-
1
-
-
21844463487
-
Watermarking security: Theory and practice
-
Oct
-
F. Cayre, C. Fontaine, and T. Furon, "Watermarking security: Theory and practice," IEEE Trans. Signal Pmcess., vol. 53, no. 10, pp. 3976-3987, Oct. 2005.
-
(2005)
IEEE Trans. Signal Pmcess
, vol.53
, Issue.10
, pp. 3976-3987
-
-
Cayre, F.1
Fontaine, C.2
Furon, T.3
-
2
-
-
33746628959
-
Fundamentals of data hiding security and their application to spread-spectrum, analysis
-
7th Information Hiding Workshop, IH05, Barcelona, Spain, Springer Berlin, Germany, Jun
-
P. Comesaña, L. Pérez-Freiré, and F. Pérez-González, "Fundamentals of data hiding security and their application to spread-spectrum, analysis," 7th Information Hiding Workshop, IH05, ser. Lect. Notes Comput. Sci., vol. 3727, Barcelona, Spain, Springer Berlin, Germany, Jun. 2005, pp. 146-160.
-
(2005)
ser. Lect. Notes Comput. Sci
, vol.3727
, pp. 146-160
-
-
Comesaña, P.1
Pérez-Freiré, L.2
Pérez-González, F.3
-
3
-
-
56749135129
-
-
L. Pérez-Freiré, P. Comesaña, J. R. Troncoso-Pastoriza, and F. Pérez-González, Watermarking security: A survey, Trans. Data Hiding Multimedia Security I, 4300, pp. 4.1-72, Oct. 2006.
-
L. Pérez-Freiré, P. Comesaña, J. R. Troncoso-Pastoriza, and F. Pérez-González, "Watermarking security: A survey," Trans. Data Hiding Multimedia Security I, vol. 4300, pp. 4.1-72, Oct. 2006.
-
-
-
-
4
-
-
0035790994
-
Considerations on watermarking security
-
Cannes, France, Oct
-
T. Kalker, "Considerations on watermarking security," in Proc. 4th IEEE Workshop on Multimedia Signal Processing, Cannes, France, Oct. 2001, pp. 201-206.
-
(2001)
Proc. 4th IEEE Workshop on Multimedia Signal Processing
, pp. 201-206
-
-
Kalker, T.1
-
5
-
-
28944435491
-
Data hiding codes
-
Dec
-
P. Moulin and R. Koetter, "Data hiding codes," Proc. IEEE, vol. 93, no. 12, pp. 2083-2126, Dec. 2005.
-
(2005)
Proc. IEEE
, vol.93
, Issue.12
, pp. 2083-2126
-
-
Moulin, P.1
Koetter, R.2
-
6
-
-
0020752342
-
Writing on dirty paper
-
May
-
M. H. M. Costa, "Writing on dirty paper," IEEE Trans. Inf. Theory, vol. IT-29, no. 3, pp. 439-441, May 1983.
-
(1983)
IEEE Trans. Inf. Theory
, vol.IT-29
, Issue.3
, pp. 439-441
-
-
Costa, M.H.M.1
-
7
-
-
5144221013
-
Achieving (1/2) log(1 + SNR) over the additive white gaussian noise channel with lattice encoding and decoding
-
Oct
-
U. Erez and R. Zamir, "Achieving (1/2) log(1 + SNR) over the additive white gaussian noise channel with lattice encoding and decoding," IEEE Trans. Inf. Theory, vol. 50, no. 10, pp. 2293-2314, Oct. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.10
, pp. 2293-2314
-
-
Erez, U.1
Zamir, R.2
-
8
-
-
33845637704
-
Security of lattice-based data hiding against the known message attack
-
Dec
-
L. Pérez-Freiré, F. Pérez-González, T. Furon, and P. Comesaña, "Security of lattice-based data hiding against the known message attack," IEEE Trans. Inf. Forensics Security, vol. 1, no. 4, pp. 421-439, Dec. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.4
, pp. 421-439
-
-
Pérez-Freiré, L.1
Pérez-González, F.2
Furon, T.3
Comesaña, P.4
-
9
-
-
49949104907
-
Exploiting security holes in lattice data hiding
-
Saint Malo, France, Springer, Berlin, Germany, Jun
-
L. Pérez-Freiré and F. Pérez-González, "Exploiting security holes in lattice data hiding," 9th Information Hiding Workshop, IH07 ser. Lect. Notes Comput. Sci., vol. 4567 Saint Malo, France, Springer, Berlin, Germany, Jun. 2008, pp. 159-173.
-
(2008)
9th Information Hiding Workshop, IH07 ser. Lect. Notes Comput. Sci
, vol.4567
, pp. 159-173
-
-
Pérez-Freiré, L.1
Pérez-González, F.2
-
11
-
-
0003217113
-
Sphere Packings, Lattices and Groups
-
3rd ed. New York: Springer-Verlag
-
J. H. Conway and N. J. A. Sloane, Sphere Packings, Lattices and Groups, ser. Comprehensive Studies in Mathematics, 3rd ed. New York: Springer-Verlag, 1999, vol. 290.
-
(1999)
ser. Comprehensive Studies in Mathematics
, vol.290
-
-
Conway, J.H.1
Sloane, N.J.A.2
-
12
-
-
0024717659
-
Multidimensional constellations - Part II: Voronoi constellations
-
Aug
-
G. D. Forney, "Multidimensional constellations - Part II: Voronoi constellations," IEEE J. Sel., Areas Commun., vol. 7, no. 6, pp. 941-958, Aug. 1989.
-
(1989)
IEEE J. Sel., Areas Commun
, vol.7
, Issue.6
, pp. 941-958
-
-
Forney, G.D.1
-
13
-
-
26844546304
-
Lattices which are good for (almost) everything
-
Oct
-
U. Erez, S. Litsyn, and R. Zamir, "Lattices which are good for (almost) everything," IEEE Trans. Inf. Theory, vol. 51, no. 10, pp. 3401-3416, Oct. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.10
, pp. 3401-3416
-
-
Erez, U.1
Litsyn, S.2
Zamir, R.3
-
14
-
-
0033265060
-
On the existence of similar sublattices
-
J. H. Conway, E. M. Rains, and N. J. A. Sloane, "On the existence of similar sublattices," Can. J. Math., vol. 51, pp. 1300-1306, 1999.
-
(1999)
Can. J. Math
, vol.51
, pp. 1300-1306
-
-
Conway, J.H.1
Rains, E.M.2
Sloane, N.J.A.3
-
15
-
-
0003185688
-
La cryptographie militaire
-
Jan
-
A. Kerckhoffs, "La cryptographie militaire," J. Sci. Mil., vol. 9, pp. 5-38, Jan. 1883.
-
(1883)
J. Sci. Mil
, vol.9
, pp. 5-38
-
-
Kerckhoffs, A.1
-
16
-
-
0037737759
-
Scalar Costa scheme for information embedding
-
Apr, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery
-
J. J. Eggers, R. Bäuml, R. Tzschoppe, and B. Girod, "Scalar Costa scheme for information embedding," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1003-1019, Apr. 2003, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery.
-
(2003)
IEEE Trans. Signal Process
, vol.51
, Issue.4
, pp. 1003-1019
-
-
Eggers, J.J.1
Bäuml, R.2
Tzschoppe, R.3
Girod, B.4
-
17
-
-
31344468102
-
On distortion-compensated dither modulation data-hiding with repetition coding
-
Feb
-
P. Comesaña, F. Pérez-González, and F. Balado, "On distortion-compensated dither modulation data-hiding with repetition coding," IEEE Trans. Signal Process., vol. 54, no. 2, pp. 585-600, Feb. 2006.
-
(2006)
IEEE Trans. Signal Process
, vol.54
, Issue.2
, pp. 585-600
-
-
Comesaña, P.1
Pérez-González, F.2
Balado, F.3
-
18
-
-
0004056285
-
-
Upper Saddle River, NJ: Prentice-Hall
-
X. Huang, A. Acero, and H.-W. Hon, Spoken Language Processing: A Guide to Theory, Algorithm and System Development. Upper Saddle River, NJ: Prentice-Hall, 2001.
-
(2001)
Spoken Language Processing: A Guide to Theory, Algorithm and System Development
-
-
Huang, X.1
Acero, A.2
Hon, H.-W.3
-
19
-
-
0027648997
-
An optimal volume ellipsoid algorithm for parameter set estimation
-
Aug
-
M. F. Cheung, S. Yurkovich, and K. M. Passino, "An optimal volume ellipsoid algorithm for parameter set estimation," IEEE Trans. Autom. Control, vol. 38, no. 8, pp. 1292-1296, Aug. 1993.
-
(1993)
IEEE Trans. Autom. Control
, vol.38
, Issue.8
, pp. 1292-1296
-
-
Cheung, M.F.1
Yurkovich, S.2
Passino, K.M.3
-
20
-
-
0003655416
-
-
3rd ed. Englewood Cliffs, NJ: Prentice-Hall
-
H. L. Royden, Real Analysis, 3rd ed. Englewood Cliffs, NJ: Prentice-Hall, 1988.
-
(1988)
Real Analysis
-
-
Royden, H.L.1
|