-
1
-
-
0003302360
-
Public watermarks and resistance to tampering
-
Santa Barbara, CA, [CD-ROM].
-
I. J. Cox and J. P. M. G. Linnartz, "Public watermarks and resistance to tampering," in Proc. Int. Conf. Image Processing (ICIP), Santa Barbara, CA, 1997, [CD-ROM].
-
(1997)
Proc. Int. Conf. Image Processing (ICIP)
-
-
Cox, I.J.1
Linnartz, J.P.M.G.2
-
2
-
-
0007751316
-
Analysis of the sensitivity attack against electronic watermarks in images
-
Portland, OR, Apr.
-
J. P. Linnartz and M. van Dijk, "Analysis of the sensitivity attack against electronic watermarks in images," in Proc. Workshop of Information Hiding, Portland, OR, Apr. 1998, pp. 258-272.
-
(1998)
Proc. Workshop of Information Hiding
, pp. 258-272
-
-
Linnartz, J.P.1
Van Dijk, M.2
-
3
-
-
0032311781
-
Watermark estimation through detector analysis
-
Chicago, IL, Oct.
-
T. Kalker, J. P. Linnartz, and M. van Dijk, "Watermark estimation through detector analysis," in Proc. Int. Conf. Image Processing (ICIP), Chicago, IL, Oct. 1998, vol.1, pp. 425-429.
-
(1998)
Proc. Int. Conf. Image Processing (ICIP)
, vol.1
, pp. 425-429
-
-
Kalker, T.1
Linnartz, J.P.2
Van Dijk, M.3
-
4
-
-
0036448239
-
LMS-based attack on watermark public detectors
-
Rochester, NY, Sep.
-
A. Tewfik and M. Mansour, "LMS-based attack on watermark public detectors," in Proc. IEEE Int. Conf. Image Processing (ICIP), Rochester, NY, Sep. 2002, pp. 649-652.
-
(2002)
Proc. IEEE Int. Conf. Image Processing (ICIP)
, pp. 649-652
-
-
Tewfik, A.1
Mansour, M.2
-
5
-
-
33646182640
-
The return of the sensitivity attack
-
Siena, Italy
-
P. Comesãna, L. Pérez-Freire, and F. Pérez- Gonzaléz, "The return of the sensitivity attack," in Proc. IWDW, Siena, Italy, 2005, pp. 260-274.
-
(2005)
Proc. IWDW
, pp. 260-274
-
-
Comesãna, P.1
Pérez-Freire, L.2
Pérez-Gonzaléz, F.3
-
6
-
-
21844452953
-
A new sensitivity analysis attack
-
San Jose, CA, Jan.
-
M. El Choubassi and P. Moulin, "A new sensitivity analysis attack," in Proc. SPIE Conf., San Jose, CA, Jan. 2005, pp. 734-745.
-
(2005)
Proc. SPIE Conf.
, pp. 734-745
-
-
El Choubassi, M.1
Moulin, P.2
-
7
-
-
34249290091
-
Noniterative algorithms for sensitivity analysis attacks
-
Jun.
-
M. El Choubassi and P. Moulin, "Noniterative algorithms for sensitivity analysis attacks," IEEE Trans. Inf. Forensics Security, vol.2, no.2, pp. 113-126, Jun. 2007.
-
(2007)
IEEE Trans. Inf. Forensics Security
, vol.2
, Issue.2
, pp. 113-126
-
-
El Choubassi, M.1
Moulin, P.2
-
8
-
-
33646763554
-
Randomized detection for spread-spectrum watermarking: Defending against sensitivity and other attacks
-
Philadelphia, PA
-
R. Venkatesan and M. H. Jakubowski, "Randomized detection for spread-spectrum watermarking: Defending against sensitivity and other attacks," in Proc. ICASSP, Philadelphia, PA, 2005.
-
(2005)
Proc. ICASSP
-
-
Venkatesan, R.1
Jakubowski, M.H.2
-
10
-
-
33645698671
-
On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks
-
M. El Choubassi and P. Moulin, "On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks," Proc. SPIE, pp. 575-586, 2006.
-
(2006)
Proc. SPIE
, pp. 575-586
-
-
El Choubassi, M.1
Moulin, P.2
-
12
-
-
28944435491
-
Data-hiding codes (tutorial)
-
Dec.
-
P. Moulin and R. Koetter, "Data-hiding codes (tutorial)," Proc. IEEE, vol.93, no.12, pp. 2083-2127, Dec. 2005.
-
(2005)
Proc. IEEE
, vol.93
, Issue.12
, pp. 2083-2127
-
-
Moulin, P.1
Koetter, R.2
-
14
-
-
0019894867
-
Signal detection under mismatch
-
Jul.
-
D. Kazakos, "Signal detection under mismatch," IEEE Trans. Inf. Theory, vol.IT-28, no.4, pp. 681-684, Jul. 1982.
-
(1982)
IEEE Trans. Inf. Theory
, vol.IT-28
, Issue.4
, pp. 681-684
-
-
Kazakos, D.1
-
15
-
-
0027681636
-
Distribution shape of two-dimensional DCT coefficients of natural images
-
Oct.
-
F. Müller, "Distribution shape of two-dimensional DCT coefficients of natural images," Electron. Lett., vol.29, no.22, pp. 1935-1936, Oct. 1993.
-
(1993)
Electron. Lett.
, vol.29
, Issue.22
, pp. 1935-1936
-
-
Müller, F.1
-
16
-
-
0033882559
-
DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure
-
Jan.
-
J. R. Hernández, M. Amado, and F. Pérez-González, "DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure," IEEE Trans. Signal Process., vol.9, no.1, pp. 55-68, Jan. 2000.
-
(2000)
IEEE Trans. Signal Process.
, vol.9
, Issue.1
, pp. 55-68
-
-
Hernández, J.R.1
Amado, M.2
Pérez-González, F.3
|