-
1
-
-
51349164576
-
Optimum watermark design by vector space projections
-
O. Altun, G. Sharma, and M. Bocko, "Optimum watermark design by vector space projections," in Proc. Int. Conf. Image Processing, 2006, pp. 1413-1416.
-
(2006)
Proc. Int. Conf. Image Processing
, pp. 1413-1416
-
-
Altun, O.1
Sharma, G.2
Bocko, M.3
-
2
-
-
53349159971
-
-
2nd ed. San Francisco, CA: Morgan Kaufmann
-
I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, 2nd ed. San Francisco, CA: Morgan Kaufmann, 2007.
-
(2007)
Digital Watermarking and Steganography
-
-
Cox, I.1
Miller, M.2
Bloom, J.3
Fridrich, J.4
Kalker, T.5
-
3
-
-
0035391983
-
Digital watermarking: Algorithms and applications
-
Jul
-
C. Podilchuk and E. Delp, "Digital watermarking: Algorithms and applications," IEEE Signal Process. Mag., vol. 18, no. 4, pp. 33-46, Jul. 2001.
-
(2001)
IEEE Signal Process. Mag
, vol.18
, Issue.4
, pp. 33-46
-
-
Podilchuk, C.1
Delp, E.2
-
4
-
-
0034266804
-
Watermarking digital image and video data
-
Sep
-
G. Langelaar, I. Setyawan, and R. Lagendijk, "Watermarking digital image and video data," IEEE Signal Process. Mag., vol. 17, no. 5, pp. 20-46, Sep. 2000.
-
(2000)
IEEE Signal Process. Mag
, vol.17
, Issue.5
, pp. 20-46
-
-
Langelaar, G.1
Setyawan, I.2
Lagendijk, R.3
-
5
-
-
85032751036
-
Data hiding for fighting piracy
-
Mar
-
M. Barni and F. Bartolini, "Data hiding for fighting piracy," IEEE Signal Process. Mag., vol. 21, no. 2, pp. 28-29, Mar. 2004.
-
(2004)
IEEE Signal Process. Mag
, vol.21
, Issue.2
, pp. 28-29
-
-
Barni, M.1
Bartolini, F.2
-
6
-
-
33645152302
-
Lossless watermarking for image authentication: A new framework and an implementation
-
Apr
-
M. U. Celik, G. Sharma, and A. M. Tekalp, "Lossless watermarking for image authentication: A new framework and an implementation," IEEE Trans. Image Process., vol. 15, no. 4, pp. 1042-1049, Apr. 2006.
-
(2006)
IEEE Trans. Image Process
, vol.15
, Issue.4
, pp. 1042-1049
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
-
7
-
-
84962777665
-
Automatic Telecasting or Radio Broadcasting Monitoring System,
-
U.S. patent 3,760,275, 1973
-
T. Ohsawa and M. Karita, "Automatic Telecasting or Radio Broadcasting Monitoring System," U.S. patent (3,760,275), 1973.
-
-
-
Ohsawa, T.1
Karita, M.2
-
8
-
-
85032751604
-
Collusion-resistant fingerprinting for multimedia
-
Feb
-
M. Wu, W. Trappe, Z. Wang, and K. Liu, "Collusion-resistant fingerprinting for multimedia," IEEE Signal Process. Mag., vol. 21, no. 2, pp. 15-27, Feb. 2004.
-
(2004)
IEEE Signal Process. Mag
, vol.21
, Issue.2
, pp. 15-27
-
-
Wu, M.1
Trappe, W.2
Wang, Z.3
Liu, K.4
-
9
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Dec
-
I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process. vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Process
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
10
-
-
9744279131
-
Robust image-adaptive data hiding based on erasure and error correction
-
Dec
-
K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, "Robust image-adaptive data hiding based on erasure and error correction," IEEE Trans. Image Process., vol. 13, no. 12, pp. 1627-1639, Dec. 2004.
-
(2004)
IEEE Trans. Image Process
, vol.13
, Issue.12
, pp. 1627-1639
-
-
Solanki, K.1
Jacobsen, N.2
Madhow, U.3
Manjunath, B.S.4
Chandrasekaran, S.5
-
11
-
-
0036447872
-
Dirty-paper trellis codes for watermarking
-
M. L. Miller, G. J. Doërr, and I. J. Cox, "Dirty-paper trellis codes for watermarking," in Proc. Int. Conf. Image Processing, 2002, pp. 129-132.
-
(2002)
Proc. Int. Conf. Image Processing
, pp. 129-132
-
-
Miller, M.L.1
Doërr, G.J.2
Cox, I.J.3
-
12
-
-
33645015900
-
Wet paper codes with improved embedding efficiency
-
Jan
-
J. Fridrich, M. Goljan, and D. Soukal, "Wet paper codes with improved embedding efficiency," IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 102-110, Jan. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.1
, pp. 102-110
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
13
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
May
-
B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
14
-
-
0035368661
-
Optimal transform domain watermark embedding via linear programming
-
Jun
-
S. Pereira, S. Voloshynoskiy, and T. Pun, "Optimal transform domain watermark embedding via linear programming," Signal Process., vol. 81, no. 6, pp. 1251-1260, Jun. 2001.
-
(2001)
Signal Process
, vol.81
, Issue.6
, pp. 1251-1260
-
-
Pereira, S.1
Voloshynoskiy, S.2
Pun, T.3
-
15
-
-
21844449102
-
Optimization algorithms for quantizing randomized statistics of image regions
-
presented at the, Oct
-
M. K. Mihcak, R. Venkatesan, and M. Kesal, "Optimization algorithms for quantizing randomized statistics of image regions," presented at the 40th Annu. Allerton Conf. Communication, Control and Computing, Oct. 2002.
-
(2002)
40th Annu. Allerton Conf. Communication, Control and Computing
-
-
Mihcak, M.K.1
Venkatesan, R.2
Kesal, M.3
-
16
-
-
0034441409
-
Informed embedding: Exploiting image and detector information during watermark insertion
-
presented at the
-
M. L. Miller, I. J. Cox, and J. A. Bloom, "Informed embedding: Exploiting image and detector information during watermark insertion," presented at the Int. Conf. Image Processing, 2000.
-
(2000)
Int. Conf. Image Processing
-
-
Miller, M.L.1
Cox, I.J.2
Bloom, J.A.3
-
17
-
-
33845635183
-
A set theoretic framework for watermarking and its application to semifragile tamper detection
-
Dec
-
O. Altun, G. Sharma, M. Celik, and M. Bocko, "A set theoretic framework for watermarking and its application to semifragile tamper detection," IEEE Trans. Inf. Forensics Security, vol. 1, no. 4, pp. 479-492, Dec. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.4
, pp. 479-492
-
-
Altun, O.1
Sharma, G.2
Celik, M.3
Bocko, M.4
-
18
-
-
33749619545
-
Semifragile hierarchical watermarking in a set theoretic framework
-
O. Altun, G. Sharma, M. Celik, and M. Bocko, "Semifragile hierarchical watermarking in a set theoretic framework," in Proc. Int. Conf. Image Processing, 2005, vol. 1, pp. 1001-1004.
-
(2005)
Proc. Int. Conf. Image Processing
, vol.1
, pp. 1001-1004
-
-
Altun, O.1
Sharma, G.2
Celik, M.3
Bocko, M.4
-
19
-
-
0004055894
-
-
Cambridge, U.K, Cambridge Univ. Press
-
S. Boyd, Convex Optimization. Cambridge, U.K.: Cambridge Univ. Press.
-
Convex Optimization
-
-
Boyd, S.1
-
21
-
-
0021405936
-
The feasible solution in signal restoration
-
Apr
-
H. J. Trussell and M. R. Civanlar, "The feasible solution in signal restoration," IEEE Trans. Acoust. Speech Signal Process., vol. ASSP-32, no. 4, pp. 201-212, Apr. 1984.
-
(1984)
IEEE Trans. Acoust. Speech Signal Process
, vol.ASSP-32
, Issue.4
, pp. 201-212
-
-
Trussell, H.J.1
Civanlar, M.R.2
-
22
-
-
0027541192
-
The foundations of set theoretic estimation
-
Feb
-
P. L. Combettes, "The foundations of set theoretic estimation," Proc. IEEE, vol. 81, no. 2, pp. 182-208, Feb. 1993.
-
(1993)
Proc. IEEE
, vol.81
, Issue.2
, pp. 182-208
-
-
Combettes, P.L.1
-
23
-
-
0029341202
-
Projection-based spatially adaptive reconstruction of block transform compressed images
-
Jul
-
Y. Yang, N. P. Galatsanos, and A. Katsaggelos, "Projection-based spatially adaptive reconstruction of block transform compressed images," IEEE Trans. Image Process., vol. 4, no. 7, pp. 896-908, Jul. 1995.
-
(1995)
IEEE Trans. Image Process
, vol.4
, Issue.7
, pp. 896-908
-
-
Yang, Y.1
Galatsanos, N.P.2
Katsaggelos, A.3
-
24
-
-
0011128924
-
Set theoretic estimation for problems in subtractive color
-
Oct
-
G. Sharma, "Set theoretic estimation for problems in subtractive color," Color Res. Appl., vol. 25, no. 4, pp. 333-348, Oct. 2000.
-
(2000)
Color Res. Appl
, vol.25
, Issue.4
, pp. 333-348
-
-
Sharma, G.1
-
25
-
-
0031358008
-
Set theoretic signal restoration using an error in variables criterion
-
Dec
-
G. Sharma and H. J. Trussell, "Set theoretic signal restoration using an error in variables criterion," IEEE Trans. Image Process., vol. 6, no. 12, pp. 1692-1697, Dec. 1997.
-
(1997)
IEEE Trans. Image Process
, vol.6
, Issue.12
, pp. 1692-1697
-
-
Sharma, G.1
Trussell, H.J.2
-
27
-
-
0016079335
-
The effects of a visual fidelity criterion on the encoding of images
-
Jul
-
J. L. Mannos and D. L. Sakrison, "The effects of a visual fidelity criterion on the encoding of images," IEEE Trans. Inf. Theory, vol. 20, no. 7, pp. 525-536, Jul. 1974.
-
(1974)
IEEE Trans. Inf. Theory
, vol.20
, Issue.7
, pp. 525-536
-
-
Mannos, J.L.1
Sakrison, D.L.2
-
28
-
-
85032752137
-
Theoretical foundations of transform coding
-
Sep
-
V. K. Goyal, "Theoretical foundations of transform coding," IEEE Signal Process. Mag., vol. 18, no. 9, pp. 9-21, Sep. 2001.
-
(2001)
IEEE Signal Process. Mag
, vol.18
, Issue.9
, pp. 9-21
-
-
Goyal, V.K.1
-
29
-
-
0035368661
-
Optimal transform domain watermark embedding via linear programming
-
S. Pereira, S. Voloshynoskiy, and T. Pun, "Optimal transform domain watermark embedding via linear programming," Signal Process., vol. 81, no. 6, pp. 1251-1260, 2001.
-
(2001)
Signal Process
, vol.81
, Issue.6
, pp. 1251-1260
-
-
Pereira, S.1
Voloshynoskiy, S.2
Pun, T.3
-
30
-
-
0001336448
-
The method of successive projection for finding a common point of convex sets
-
L. M. Bregman, "The method of successive projection for finding a common point of convex sets," Dokl. Akad. Nauk. SSSR, vol. 162, no. 3, pp. 688-692, 1965.
-
(1965)
Dokl. Akad. Nauk. SSSR
, vol.162
, Issue.3
, pp. 688-692
-
-
Bregman, L.M.1
-
31
-
-
0027541192
-
The foundations of set theoretic estimation
-
Feb
-
P. L. Combettes, "The foundations of set theoretic estimation," Proc. IEEE, vol. 81, no. 1, pp. 182-208, Feb. 1993.
-
(1993)
Proc. IEEE
, vol.81
, Issue.1
, pp. 182-208
-
-
Combettes, P.L.1
-
32
-
-
59649126623
-
-
Available
-
[Online]. Available: http://sipi.usc.edu/database/
-
-
-
-
33
-
-
33645686190
-
-
O. Altun, G. Sharma, and M. Bocko, C. A. Bouman and E. L. Miller, Eds., Multiple watermarking: A vector space projections approach, in Proc. SPIE: Computational Imaging IV, Jan. 2006, 6065, pp. 60650O1-60650O12.
-
O. Altun, G. Sharma, and M. Bocko, C. A. Bouman and E. L. Miller, Eds., "Multiple watermarking: A vector space projections approach," in Proc. SPIE: Computational Imaging IV, Jan. 2006, vol. 6065, pp. 60650O1-60650O12.
-
-
-
-
34
-
-
0037353686
-
Information-theoretic analysis of information hiding
-
Mar
-
P. Moulin and J. A. O'Sullivan, "Information-theoretic analysis of information hiding," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 563-593, Mar. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.3
, pp. 563-593
-
-
Moulin, P.1
O'Sullivan, J.A.2
-
35
-
-
0031230645
-
Model of visual contrast gain control and pattern masking
-
A. B. Watson and J. A. Solomon, "Model of visual contrast gain control and pattern masking," J. Opt. Soc. Amer., vol. 14, no. 19, pp. 2379-2391, 1994.
-
(1994)
J. Opt. Soc. Amer
, vol.14
, Issue.19
, pp. 2379-2391
-
-
Watson, A.B.1
Solomon, J.A.2
-
36
-
-
0002451017
-
A visual discrimination model for imaging system design and evaluation
-
E. Peli, Ed. Singapore: World Scientific
-
J. Lubin, "A visual discrimination model for imaging system design and evaluation," in Vision Models for Target Detection and Recognition E. Peli, Ed. Singapore: World Scientific, 1995, pp. 245-283.
-
(1995)
Vision Models for Target Detection and Recognition
, pp. 245-283
-
-
Lubin, J.1
-
37
-
-
84997701270
-
A visual model for optimizing the design of image processing algorithms
-
Austin, TX, Nov
-
S. Daly, "A visual model for optimizing the design of image processing algorithms," in Proc. IEEE Int. Conf. Image Processing, Austin, TX, Nov. 1994, vol. 2, pp. 16-20.
-
(1994)
Proc. IEEE Int. Conf. Image Processing
, vol.2
, pp. 16-20
-
-
Daly, S.1
-
38
-
-
0002135911
-
A stochastic approach to content adaptive digital image watermarking
-
Dresden, Germany
-
S. Voloshynoskiy, A. Herrigel, N. Baumgaertner, and T. Pun, "A stochastic approach to content adaptive digital image watermarking," in Proc. 3rd Int. Workshop on Information Hiding, Dresden, Germany, 1999, pp. 211-236.
-
(1999)
Proc. 3rd Int. Workshop on Information Hiding
, pp. 211-236
-
-
Voloshynoskiy, S.1
Herrigel, A.2
Baumgaertner, N.3
Pun, T.4
|