-
1
-
-
0035790994
-
Considerations on watermarking security
-
Cannes, France, Oct
-
T. Kalker, "Considerations on watermarking security," in Proc. IEEE Int. Workshop on Multimedia Signal Processing, Cannes, France, Oct. 2001, pp. 201-206.
-
(2001)
Proc. IEEE Int. Workshop on Multimedia Signal Processing
, pp. 201-206
-
-
Kalker, T.1
-
2
-
-
0041320695
-
A general framework for robust watermarking security
-
Feb
-
M. Barni, F. Bartolini, and T. Furon, "A general framework for robust watermarking security," Signal Process., vol. 83, no. 10, pp. 2069-2084, Feb. 2003.
-
(2003)
Signal Process
, vol.83
, Issue.10
, pp. 2069-2084
-
-
Barni, M.1
Bartolini, F.2
Furon, T.3
-
3
-
-
21844463487
-
Watermarking security: Theory and practice
-
Oct
-
F. Cayre, C. Fontaine, and T. Furon, "Watermarking security: Theory and practice," IEEE Trans. Signal Process., vol. 53, no. 10, pt. 2, pp. 3976-3987, Oct. 2005.
-
(2005)
IEEE Trans. Signal Process
, vol.53
, Issue.10 PART. 2
, pp. 3976-3987
-
-
Cayre, F.1
Fontaine, C.2
Furon, T.3
-
4
-
-
60649086754
-
-
P. Comesaña, L. Pérez-Freire, and F. Pérez- González, Fundamentals of data hiding security and their application to spread-spectrum analysis, in Proc. 7th Information Hiding Workshop, ser. Lect. Notes Comput. Sci. Berlin, Germany: Springer-Verlag, Jun. 2005, Barcelona, Spain.
-
P. Comesaña, L. Pérez-Freire, and F. Pérez- González, "Fundamentals of data hiding security and their application to spread-spectrum analysis," in Proc. 7th Information Hiding Workshop, ser. Lect. Notes Comput. Sci. Berlin, Germany: Springer-Verlag, Jun. 2005, Barcelona, Spain.
-
-
-
-
5
-
-
33646182858
-
-
P. Bas and J. Hurri, M. Barni, I. Cox, T. Kalker, and H. J. Kim, Eds., Security of DM quantization watermarking schemes: A practical study for digital images, in Pmc. 4th Int. Workshop Digital Watermarking. Berlin, Germany: Springer-Verlag, Sep. 2005, 3710, pp. 186-200, Siena, Italy.
-
P. Bas and J. Hurri, , M. Barni, I. Cox, T. Kalker, and H. J. Kim, Eds., "Security of DM quantization watermarking schemes: A practical study for digital images," in Pmc. 4th Int. Workshop Digital Watermarking. Berlin, Germany: Springer-Verlag, Sep. 2005, vol. 3710, pp. 186-200, Siena, Italy.
-
-
-
-
6
-
-
33845637704
-
Security of lattice-based data hiding against the Known Message Attack
-
Dec
-
L. Pérez-Freire, F. Pérez-González, T. Furon, and P. Comesaña, "Security of lattice-based data hiding against the Known Message Attack," IEEE Trans. Inf. Forensics Security, vol. 1, no. 4, pp. 421-439, Dec. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.4
, pp. 421-439
-
-
Pérez-Freire, L.1
Pérez-González, F.2
Furon, T.3
Comesaña, P.4
-
7
-
-
49949104907
-
-
L. Pérez-Freire and F. Pérez-González, Exploiting security holes in lattice data hiding, in Proc. 9th Information Hiding Workshop, ser. Lect. Notes Comput. Sci. Saint Malo, France: Springer-Verlag, Jun. 2007.
-
L. Pérez-Freire and F. Pérez-González, "Exploiting security holes in lattice data hiding," in Proc. 9th Information Hiding Workshop, ser. Lect. Notes Comput. Sci. Saint Malo, France: Springer-Verlag, Jun. 2007.
-
-
-
-
8
-
-
0031362116
-
Secure spread spectrum watermarking for images, audio and video
-
Dec
-
I. J. Cox, J. Killian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for images, audio and video," IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Process
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Killian, J.2
Leighton, T.3
Shamoon, T.4
-
9
-
-
0038527382
-
The zero-rate spread-spectrum water-marking game
-
Apr
-
P. Moulin and A. Ivanović, "The zero-rate spread-spectrum water-marking game," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1098-1117, Apr. 2003.
-
(2003)
IEEE Trans. Signal Process
, vol.51
, Issue.4
, pp. 1098-1117
-
-
Moulin, P.1
Ivanović, A.2
-
10
-
-
0038527410
-
Improved Spread Spectrum: A new modulation technique for robust watermarking
-
Apr
-
H. S. Malvar and D. A. F. Florêncio, "Improved Spread Spectrum: A new modulation technique for robust watermarking," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 898-905, Apr. 2003.
-
(2003)
IEEE Trans. Signal Process
, vol.51
, Issue.4
, pp. 898-905
-
-
Malvar, H.S.1
Florêncio, D.A.F.2
-
11
-
-
34548267133
-
Security of spread-spectrum-based data hiding
-
E. J. Delp, III and P. W. Wong, Eds, San Jose, CA, Jan, SPIE
-
L. Pérez-Freire, P. Moulin, and F. Pérez-González, "Security of spread-spectrum-based data hiding," in Proc. Security, Steganography, Water-marking of Multimedia Contents IX, E. J. Delp, III and P. W. Wong, Eds., San Jose, CA, Jan. 2007, vol. 6505, SPIE.
-
(2007)
Proc. Security, Steganography, Water-marking of Multimedia Contents IX
, vol.6505
-
-
Pérez-Freire, L.1
Moulin, P.2
Pérez-González, F.3
-
12
-
-
39449113677
-
Kerckhoffs-based embedding security classes for WOA data hiding
-
Mar
-
F. Cayre and P. Bas, "Kerckhoffs-based embedding security classes for WOA data hiding," IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 1-15, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.1
, pp. 1-15
-
-
Cayre, F.1
Bas, P.2
-
16
-
-
14644386952
-
Singular random matrix decompositions: Jacobians
-
J. A. Díaz-García and G. González-Farías, "Singular random matrix decompositions: Jacobians," J. Multivariate Anal., vol. 93, no. 2, pp. 296-312, 2005.
-
(2005)
J. Multivariate Anal
, vol.93
, Issue.2
, pp. 296-312
-
-
Díaz-García, J.A.1
González-Farías, G.2
-
18
-
-
60649120240
-
-
Ph.D. dissertation, Signal Theory Commun. Dept, Univ. Vigo, Vigo, Spain
-
L. Pérez-Freire, "Digital watermarking security," Ph.D. dissertation, Signal Theory Commun. Dept., Univ. Vigo, Vigo, Spain, 2008.
-
(2008)
Digital watermarking security
-
-
Pérez-Freire, L.1
-
20
-
-
4544241479
-
Danger of low-dimensional watermarking subspaces
-
Montreal, QC, Canada, May 17-21
-
G. Döerr and J.-L. Dugelay, "Danger of low-dimensional watermarking subspaces," in Proc. IEEE Int. Conf. Acoustics, Speech, Signal Processing, Montreal, QC, Canada, May 17-21, 2004, vol. 3, pp. 93-96.
-
(2004)
Proc. IEEE Int. Conf. Acoustics, Speech, Signal Processing
, vol.3
, pp. 93-96
-
-
Döerr, G.1
Dugelay, J.-L.2
-
21
-
-
0032629347
-
Fast and robust fixed-point algorithms for independent component analysis
-
May
-
A. Hyvärinen, "Fast and robust fixed-point algorithms for independent component analysis," IEEE Trans. Neural Netw., vol. 10, no. 3, pp. 626-634, May 1999.
-
(1999)
IEEE Trans. Neural Netw
, vol.10
, Issue.3
, pp. 626-634
-
-
Hyvärinen, A.1
-
22
-
-
0028416938
-
Independent component analysis, a new concept?
-
P. Comon, "Independent component analysis, a new concept?," Signal Process., vol. 36, pp. 287-314, 1994.
-
(1994)
Signal Process
, vol.36
, pp. 287-314
-
-
Comon, P.1
-
23
-
-
0000263797
-
Projection pursuit
-
Jun
-
P. J. Huber, "Projection pursuit," Ann. Statist., vol. 13, no. 2, pp. 435-475, Jun. 1985.
-
(1985)
Ann. Statist
, vol.13
, Issue.2
, pp. 435-475
-
-
Huber, P.J.1
-
24
-
-
33750916795
-
Achieving subspace or key security for WOA using natural or circular watermarking
-
presented at the, Geneva, Switzerland, Sep
-
P. Bas and F. Cayre, "Achieving subspace or key security for WOA using natural or circular watermarking," presented at the ACM Multimedia and Security Workshop, Geneva, Switzerland, Sep. 2006.
-
(2006)
ACM Multimedia and Security Workshop
-
-
Bas, P.1
Cayre, F.2
-
25
-
-
0031375733
-
One-unit contrast functions for Independent Component Analysis: A statistical analysis
-
Amelia Island, FL, Sep. 24-26
-
A. Hyvärinen, "One-unit contrast functions for Independent Component Analysis: A statistical analysis," in Proc. VII IEEE Workshop on Neural Networks for Signal Processing, Amelia Island, FL, Sep. 24-26, 1997, pp. 388-397.
-
(1997)
Proc. VII IEEE Workshop on Neural Networks for Signal Processing
, pp. 388-397
-
-
Hyvärinen, A.1
-
26
-
-
0032188650
-
Blind equalization using the constant modulus criterion: A review
-
Oct
-
C. R. Jonhson, P. Schniter, T. J. Endres, J. D. Behm, D. R. Brown, and R. A. Casas, "Blind equalization using the constant modulus criterion: A review," Proc. IEEE, vol. 86, no. 10, pp. 1927-1950, Oct. 1998.
-
(1998)
Proc. IEEE
, vol.86
, Issue.10
, pp. 1927-1950
-
-
Jonhson, C.R.1
Schniter, P.2
Endres, T.J.3
Behm, J.D.4
Brown, D.R.5
Casas, R.A.6
-
27
-
-
0032216898
-
The geometry of algorithms with orthogonality constraints
-
A. Edelman, T. A. Arias, and S. T. Smith, "The geometry of algorithms with orthogonality constraints," SIAM J. Matrix Analysis Applications, vol. 20, no. 2, pp. 303-353, 1998.
-
(1998)
SIAM J. Matrix Analysis Applications
, vol.20
, Issue.2
, pp. 303-353
-
-
Edelman, A.1
Arias, T.A.2
Smith, S.T.3
-
28
-
-
60649114309
-
-
USC-SIPI image database, Online, Available
-
USC-SIPI image database. [Online]. Available: http://sipi.usc.edu/ database/.
-
-
-
-
29
-
-
34147121415
-
New algorithms for blind equalization: The constant norm algorithm family
-
Apr
-
A. Goupil and J. Palicot, "New algorithms for blind equalization: The constant norm algorithm family," IEEE Trans. Signal Process., vol. 55, no. 4, pp. 1436-1444, Apr. 2007.
-
(2007)
IEEE Trans. Signal Process
, vol.55
, Issue.4
, pp. 1436-1444
-
-
Goupil, A.1
Palicot, J.2
-
30
-
-
0030519411
-
Packing lines, planes, etc.: Packings in grassmanian spaces
-
J. H. Conway, R. H. Hardin, and N. J. A. Sloane, "Packing lines, planes, etc.: Packings in grassmanian spaces," Exper. Math., vol. 5, no. 2, pp. 139-159, 1996.
-
(1996)
Exper. Math
, vol.5
, Issue.2
, pp. 139-159
-
-
Conway, J.H.1
Hardin, R.H.2
Sloane, N.J.A.3
-
31
-
-
23044501260
-
Principal angles between subspaces as related to Rayleigh quotient and Rayleigh Ritz inequalities with applications to eigenvalue accuracy and an eigenvalue solver,
-
Ph.D. dissertation, Univ. Colorado, Denver, CO
-
M. E. Argentati, "Principal angles between subspaces as related to Rayleigh quotient and Rayleigh Ritz inequalities with applications to eigenvalue accuracy and an eigenvalue solver," Ph.D. dissertation, Univ. Colorado, Denver, CO, 2003.
-
(2003)
-
-
Argentati, M.E.1
-
32
-
-
57349129030
-
-
T. Furon and P. Bas, Broken arrows, Eurasip J. Information Security, 2008, pp. 1-13, 2008, article ID 597040.
-
T. Furon and P. Bas, "Broken arrows," Eurasip J. Information Security, vol. 2008, pp. 1-13, 2008, article ID 597040.
-
-
-
-
33
-
-
60649104020
-
Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks
-
E. J. DeIp, III, P. W. Wong, J. Dittmann, and N. Memon, Eds. San Jose, CA: SPIE, Jan
-
P. Comesaña, M. Barni, and N. Merhav, "Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks," in Proc. Security, Forensics, Steganogmphy, and Watermarking of Multimedia Contents X, E. J. DeIp, III, P. W. Wong, J. Dittmann, and N. Memon, Eds. San Jose, CA: SPIE, Jan. 2008, vol. 6819.
-
(2008)
Proc. Security, Forensics, Steganogmphy, and Watermarking of Multimedia Contents X
, vol.6819
-
-
Comesaña, P.1
Barni, M.2
Merhav, N.3
-
34
-
-
0035333687
-
Quantization Index Modulation: A class of provably good methods for digital watermarking and information embedding
-
May
-
B. Chen and G. Wornell, "Quantization Index Modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.2
-
35
-
-
0037737759
-
Scalar Costa Scheme for information embedding
-
Apr, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery
-
J. J. Eggers, R. Bäuml, R. Tzschoppe, and B. Girod, "Scalar Costa Scheme for information embedding," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1003-1019, Apr. 2003, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery.
-
(2003)
IEEE Trans. Signal Process
, vol.51
, Issue.4
, pp. 1003-1019
-
-
Eggers, J.J.1
Bäuml, R.2
Tzschoppe, R.3
Girod, B.4
-
36
-
-
0038188753
-
Performance analysis of existing and new methods for data hiding with known-host information in additive channels
-
Apr, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery
-
F. Pérez-González, F. Balado, and J. R. Hernández, "Performance analysis of existing and new methods for data hiding with known-host information in additive channels," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 960-980, Apr. 2003, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery.
-
(2003)
IEEE Trans. Signal Process
, vol.51
, Issue.4
, pp. 960-980
-
-
Pérez-González, F.1
Balado, F.2
Hernández, J.R.3
|