-
1
-
-
0032633080
-
The use of watermarks in the protection of digital multimedia products
-
Jul.
-
G. Voyatzis and I. Pitas, "The use of watermarks in the protection of digital multimedia products," Proceeding IEEE, vol. 87, no. 7, pp. 1197-1207, Jul. 1999.
-
(1999)
Proceeding IEEE
, vol.87
, Issue.7
, pp. 1197-1207
-
-
Voyatzis, G.1
Pitas, I.2
-
2
-
-
13244283134
-
An asymmetric subspace watermarking method for copyright protection
-
Feb.
-
J. Tzeng, W. Hwang, and I. Chern, "An asymmetric subspace watermarking method for copyright protection," IEEE Trans. Signal. Process., vol. 53, no. 2, pp. 784-792, Feb. 2005.
-
(2005)
IEEE Trans. Signal. Process.
, vol.53
, Issue.2
, pp. 784-792
-
-
Tzeng, J.1
Hwang, W.2
Chern, I.3
-
3
-
-
4744372232
-
Collusion-resilient fingerprinting by random pre-warping
-
Oct.
-
M.U. Celik, G. Sharma, and A.M. Tekalp, "Collusion-resilient fingerprinting by random pre-warping," IEEE Signal. Process. Letters, vol. 11, no. 10, pp. 831-835, Oct. 2004.
-
(2004)
IEEE Signal. Process. Letters
, vol.11
, Issue.10
, pp. 831-835
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
-
4
-
-
0032682054
-
Spread spectrum image steganography
-
Aug.
-
L. Marvel and C. G. Boncelet, "Spread spectrum image steganography," IEEE Trans. Image. Process., vol. 8, no. 8, pp. 1075-1083, Aug. 1999.
-
(1999)
IEEE Trans. Image. Process.
, vol.8
, Issue.8
, pp. 1075-1083
-
-
Marvel, L.1
Boncelet, C.G.2
-
5
-
-
0034248387
-
Capacity of full frame DCT image watermarks
-
Aug.
-
M. Barni, F. Bartolini, A. DeRosa, and A. Piva, "Capacity of full frame DCT image watermarks," IEEE Trans. Image Process., vol. 9, no. 8, pp. 1450-1455, Aug. 2000.
-
(2000)
IEEE Trans. Image Process.
, vol.9
, Issue.8
, pp. 1450-1455
-
-
Barni, M.1
Bartolini, F.2
Derosa, A.3
Piva, A.4
-
6
-
-
0033882559
-
DCT-domain watermarking techniques for still images: Detection performance analysis and a new structure
-
Jan.
-
J. Hernandez, M. Amado, and F. Perez-Gonzalez, "DCT-domain watermarking techniques for still images: Detection performance analysis and a new structure," IEEE Trans. Image Process., vol. 9, no. 1, pp. 55-68, Jan. 2000.
-
(2000)
IEEE Trans. Image Process.
, vol.9
, Issue.1
, pp. 55-68
-
-
Hernandez, J.1
Amado, M.2
Perez-Gonzalez, F.3
-
7
-
-
0037851033
-
Robust optimum detection of transform domain multiplicative watermarks
-
Apr.
-
C. Qiang and T. S. Huang, "Robust optimum detection of transform domain multiplicative watermarks," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 906-924, Apr. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.4
, pp. 906-924
-
-
Qiang, C.1
Huang, T.S.2
-
8
-
-
84947935845
-
A Bayesian approach to affine transformation resistant image and video watermarking
-
G. Csurka, F. Deguillaume, J. J. K. O'Ruanaidh, and T. Pun, "A Bayesian approach to affine transformation resistant image and video watermarking," Lecture Notes Comput. Sci., vol. 1768, pp. 270-285, 2003.
-
(2003)
Lecture Notes Comput. Sci.
, vol.1768
, pp. 270-285
-
-
Csurka, G.1
Deguillaume, F.2
O'Ruanaidh, J.J.K.3
Pun, T.4
-
9
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Dec.
-
I. J. Cox, J. Kilian, F.T. Leighton, and T. Shannon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Signal. Process., vol. 6, no. 12, pp. 1673-1678, Dec. 1997.
-
(1997)
IEEE Trans. Signal. Process.
, vol.6
, Issue.12
, pp. 1673-1678
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shannon, T.4
-
10
-
-
0242660404
-
Advantages and drawbacks of multiplicative spread spectrum watermarking
-
Dec.
-
M. Barni, F. Bartolini, and A.D. Rosa, "Advantages and drawbacks of multiplicative spread spectrum watermarking," Proc. of SPIE in Security and Watermarking of Multimedia Contents, vol. V, no. 5020, pp. 290-299, Dec. 2003.
-
(2003)
Proc. of SPIE in Security and Watermarking of Multimedia Contents
, vol.5
, Issue.5020
, pp. 290-299
-
-
Barni, M.1
Bartolini, F.2
Rosa, A.D.3
|