-
1
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Dec.
-
I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process., vol.6, no.12, pp. 1673-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Process.
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
2
-
-
0032673448
-
A watermarking technique based on one-way hash functions
-
May
-
M. S. Hwang, C. C. Chang, and K. F. Hwang, "A watermarking technique based on one-way hash functions," IEEE Trans. Consumer Electron., vol.45, no.2, pp. 286-294, May 1999.
-
(1999)
IEEE Trans. Consumer Electron.
, vol.45
, Issue.2
, pp. 286-294
-
-
Hwang, M.S.1
Chang, C.C.2
Hwang, K.F.3
-
3
-
-
0035333285
-
Improved wavelet-based watermarking through pixel-wise masking
-
May
-
M. Barni, F. Bartolini, and A. Piva, "Improved wavelet-based watermarking through pixel-wise masking," IEEE Trans. Image Process., vol.10, no.5, pp. 783-79.1, May 2001.
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.5
, pp. 783-791
-
-
Barni, M.1
Bartolini, F.2
Piva, A.3
-
4
-
-
34547662251
-
Digital watermarking based on chaotic map and reference register
-
Dec.
-
Y. T. Wu and Y. Shih, "Digital watermarking based on chaotic map and reference register," Pattern Recognition, vol.40, no.12, pp. 3753-3763, Dec. 2007.
-
(2007)
Pattern Recognition
, vol.40
, Issue.12
, pp. 3753-3763
-
-
Wu, Y.T.1
Shih, Y.2
-
5
-
-
34848926024
-
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
-
Feb.
-
C. C. Chang, Y. H. Fan and, W. L. Tai, "Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, vol.41, no. 2, pp. 654-661, Feb. 2008.
-
(2008)
Pattern Recognition
, vol.41
, Issue.2
, pp. 654-661
-
-
Chang, C.C.1
Fan, Y.H.2
Tai, W.L.3
-
6
-
-
0038612961
-
DCT-based image watermarking using subsampling
-
Mar.
-
W. C. Chu, "DCT-based image watermarking using subsampling," IEEE Trans. Multimedia, vol.5, no.1, pp. 34-38, Mar. 2003.
-
(2003)
IEEE Trans. Multimedia
, vol.5
, Issue.1
, pp. 34-38
-
-
Chu, W.C.1
-
7
-
-
33646242245
-
Low power block-based watermarking algorithm
-
Apr.
-
Y. T. Pai and S. J. Ruan, "Low power block-based watermarking algorithm," IEICE Trans. Inform, and. Syst., vol.E89-D, no.4, pp. 1507-1514, Apr. 2006.
-
(2006)
IEICE Trans. Inform, and Syst.
, vol.E89-D
, Issue.4
, pp. 1507-1514
-
-
Pai, Y.T.1
Ruan, S.J.2
-
8
-
-
33750491245
-
Robust digital image watermarking based on subsampling
-
Oct.
-
W. Lu, H. Lu, and F. L. Chung, "Robust digital image watermarking based on subsampling," Appl. Math. Comput., vol.181, no.2, pp. 886-893, Oct. 2006.
-
(2006)
Appl. Math. Comput.
, vol.181
, Issue.2
, pp. 886-893
-
-
Lu, W.1
Lu, H.2
Chung, F.L.3
-
9
-
-
44049085895
-
Adaptive watermark mechanism for rightful ownership protection
-
Jul.
-
C. C. Chang and P. Y. Lin, "Adaptive watermark mechanism for rightful ownership protection," J. Syst. Software, vol.81, no.7, pp. 1118-1129, Jul. 2008.
-
(2008)
J. Syst. Software
, vol.81
, Issue.7
, pp. 1118-1129
-
-
Chang, C.C.1
Lin, P.Y.2
-
10
-
-
0742269025
-
Attacking visible watermarking schemes
-
Feb.
-
C. H. Huang and J. L. Wu, "Attacking visible watermarking schemes," IEEE Trans. Multimedia, vol.6, no.1, pp. 16-30, Feb. 2004.
-
(2004)
IEEE Trans. Multimedia
, vol.6
, Issue.1
, pp. 16-30
-
-
Huang, C.H.1
Wu, J.L.2
-
11
-
-
33845683390
-
A novel image recovery algorithm for visible watermarked image
-
Dec.
-
S. C. Pei and Y. C. Zeng, "A novel image recovery algorithm for visible watermarked image," IEEE Trans. Inform. Forensics Security, vol.1, no.4, pp. 543-550, Dec. 2006.
-
(2006)
IEEE Trans. Inform. Forensics Security
, vol.1
, Issue.4
, pp. 543-550
-
-
Pei, S.C.1
Zeng, Y.C.2
-
12
-
-
0036556071
-
Combinational image watermarking in the spatial and frequency domains
-
Apr.
-
Y. Shih and Y. T. Wu, "Combinational image watermarking in the spatial and frequency domains," Pattern Recognition, vol.36, no.4, pp. 969-975, Apr. 2003.
-
(2003)
Pattern Recognition
, vol.36
, Issue.4
, pp. 969-975
-
-
Shih, Y.1
Wu, Y.T.2
-
13
-
-
85134053846
-
A dual watermarking technique for images
-
FL, Oct.-Nov.
-
S. P. Mohanty, K. R. Ramakrishnan, and M. S. Kanakanhalli, "A dual watermarking technique for images," in Proc. 7th ACM Int. Multimedia Conf. (ACMMM), vol.2. FL, Oct.-Nov. 1999, pp. 49-51.
-
(1999)
Proc. 7th ACM Int. Multimedia Conf. (ACMMM)
, vol.2
, pp. 49-51
-
-
Mohanty, S.P.1
Ramakrishnan, K.R.2
Kanakanhalli, M.S.3
-
14
-
-
4344620970
-
Using invisible watermarks to protect visibly watermarked images
-
Y. Hu, S. Kwong, and J. Huang, "Using invisible watermarks to protect visibly watermarked images," in Proc. 2004 Int. Symp. Circuits Syst., vol.5. pp. 584-587.
-
Proc. 2004 Int. Symp. Circuits Syst.
, vol.5
, pp. 584-587
-
-
Hu, Y.1
Kwong, S.2
Huang, J.3
-
15
-
-
0141862029
-
Reversible data embedding using difference expansion
-
Aug.
-
J. Tian, "Reversible data embedding using difference expansion," IEEE Trans. Circuits Syst. Video Technol., vol.13, no.8, pp. 890-896, Aug. 2003.
-
(2003)
IEEE Trans. Circuits Syst. Video Technol.
, vol.13
, Issue.8
, pp. 890-896
-
-
Tian, J.1
-
16
-
-
3843102623
-
Reversible watermark using the difference expansion of a generalized integer transform
-
Aug.
-
A. M. Alattar, "Reversible watermark using the difference expansion of a generalized integer transform," IEEE Trans. Image Process., vol.13, no.8, pp. 1147-1156, Aug. 2004.
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.8
, pp. 1147-1156
-
-
Alattar, A.M.1
-
17
-
-
33645152302
-
Lossless watermarking for image authentication: A new framework and an implementation
-
Apr.
-
M. U. Celik, G. Sharma, and A. M. Tekalp, "Lossless watermarking for image authentication: A new framework and an implementation," IEEE Trans. Image Process., vol.15, no.4, pp. 1042-1049, Apr. 2006.
-
(2006)
IEEE Trans. Image Process.
, vol.15
, Issue.4
, pp. 1042-1049
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
-
18
-
-
33751501445
-
A reversible data hiding scheme based on side match vector quantization
-
Oct.
-
C. C. Chang, W. L. Tai, and C. C. Lin, "A reversible data hiding scheme based on side match vector quantization," IEEE Trans. Circuits Syst. Video Technol., vol.16, no.10, pp. 1301-1308, Oct. 2006.
-
(2006)
IEEE Trans. Circuits Syst. Video Technol.
, vol.16
, Issue.10
, pp. 1301-1308
-
-
Chang, C.C.1
Tai, W.L.2
Lin, C.C.3
-
19
-
-
34548056717
-
Lossless data embedding with high embedding capacity based on declustering for VQ-compressed codes
-
Sep.
-
C. C. Chang, Y. P. Hsieh, and C. Y. Lin, "Lossless data embedding with high embedding capacity based on declustering for VQ-compressed codes," IEEE Trans. Inform. Forensics Security, vol.2, no.3, pp. 341-349, Sep. 2007.
-
(2007)
IEEE Trans. Inform. Forensics Security
, vol.2
, Issue.3
, pp. 341-349
-
-
Chang, C.C.1
Hsieh, Y.P.2
Lin, C.Y.3
-
20
-
-
33947247978
-
Expansion embedding techniques for reversible watermarking
-
Mar.
-
D. M. Thodi and J. J. Rodriguez, "Expansion embedding techniques for reversible watermarking," IEEE Trans. Image Process., vol.16, no.3, pp. 721-730, Mar. 2007.
-
(2007)
IEEE Trans. Image Process.
, vol.16
, Issue.3
, pp. 721-730
-
-
Thodi, D.M.1
Rodriguez, J.J.2
-
21
-
-
38949136659
-
Adaptive lossless steganographic scheme with centralized difference expansion
-
Jun.
-
C. C. Lee, H. C. Wu, C. S. Tsai, and Y. P. Chu, "Adaptive lossless steganographic scheme with centralized difference expansion," Pattern Recognition, vol.41, no.6, pp. 2097-2106, Jun. 2008.
-
(2008)
Pattern Recognition
, vol.41
, Issue.6
, pp. 2097-2106
-
-
Lee, C.C.1
Wu, H.C.2
Tsai, C.S.3
Chu, Y.P.4
-
22
-
-
64349085584
-
Robust lossless image data hiding designed for semi-fragile image authentication
-
Apr.
-
Z. Ni, Y. Q. Shi, N. Ansari, W. Su, Q. Sun, and X. Lin, "Robust lossless image data hiding designed for semi-fragile image authentication," IEEE Trans. Circuits Syst. Video Technol., vol.18, no.4, pp. 497-509, Apr. 2008.
-
(2008)
IEEE Trans. Circuits Syst. Video Technol.
, vol.18
, Issue.4
, pp. 497-509
-
-
Ni, Z.1
Shi, Y.Q.2
Ansari, N.3
Su, W.4
Sun, Q.5
Lin, X.6
-
23
-
-
31644441170
-
An algorithm for removable visible watermarking
-
Jan.
-
Y. Hu, S. Kwong, and J. Huang, "An algorithm for removable visible watermarking," IEEE Trans. Circuits Syst. Video Technol., vol.16, no.1, pp. 129-133, Jan. 2006.
-
(2006)
IEEE Trans. Circuits Syst. Video Technol.
, vol.16
, Issue.1
, pp. 129-133
-
-
Hu, Y.1
Kwong, S.2
Huang, J.3
-
24
-
-
33751540118
-
Reversible visible watermarking and lossless recovery of original images
-
Nov.
-
Y. Hu and B. Jeon, "Reversible visible watermarking and lossless recovery of original images," IEEE Trans. Circuits Syst. Video Technol., vol.16, no.11, pp. 1423-1429, Nov. 2006.
-
(2006)
IEEE Trans. Circuits Syst. Video Technol.
, vol.16
, Issue.11
, pp. 1423-1429
-
-
Hu, Y.1
Jeon, B.2
-
25
-
-
85076054853
-
DCT quantization matrices visually optimized for individual images
-
Bellingham, WA: SPIE, Feb.
-
A. B. Watson, "DCT quantization matrices visually optimized for individual images," in Human vision, Visual Process., Digital Display IV, vol.1913, Bellingham, WA: SPIE, Feb. 1993, pp. 202-216.
-
(1993)
Human Vision, Visual Process., Digital Display IV
, vol.1913
, pp. 202-216
-
-
Watson, A.B.1
-
26
-
-
34248661818
-
A majority-voting based watermarking scheme for color image tamper detection and recovery
-
Jul.
-
M. S. Wang and W. C. Chen, "A majority-voting based watermarking scheme for color image tamper detection and recovery," Comput. Standards Interfaces, vol.29, no.5, pp. 561-570, Jul. 2007.
-
(2007)
Comput. Standards Interfaces
, vol.29
, Issue.5
, pp. 561-570
-
-
Wang, M.S.1
Chen, W.C.2
|