-
1
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I. J. Cox, J. Killian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process.,vol.6, no. 12, pp. 1673-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Process
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Killian, J.2
Leighton, T.3
Shamoon, T.4
-
2
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
DOI 10.1109/18.923725, PII S0018944801028346
-
B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001. (Pubitemid 32508483)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
3
-
-
0037737759
-
Scalar Costa scheme for information embedding
-
J. J. Eggers, R. Bauml, R. Tzschoppe, and B. Girod, "Scalar Costa scheme for information embedding," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1003-1019, Apr. 2003.
-
(2003)
IEEE Trans. Signal Process
, vol.51
, Issue.4
, pp. 1003-1019
-
-
Eggers, J.J.1
Bauml, R.2
Tzschoppe, R.3
Girod, B.4
-
4
-
-
0242551677
-
Digital watermarking-based DCT and JPEG model
-
M. A. Suhail and M. S. Obaidat, "Digital watermarking-based DCT and JPEG model," IEEE Trans. Instrum. Meas., vol. 52, no. 5, pp. 1640-1647, Oct. 2003.
-
(2003)
IEEE Trans. Instrum. Meas.
, vol.52
, Issue.5
, pp. 1640-1647
-
-
Suhail, M.A.1
Obaidat, M.S.2
-
5
-
-
27644511220
-
An adaptive compressed MPEG-2 video watermarking scheme
-
S. Biswas, S. R. Das, and E. M. Petriu, "An adaptive compressed MPEG-2 video watermarking scheme," IEEE Trans. Instrum. Meas., vol. 54, no. 5, pp. 1853-1861, Oct. 2005.
-
(2005)
IEEE Trans. Instrum. Meas.
, vol.54
, Issue.5
, pp. 1853-1861
-
-
Biswas, S.1
Das, S.R.2
Petriu, E.M.3
-
6
-
-
33847625511
-
Speech quality evaluation: A new application of digital watermarking
-
DOI 10.1109/TIM.2006.887773
-
L. Cai, R. Tu, J. Zhao, and Y. Mao, "Speech quality evaluation: A new application of digital watermarking," IEEETrans. Instrum. Meas., vol. 56, no. 1, pp. 45-55, Feb. 2007. (Pubitemid 46349924)
-
(2007)
IEEE Transactions on Instrumentation and Measurement
, vol.56
, Issue.1
, pp. 45-55
-
-
Cai, L.1
Tu, R.2
Zhao, J.3
Mao, Y.4
-
8
-
-
0003966349
-
-
U.S. Patent 6791, Aug. 21
-
C. W. Honsinger, P. Jones, M. Rabbani, and J. C. Stoffel, "Lossless recovery of an original image containing embedded data," U.S. Patent 6791, Aug. 21, 2001.
-
(2001)
Lossless Recovery of An Original Image Containing Embedded Data
-
-
Honsinger, C.W.1
Jones, P.2
Rabbani, M.3
Stoffel, J.C.4
-
9
-
-
0005156794
-
Trusted headers for medical images
-
Erlangen, Germany
-
B. Macq and F. Dewey and, "Trusted headers for medical images," in Proc. DFG VIII-DII Watermarking Workshop, Erlangen, Germany, Oct. 1999, pp. 1-13.
-
(1999)
Proc. DFG VIII-DII Watermarking Workshop
, pp. 1-13
-
-
MacQ, B.1
Deweyand, F.2
-
10
-
-
0034765589
-
Invertible authentication
-
San Jose, CA
-
J. Fridrich, M. Goljan, and R. Du, "Invertible authentication," in Proc. SPIE, Security Watermarking Multimedia Contents, San Jose, CA, Jan. 2001, vol. 4314, pp. 197-208.
-
(2001)
Proc. SPIE, Security Watermarking Multimedia Contents
, vol.4314
, pp. 197-208
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
11
-
-
1642302769
-
Reversible data hiding
-
Rochester, NY, Sep
-
M. Celik, G. Sharma, M. Tekalp, and E. Saber, "Reversible data hiding," in Proc. IEEE Int. Conf. Image Process., Rochester, NY, Sep. 2002, vol. 2, pp. 157-160.
-
(2002)
Proc. IEEE Int. Conf. Image Process
, vol.2
, pp. 157-160
-
-
Celik, M.1
Sharma, G.2
Tekalp, M.3
Saber, E.4
-
12
-
-
84947260449
-
Distortion-free data embedding for images
-
New York, Apr
-
M. Goljan, J. Fridrich, and R. Du, "Distortion-free data embedding for images," in Proc. 4th Inf. Hiding Workshop, New York, Apr. 2001, vol. 2137, pp. 27-41.
-
(2001)
Proc. 4th Inf. Hiding Workshop
, vol.2137
, pp. 27-41
-
-
Goljan, M.1
Fridrich, J.2
Du, R.3
-
13
-
-
0141862029
-
Reversible data embedding using a difference expansion
-
J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890-896, Aug. 2003.
-
(2003)
IEEE Trans. Circuits Syst. Video Technol
, vol.13
, Issue.8
, pp. 890-896
-
-
Tian, J.1
-
15
-
-
0037028254
-
Distortionless data hiding based on integer wavelet transform
-
G. Xuan, J. Zhu, J. Chen, Y. Q. Shi, Z. Ni, and W. Su, "Distortionless data hiding based on integer wavelet transform," Electron. Lett., vol. 38, no. 25, pp. 1646-1648, Dec. 2002.
-
(2002)
Electron. Lett.
, vol.38
, Issue.25
, pp. 1646-1648
-
-
Xuan, G.1
Zhu, J.2
Chen, J.3
Shi, Y.Q.4
Ni, Z.5
Su, W.6
-
16
-
-
0038273964
-
Circular interpretation of bijective transformations in lossless watermarking for media asset management
-
C. De Vleeschouwer, J. E. Delaigle, and B. Macq, "Circular interpretation of bijective transformations in lossless watermarking for media asset management," IEEE Trans. Multimedia, vol. 5, no. 1, pp. 97-105, Mar. 2003.
-
(2003)
IEEE Trans. Multimedia
, vol.5
, Issue.1
, pp. 97-105
-
-
De Vleeschouwer, C.1
Delaigle, J.E.2
MacQ, B.3
-
17
-
-
33645157142
-
Reversible data hiding
-
Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354-362, Mar. 2006.
-
(2006)
IEEE Trans. Circuits Syst. Video Technol
, vol.16
, Issue.3
, pp. 354-362
-
-
Ni, Z.1
Shi, Y.Q.2
Ansari, N.3
Su, W.4
-
18
-
-
0034449909
-
The digital Michelangelo project: 3D scanning of large statues
-
M. Levoy, K. Pulli, B. Curless, S. Rusinkiewicz, D. Koller, L. Pereira, M. Ginzton, S. Anderson, J. Davis, J. Ginsberg, J. Shade, and D. Fulk, "The digital Michelangelo project: 3D scanning of large statues," in Proc. ACM SIGGRAPH, Aug. 2000, pp. 131-144.
-
(2000)
Proc. ACM SIGGRAPH
, pp. 131-144
-
-
Levoy, M.1
Pulli, K.2
Curless, B.3
Rusinkiewicz, S.4
Koller, D.5
Pereira, L.6
Ginzton, M.7
Anderson, S.8
Davis, J.9
Ginsberg, J.10
Shade, J.11
Fulk, D.12
-
19
-
-
84855673304
-
-
[Online]. Available
-
High Dynamic Range Imaging. [Online]. Available: http://en.wikipedia. org/wiki/High-dynamic-range-imaging
-
High Dynamic Range Imaging
-
-
-
20
-
-
33748879610
-
A reversible data hiding approach to mesh authentication
-
H. T. Wu and Y. M. Cheung, "A reversible data hiding approach to mesh authentication," in Proc. IEEE/WIC/ACM Int. Conf. WI, Sep. 2005, pp. 774-777.
-
(2005)
Proc. IEEE/WIC/ACM Int. Conf. WI
, pp. 774-777
-
-
Wu, H.T.1
Cheung, Y.M.2
-
21
-
-
34548289815
-
A sequential quantization strategy for data embedding and integrity verification
-
Y. M. Cheung and H. T. Wu, "A sequential quantization strategy for data embedding and integrity verification," IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 8, pp. 1007-1016, Aug. 2007.
-
(2007)
IEEE Trans. Circuits Syst. Video Technol
, vol.17
, Issue.8
, pp. 1007-1016
-
-
Cheung, Y.M.1
Wu, H.T.2
-
24
-
-
0032754443
-
Watermarking 3D objects for verification
-
B. L. Yeo and M. M. Yeung, "Watermarking 3D objects for verification," IEEE Comput. Graph. Appl., vol. 19, no. 1, pp. 36-45, Jan./Feb. 1999.
-
(1999)
IEEE Comput. Graph. Appl.
, vol.19
, Issue.1
, pp. 36-45
-
-
Yeo, B.L.1
Yeung, M.M.2
-
25
-
-
0342903151
-
Towards blind detection of robust watermarks in polygonal models
-
O. Benedens and C. Busch, "Towards blind detection of robust watermarks in polygonal models," in Proc. EUROGRAPHICS Comput. Graph. Forum, Aug. 2000, vol. 19, pp. 199-208.
-
(2000)
Proc. EUROGRAPHICS Comput. Graph. Forum
, vol.19
, pp. 199-208
-
-
Benedens, O.1
Busch, C.2
-
26
-
-
34548272818
-
-
INRIA, Rennes, France, INRIA Research Rep. RR-5223, Jun
-
F. Cayre, O. Devillers, F. Schmitt, and H. Maitre, "Watermarking 3D triangle meshes for authentication and integrity," INRIA, Rennes, France, INRIA Research Rep. RR-5223, Jun. 2004.
-
(2004)
Watermarking 3D Triangle Meshes for Authentication and Integrity
-
-
Cayre, F.1
Devillers, O.2
Schmitt, F.3
Maitre, H.4
-
27
-
-
29044433393
-
Fragile watermarking for authenticating 3-D polygonal meshes
-
H. Y. S. Lin, H. Y. M. Liao, C. S. Lu, and J. C. Lin, "Fragile watermarking for authenticating 3-D polygonal meshes," IEEE Trans. Multimedia, vol. 7, no. 6, pp. 997-1006, Dec. 2005.
-
(2005)
IEEE Trans. Multimedia
, vol.7
, Issue.6
, pp. 997-1006
-
-
Lin, H.Y.S.1
Liao, H.Y.M.2
Lu, C.S.3
Lin, J.C.4
-
28
-
-
42549131775
-
Public Authentication of 3-D Mesh Models
-
Hong Kong
-
H. T. Wu and Y. M. Cheung, "Public Authentication of 3-D Mesh Models," in Proc. IEEE/WIC/ACM Int. Conf. WI, Hong Kong, Dec. 2006, pp. 940-948.
-
(2006)
Proc. IEEE/WIC/ACM Int. Conf. WI
, pp. 940-948
-
-
Wu, H.T.1
Cheung, Y.M.2
-
29
-
-
72349087752
-
-
[Online]. Available
-
The WinRAR Software. [Online]. Available: http://www.rarlab.com/
-
The WinRAR Software
-
-
|