-
1
-
-
0030384775
-
Techniques for data hiding
-
Bender, W., Gruhl, D., Morimoto, N., Lu, A., 1996. Techniques for data hiding. IBM Syst. J. 35 (3 & 4), 313-336.
-
(1996)
IBM Syst. J.
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
2
-
-
0030388357
-
Image watermarking using DCT domain constraints
-
16-19 September 1996
-
Bors, A.G., Pitas, I.,1996. Image watermarking using DCT domain constraints. In: Proc. Internat. Conf. on Image Processing, vol. 3, 16-19 September 1996, pp. 231-234.
-
(1996)
Proc. Internat. Conf. on Image Processing
, vol.3
, pp. 231-234
-
-
Bors, A.G.1
Pitas, I.2
-
3
-
-
84863688391
-
An information theoretic approach to design of robust digital watermarking systems
-
Phoenix, AZ, March 1999
-
Chen, B., Wornell, G.W., 1999a. An information theoretic approach to design of robust digital watermarking systems. In: Proc. Intenat. Conf. on Acoustics, Speech and Signal Proceeding (ICASSP), Phoenix, AZ, March 1999.
-
(1999)
Proc. Intenat. Conf. on Acoustics, Speech and Signal Proceeding (ICASSP)
-
-
Chen, B.1
Wornell, G.W.2
-
4
-
-
0033344122
-
Provably robust digital watermark
-
Boston, MA, USA, September 1999
-
Chen, B., Wornell, G.W., 1999b. Provably robust digital Watermark. In: Proc. SPIE: Multimedia Systems and Applications, Boston, MA, USA, vol. 3845, September 1999, pp. 43-54.
-
(1999)
Proc. SPIE: Multimedia Systems and Applications
, vol.3845
, pp. 43-54
-
-
Chen, B.1
Wornell, G.W.2
-
5
-
-
0033346879
-
Digital watermarking using inter-block correlation
-
24-28 October 1999
-
Choi, Y., Aizawa, I., 1999. Digital watermarking using inter-block correlation. In: Proc. Internat. Conf. on Image Processing, vol. 2, 24-28 October 1999, pp. 216-220.
-
(1999)
Proc. Internat. Conf. on Image Processing
, vol.2
, pp. 216-220
-
-
Choi, Y.1
Aizawa, I.2
-
6
-
-
5644291899
-
A robust blind watermarking scheme based on distributed source coding principles
-
San Jose
-
Chou, J., Pradhan, S., Ramchandran, K., 2000. A robust blind watermarking scheme based on distributed source coding principles. In: Proc. SPIE, San Jose.
-
(2000)
Proc. SPIE
-
-
Chou, J.1
Pradhan, S.2
Ramchandran, K.3
-
7
-
-
0020752342
-
Writing on dirty paper
-
Costa, M.H.M., 1983. Writing on dirty paper. IEEE Trans. Inform. Theory 29 (3), 439-441.
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, Issue.3
, pp. 439-441
-
-
Costa, M.H.M.1
-
8
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T., 1997. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6 (12), 1673-1687.
-
(1997)
IEEE Trans. Image Process.
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
9
-
-
0034445067
-
Combining visual and detection models in spread-spectrum watermarking
-
Donescu, I., Nguyen, E., 2000. Combining visual and detection models in spread-spectrum watermarking. In: Proc. 2000 Internat. Conf. on Image Processing, vol. 3, pp. 686-689.
-
(2000)
Proc. 2000 Internat. Conf. on Image Processing
, vol.3
, pp. 686-689
-
-
Donescu, I.1
Nguyen, E.2
-
10
-
-
0034757958
-
Performance of a practical blind watermarking scheme
-
January 2001, III San Jose, CA
-
Eggers, J., Su, J.K., 2001. Performance of a practical blind watermarking scheme. In: Proc. SPIE Security and Watermarking of Multimedia Contents, vol. 4314, January 2001, III San Jose, CA.
-
(2001)
Proc. SPIE Security and Watermarking of Multimedia Contents
, vol.4314
-
-
Eggers, J.1
Su, J.K.2
-
11
-
-
0013138808
-
Dynamic traitor tracing
-
Fiat, A., Tassa, T., 2001. Dynamic traitor tracing. Cryptology J. 14, 211-223.
-
(2001)
Cryptology J.
, vol.14
, pp. 211-223
-
-
Fiat, A.1
Tassa, T.2
-
12
-
-
0032292847
-
Image watermarking for tamper detection
-
4-7 October 1998
-
Fridrich, J., 1998. Image watermarking for tamper detection. In: Proc. Internat. Conf. on Image Processing, vol. 2, 4-7 October 1998, pp. 404-408.
-
(1998)
Proc. Internat. Conf. on Image Processing
, vol.2
, pp. 404-408
-
-
Fridrich, J.1
-
13
-
-
0033338068
-
Digital watermarking of images and video using direct sequence spread spectrum techniques
-
George, M., Chouinard, J.V., Georganas, N., 1999. Digital watermarking of images and video using direct sequence spread spectrum techniques. IEEE Can. Conf. Electrical Comput. Eng. 1 (9-12), 116-121.
-
(1999)
IEEE Can. Conf. Electrical Comput. Eng.
, vol.1
, Issue.9-12
, pp. 116-121
-
-
George, M.1
Chouinard, J.V.2
Georganas, N.3
-
14
-
-
0025465985
-
DCT coding for motion video storage using adaptive arithmetic coding
-
Gonzales, C.A., Allman, L., Mccarthy, T., Wendt, P., 1990. DCT coding for motion video storage using adaptive arithmetic coding. Signal Processing: Image Comm. 2 (2).
-
(1990)
Signal Processing: Image Comm.
, vol.2
, Issue.2
-
-
Gonzales, C.A.1
Allman, L.2
McCarthy, T.3
Wendt, P.4
-
15
-
-
0036401897
-
Digital image-in-image watermarking for copyright protection of satellite images using the fast Hadamard transform
-
Ho, A., Shen, J., Soon, H.T., Kot, A..C., 2002. Digital image-in-image watermarking for copyright protection of satellite images using the fast Hadamard transform. IEEE Internat. Geoscience and Remote Sensing Symp. 6, 3311-3313.
-
(2002)
IEEE Internat. Geoscience and Remote Sensing Symp.
, vol.6
, pp. 3311-3313
-
-
Ho, A.1
Shen, J.2
Soon, H.T.3
Kot, A.C.4
-
16
-
-
4544313364
-
Embedding strategy for image watermarking in DCT domain
-
Huang, J., Shi Y.Q., 1999. Embedding strategy for image watermarking in DCT domain. In: 4th optoelectronics Comm. Conf., vol. 2, pp. 981-984.
-
(1999)
4th Optoelectronics Comm. Conf.
, vol.2
, pp. 981-984
-
-
Huang, J.1
Shi, Y.Q.2
-
17
-
-
84904224992
-
Steganalysis of images created using current steganography software
-
Aucsmith, D. (Ed.). Springer-Verlag, Berlin, Germany
-
Johnson, N.F., Jajodia, S., 1998. Steganalysis of images created using current steganography software. In: Aucsmith, D. (Ed.), Information Hiding: 2nd Internat. Workshop (Lecture Notes in Computer Science), vol. 1525. Springer-Verlag, Berlin, Germany, pp. 273-289.
-
(1998)
Information Hiding: 2nd Internat. Workshop (Lecture Notes in Computer Science)
, vol.1525
, pp. 273-289
-
-
Johnson, N.F.1
Jajodia, S.2
-
18
-
-
0033352629
-
An image watermarking scheme with hidden Signatures
-
Kim, W.-G., Lee, J.C., Lee, W.D., 1999. An image watermarking scheme with hidden Signatures. In: Proc. 1999 Internat. Conf. on Image Processing, vol. 2, pp. 206-210.
-
(1999)
Proc. 1999 Internat. Conf. on Image Processing
, vol.2
, pp. 206-210
-
-
Kim, W.-G.1
Lee, J.C.2
Lee, W.D.3
-
19
-
-
0032653659
-
Watermarking resisting to translation, rotation, and scaling
-
Boston, MA
-
Kutter, M., 1998. Watermarking resisting to translation, rotation, and scaling. In: Proc. SPIE Multimedia Systems and Applications, vol. 3528, Boston, MA, pp. 423-431.
-
(1998)
Proc. SPIE Multimedia Systems and Applications
, vol.3528
, pp. 423-431
-
-
Kutter, M.1
-
20
-
-
0035127750
-
Optimal differential energy watermarking of DCT encoded images and video
-
Langelaar, G.C., Lagendijk, R.L., 2001. Optimal differential energy watermarking of DCT encoded images and video. IEEE Trans. Image Process. 10 (1), 148-158.
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.1
, pp. 148-158
-
-
Langelaar, G.C.1
Lagendijk, R.L.2
-
22
-
-
0036452706
-
Nonadditive Gaussian watermarking and its application to wavelet-based watermarking
-
Moulin, P., Ivanovic, A., 2002. Nonadditive Gaussian watermarking and its application to wavelet-based watermarking. Image Process. 3, 473-476.
-
(2002)
Image Process.
, vol.3
, pp. 473-476
-
-
Moulin, P.1
Ivanovic, A.2
-
23
-
-
0030384775
-
Techniques for data hiding
-
Nender, W., Gruhl, D., Morimoto, N., Lu, A., 1996. Techniques for data hiding. IBM Syst. J., 313-336.
-
(1996)
IBM Syst. J.
, pp. 313-336
-
-
Nender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
24
-
-
0036995411
-
Effect of channel coding on the performance of spatial watermarking for copyright protection
-
October 2002
-
Rughooputh, H.C.S., Bangaleea, R., 2002. Effect of channel coding on the performance of spatial watermarking for copyright protection. 6th IEEE AFRICON Africon Conf. in Africa, vol. 1, October 2002, pp. 149-153.
-
(2002)
6th IEEE AFRICON Africon Conf. in Africa
, vol.1
, pp. 149-153
-
-
Rughooputh, H.C.S.1
Bangaleea, R.2
-
25
-
-
0031365052
-
Data hiding for video-in-video
-
Swanson, M.D., Bin, Z., Tewfik, A.H., 1997. Data hiding for video-in-video. ICIP 97, 676-678.
-
(1997)
ICIP
, vol.97
, pp. 676-678
-
-
Swanson, M.D.1
Bin, Z.2
Tewfik, A.H.3
-
26
-
-
0034443405
-
Robust image watermark with wavelet transform and spread spectrum techniques
-
Wang Y.-P., Chen, M.-J., Cheng, P.-Y., 2000. Robust image watermark with wavelet transform and spread spectrum techniques. Thirty-Fourth Asilomar Conf. on Signals, Systems and Computers, vol. 2, pp. 1846-1850.
-
(2000)
Thirty-fourth Asilomar Conf. on Signals, Systems and Computers
, vol.2
, pp. 1846-1850
-
-
Wang, Y.-P.1
Chen, M.-J.2
Cheng, P.-Y.3
-
27
-
-
0031385945
-
On resolving rightful ownership of digital images by invisible watermark
-
Santa Barbara, CA, October 1997
-
Zeng, W., Liu, B., 1997. On resolving rightful ownership of digital images by invisible watermark. In: Proc. IEEE Conf. Image Processing. vol.1, Santa Barbara, CA, October 1997, pp. 552-555.
-
(1997)
Proc. IEEE Conf. Image Processing
, vol.1
, pp. 552-555
-
-
Zeng, W.1
Liu, B.2
|