-
1
-
-
38849168937
-
Natural watermarking: A secure spread spectrum technique for woa
-
Alexandria, VA, July
-
P. Bas and F. Cayre. Natural watermarking: a secure spread spectrum technique for woa. In Proc. Information Hiding, Alexandria, VA, July 2006.
-
(2006)
Proc. Information Hiding
-
-
Bas, P.1
Cayre, F.2
-
2
-
-
49949088543
-
Practical security analysis of dirty paper trellis watermarking
-
P. Bas and G. J. Doërr. Practical security analysis of dirty paper trellis watermarking. In Proc. Information Hiding, pages 174-188, 2007.
-
(2007)
Proc. Information Hiding
, pp. 174-188
-
-
Bas, P.1
Doërr, G.J.2
-
3
-
-
39449135898
-
Vulnerability of dm watermarking of non-iid host signals to attacks utilising the statistics of independent components
-
Sept
-
P. Bas and J. Hurri. Vulnerability of dm watermarking of non-iid host signals to attacks utilising the statistics of independent components. In Information Security, IEE Proceedings, volume 153, pages 127-139, Sept. 2006.
-
(2006)
Information Security, IEE Proceedings
, vol.153
, pp. 127-139
-
-
Bas, P.1
Hurri, J.2
-
4
-
-
39449113677
-
Kerckhoffs-based embedding security classes for woa data hiding
-
Mar
-
F. Cayre and P. Bas. Kerckhoffs-based embedding security classes for woa data hiding. IEEE Trans. Inf. For. Sec., 3(1):1-15, Mar. 2008.
-
(2008)
IEEE Trans. Inf. For. Sec
, vol.3
, Issue.1
, pp. 1-15
-
-
Cayre, F.1
Bas, P.2
-
5
-
-
21844463487
-
Watermarking security: Theory and practice
-
Oct
-
F. Cayre, T. Furon, and C. Fontaine. Watermarking security: Theory and practice. IEEE Trans. Sig. Proc., 53(10):3976-3987, Oct. 2005.
-
(2005)
IEEE Trans. Sig. Proc
, vol.53
, Issue.10
, pp. 3976-3987
-
-
Cayre, F.1
Furon, T.2
Fontaine, C.3
-
6
-
-
0030519411
-
-
J. H. Conway, R. H. Hardin, and N. J. A. Sloane. Packing lines, planes, etc.: packings in grassmanian spaces. In Experimental Mathematics, 5(2), pages 139-159, 1996.
-
J. H. Conway, R. H. Hardin, and N. J. A. Sloane. Packing lines, planes, etc.: packings in grassmanian spaces. In Experimental Mathematics, volume 5(2), pages 139-159, 1996.
-
-
-
-
8
-
-
0002719797
-
The Hungarian method of solving the assignment problem
-
H. W. Kuhn. The Hungarian method of solving the assignment problem. Naval Res. Logistics Quart., 2:83-97, 1955.
-
(1955)
Naval Res. Logistics Quart
, vol.2
, pp. 83-97
-
-
Kuhn, H.W.1
-
9
-
-
0035790994
-
Considerations on watermarking security
-
Oct
-
T. Kalker. Considerations on watermarking security. Proc. MMSP, pages 201-206, Oct. 2001.
-
(2001)
Proc. MMSP
, pp. 201-206
-
-
Kalker, T.1
-
11
-
-
0001010507
-
On a problem of monge (in russian)
-
L. Kantorovitch. On a problem of monge (in russian). Uspekhi Math. Nauk., 3:225-226, 1948.
-
(1948)
Uspekhi Math. Nauk
, vol.3
, pp. 225-226
-
-
Kantorovitch, L.1
-
13
-
-
70449655848
-
Distortion optimization of model-based secure embedding schemes for data-hiding
-
Santa-Barbara, CA, USA, May
-
B. Mathon, P. Bas, F. Cayre, and F. Pérez-González. Distortion optimization of model-based secure embedding schemes for data-hiding. In Proc. Information Hiding, Santa-Barbara, CA, USA, May 2008.
-
(2008)
Proc. Information Hiding
-
-
Mathon, B.1
Bas, P.2
Cayre, F.3
Pérez-González, F.4
|