-
1
-
-
0031362116
-
Secure Spread Spectrum Watermarking for Multimedia
-
December
-
I.J.Cox, J.Kilian, T.Leighton and T.Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Transactions on Image Processing, 6(12), 1673-1687, December, 1997.
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
4
-
-
0032072250
-
A DCT domain system for robust image watermarking
-
Barni, F. Bartolini and A. Piva, "A DCT domain system for robust image watermarking," IEEE Transactions on Signal Processing. 66, 357-372, 1998.
-
(1998)
IEEE Transactions on Signal Processing
, vol.66
, pp. 357-372
-
-
Barni, F.B.1
Piva, A.2
-
5
-
-
0038612961
-
DCT based image watermarking using sub sampling
-
W.C.Chu, "DCT based image watermarking using sub sampling," IEEE Trans Multimedia 5, 34-38, 2003.
-
(2003)
IEEE Trans Multimedia
, vol.5
, pp. 34-38
-
-
Chu, W.C.1
-
6
-
-
0035333285
-
-
M.Barni, M., Bartolini, F., V., Piva, A., Improved wavelet based watermarking through pixel-wise masking, IEEE Trans Image Processing 10, 783-791, 2001.
-
M.Barni, M., Bartolini, F., V., Piva, A., "Improved wavelet based watermarking through pixel-wise masking," IEEE Trans Image Processing 10, 783-791, 2001.
-
-
-
-
7
-
-
0036474718
-
A wavelet based watermarking algorithm for ownership verification of digital images
-
February
-
Y. Wang, J.F.Doherty and R.E.Van Dyck, "A wavelet based watermarking algorithm for ownership verification of digital images," IEEE Transactions on Image Processing, Volume 11, No.2, pp.77-88, February 2002.
-
(2002)
IEEE Transactions on Image Processing
, vol.11
, Issue.2
, pp. 77-88
-
-
Wang, Y.1
Doherty, J.F.2
Van Dyck, R.E.3
-
8
-
-
33845572045
-
A Second Order Spread Spectrum Modulation Scheme for Wavelet Based Low Error Probability Digital Image Watermarking
-
February
-
Karras D.A., "A Second Order Spread Spectrum Modulation Scheme for Wavelet Based Low Error Probability Digital Image Watermarking," GVIP Journal, Volume 5, Issue 3, February 2005.
-
(2005)
GVIP Journal
, vol.5
, Issue.3
-
-
Karras, D.A.1
-
9
-
-
77949501631
-
Secure and Non-Blind Watermarking Scheme for Color Images Based on DWT
-
April
-
G.S.El-Taweel and H.M. Onsi and M.Samy and M.G. Darwish, "Secure and Non-Blind Watermarking Scheme for Color Images Based on DWT," GVIP Journal, Volume 5, Issue 4, pp. 1-5, April 2005.
-
(2005)
GVIP Journal
, vol.5
, Issue.4
, pp. 1-5
-
-
El-Taweel, G.S.1
Onsi, H.M.2
Samy, M.3
Darwish, M.G.4
-
10
-
-
19744376440
-
SVD based digital image watermarking scheme
-
Chin-Chen Chang, Piyu Tsai and Chia-Chen Lin, 2005 "SVD based digital image watermarking scheme," Pattern Recognition Letters 26, 1577-1586, 2005.
-
(2005)
Pattern Recognition Letters
, vol.26
, pp. 1577-1586
-
-
Chang, C.-C.1
Tsai, P.2
Lin, C.-C.3
-
11
-
-
0036502697
-
An SVD-based watermarking scheme for protecting rightful ownership
-
R.Liu, T.Tan, "An SVD-based watermarking scheme for protecting rightful ownership," IEEE Trans. Multimedia, vol.4, no.1, pp, 121-128, 2002.
-
(2002)
IEEE Trans. Multimedia
, vol.4
, Issue.1
, pp. 121-128
-
-
Liu, R.1
Tan, T.2
-
12
-
-
84955575086
-
SVD-based Approach to Transparent Embedding Data into Digital Images
-
St. Petersburg, Russia, May 21-23
-
V. I. Gorodetski, L. J. Popyack, V. Samoilov and V. A. Skormin, 'SVD-based Approach to Transparent Embedding Data into Digital Images," International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2001), St. Petersburg, Russia, May 21-23, 2001.
-
(2001)
International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS
-
-
Gorodetski, V.I.1
Popyack, L.J.2
Samoilov, V.3
Skormin, V.A.4
-
13
-
-
0036973777
-
Digital Image Watermarking Using Singular Value Decomposition
-
Tulsa, OK, pp
-
D. V. S. Chandra, "Digital Image Watermarking Using Singular Value Decomposition," Proceedings of 45th IEEE Midwest Symposium on Circuits and Systems, Tulsa, OK, pp. 264-267, 2002.
-
(2002)
Proceedings of 45th IEEE Midwest Symposium on Circuits and Systems
, pp. 264-267
-
-
Chandra, D.V.S.1
-
14
-
-
58449098961
-
Robust SVD-DCT domain Image Watermarking for copyright Protection: Embedding data in All Frequencies
-
Antalya, Turkey, September 4-8
-
E.Ganic and A.M. Eskiciogulu et al., "Robust SVD-DCT domain Image Watermarking for copyright Protection: Embedding data in All Frequencies," 13th European Signal Processing Conference (EUSIPCO 2005), Antalya, Turkey, September 4-8, 2005.
-
(2005)
13th European Signal Processing Conference (EUSIPCO
-
-
Ganic, E.1
Eskiciogulu, A.M.2
-
16
-
-
84949210459
-
A SVD and quantization based semi-fragile watermarking technique for image authentication
-
Sun, R., Sun, H., Yao, T., "A SVD and quantization based semi-fragile watermarking technique for image authentication," Proc. IEEE International Conf. Signal Process. 2. 1592-95, 2002.
-
(2002)
Proc. IEEE International Conf. Signal Process
, vol.2
, pp. 1592-1595
-
-
Sun, R.1
Sun, H.2
Yao, T.3
-
18
-
-
0030643710
-
Hybrid KLT-SVD Image Compression
-
Munich, Germany, April 21-24
-
P.Waldemar and T.A.Ramstad, "Hybrid KLT-SVD Image Compression," IEEE International Conf on Acoustics, Speech and Signal Processing, Vol.4, Munich, Germany, April 21-24, 1997, pp.2713-2716, 1997.
-
(1997)
IEEE International Conf on Acoustics, Speech and Signal Processing
, vol.4
, pp. 2713-2716
-
-
Waldemar, P.1
Ramstad, T.A.2
-
20
-
-
0034514476
-
-
R.Z. Wang, C.F.Lin and J.C.Lin, Hiding data in images by optimal moderately significant-bit replacement, IEE Electronic Letter, 36.2069-2070, 2000.
-
R.Z. Wang, C.F.Lin and J.C.Lin, "Hiding data in images by optimal moderately significant-bit replacement," IEE Electronic Letter, 36.2069-2070, 2000.
-
-
-
-
21
-
-
0035283377
-
Image hiding by optimal LSB substitution and genetic algorithm
-
R.Z. Wang, C.F.Lin and J.C.Lin, "Image hiding by optimal LSB substitution and genetic algorithm," Pattern Recognition Letter, 34(3), pp.671-683, 2001.
-
(2001)
Pattern Recognition Letter
, vol.34
, Issue.3
, pp. 671-683
-
-
Wang, R.Z.1
Lin, C.F.2
Lin, J.C.3
-
23
-
-
47549103010
-
A GA based nearly optimal image authentication approach
-
Information and control
-
C.C.Chen and C.S.Lin, "A GA based nearly optimal image authentication approach," International Journal of Innovative Computing, Information and control, vol.3, no.3, pp631-640,2007.
-
(2007)
International Journal of Innovative Computing
, vol.3
, Issue.3
, pp. 631-640
-
-
Chen, C.C.1
Lin, C.S.2
-
24
-
-
42449101136
-
-
S.C.Chu, H.C.Huang, Y.Shi, S.T.Wu and C.S.Shieh, Genetic watermarking for zerotree-based applications, Circuits systems signal Processing, 27, no.2, pp.171.-182, 2008.
-
S.C.Chu, H.C.Huang, Y.Shi, S.T.Wu and C.S.Shieh, "Genetic watermarking for zerotree-based applications," Circuits systems signal Processing, vol.27, no.2, pp.171.-182, 2008.
-
-
-
|