005.
-
(2005)
IEEE Trans. Image Process
, vol.14
, Issue.5
, pp. 646-661
-
-
Zhao, H.V.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
-
18
-
-
85032751954
-
Watermarking schemes evaluation
-
Sept
-
F. A. P. Petitcolas, "Watermarking schemes evaluation," IEEE Signal Process. Mag., vol. 17, no. 5, pp. 58-64, Sept. 2000.
-
(2000)
IEEE Signal Process. Mag
, vol.17
, Issue.5
, pp. 58-64
-
-
Petitcolas, F.A.P.1
-
19
-
-
0034780384
-
Optimal adaptive diversity watermarking with channel state estimation
-
San Jose, CA: SPIE, Jan. 22-25
-
S. Voloshynovskiy, F. Deguillaume, S. Pereira, and T. Pun, "Optimal adaptive diversity watermarking with channel state estimation," in SPIE: Security and Watermarking of Multimedia Content III. San Jose, CA: SPIE, Jan. 22-25, 2001, vol. 4314, pp. 673-685.
-
(2001)
SPIE: Security and Watermarking of Multimedia Content III
, vol.4314
, pp. 673-685
-
-
Voloshynovskiy, S.1
Deguillaume, F.2
Pereira, S.3
Pun, T.4
-
20
-
-
0036601386
-
A new two-dimensional interleaving technique using successive packing
-
June
-
Y. Q. Shi and X. M. Zhang, "A new two-dimensional interleaving technique using successive packing," IEEE Trans. Circuits Syst. I: Fund. Theory Applicat., vol. 49, no. 6, pp. 779-789, June 2002.
-
(2002)
IEEE Trans. Circuits Syst. I: Fund. Theory Applicat
, vol.49
, Issue.6
, pp. 779-789
-
-
Shi, Y.Q.1
Zhang, X.M.2
-
21
-
-
54949127184
-
A digital image watermarking system: Modeling, performance analysis, and application
-
P.-C. Chen, Y.-S. Chen, and W.-H. Hsu, "A digital image watermarking system: Modeling, performance analysis, and application," J. Comput., vol. 13, no. 1, pp. 1-10, 2001.
-
(2001)
J. Comput
, vol.13
, Issue.1
, pp. 1-10
-
-
Chen, P.-C.1
Chen, Y.-S.2
Hsu, W.-H.3
-
22
-
-
0030257652
-
Near optimum error correcting coding and decoding: Turbo-codes
-
Oct
-
C. Berrou and A. Glavieux, "Near optimum error correcting coding and decoding: turbo-codes," IEEE Trans. Commun., vol. 44, no. 10, pp. 1261-1271, Oct. 1996.
-
(1996)
IEEE Trans. Commun
, vol.44
, Issue.10
, pp. 1261-1271
-
-
Berrou, C.1
Glavieux, A.2
-
23
-
-
0003806103
-
Multimedia data hiding,
-
Ph.D. thesis, Princeton Univ, Princeton, NJ, Jun
-
M. Wu, "Multimedia data hiding," Ph.D. thesis, Princeton Univ, Princeton, NJ, Jun. 2001.
-
(2001)
-
-
Wu, M.1
|