-
1
-
-
0001001980
-
Digital watermarking of color images using amplitude modulation
-
Kutter M., Jordan F., Bossen F.: Digital watermarking of color images using amplitude modulation, J. Electron. Imaging, 7, 2, 1998, pp. 326-332.
-
(1998)
J. Electron. Imaging
, vol.7
, Issue.2
, pp. 326-332
-
-
Kutter, M.1
Jordan, F.2
Bossen, F.3
-
2
-
-
33745903481
-
Extreme learning machine: Theory and applications
-
Huang G. B., Zhu Q. Y., Siew C. K.: Extreme learning machine: theory and applications, Ncurocomputing, 70, 1-3, 2006, pp. 489-501.
-
(2006)
Ncurocomputing
, vol.70
, Issue.1-3
, pp. 489-501
-
-
Huang, G.B.1
Zhu, Q.Y.2
Siew, C.K.3
-
3
-
-
0037361264
-
Learning capability and storage capacity of two-hidden-layer feed forward networks
-
Huang G. B.: Learning capability and storage capacity of two-hidden-layer feed forward networks, IEEE Transactions on Neural Networks, 14, 2, 2003, pp. 274-281.
-
(2003)
IEEE Transactions on Neural Networks
, vol.14
, Issue.2
, pp. 274-281
-
-
Huang, G.B.1
-
4
-
-
0022716288
-
A simple unpredictable pseudo-random number generator, SIAM
-
Blum L., Blum M., Shub M.: A simple unpredictable pseudo-random number generator, SIAM, J. Comput., 15, 2, 1986, pp. 364-383.
-
(1986)
J. Comput.
, vol.15
, Issue.2
, pp. 364-383
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
5
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
PII S1057714997084601
-
Cox I. J., Kilián J., Leighton F. T., Shamoon T.: Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, 6, 12, 1997, pp. 1673-1687. (Pubitemid 127770522)
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
6
-
-
0032095654
-
Multimedia data-embedding and watermarking technologies
-
Swanson M. D., Kobayashi M., Tewfik A. H.: Multimedia data-embedding and watermarking technologies. In: Proceedings of the IEEE, 86, 6, 1998, pp. 1064-1087.
-
(1998)
Proceedings of the IEEE
, vol.86
, Issue.6
, pp. 1064-1087
-
-
Swanson, M.D.1
Kobayashi, M.2
Tewfik, A.H.3
-
7
-
-
0035277035
-
Digital watermarking based on neural networks for color images
-
Yu P. T, Tsai H. H., Lin J. S.: Digital watermarking based on neural networks for color images, Signal Processing, 81, 3, 2001, pp. 663-671.
-
(2001)
Signal Processing
, vol.81
, Issue.3
, pp. 663-671
-
-
Yu, P.T.1
Tsai, H.H.2
Lin, J.S.3
-
8
-
-
0346216903
-
Genetic watermarking based on transformdomain technique
-
Shieh C. S., Huang H. C., Wang F. H., Pan J. S.: Genetic watermarking based on transformdomain technique, Pattern recognition, 37, 3, 2004, pp. 555-565.
-
(2004)
Pattern Recognition
, vol.37
, Issue.3
, pp. 555-565
-
-
Shieh, C.S.1
Huang, H.C.2
Wang, F.H.3
Pan, J.S.4
-
10
-
-
4043109754
-
Watermarking scheme based on support vector machine for color images
-
Fu Y. G., Shen R. M., Lu H. T.: Watermarking scheme based on support vector machine for color images, Electronics letters, 40, 16, 2004, pp. 986-987.
-
(2004)
Electronics Letters
, vol.40
, Issue.16
, pp. 986-987
-
-
Fu, Y.G.1
Shen, R.M.2
Lu, H.T.3
-
13
-
-
0001001980
-
Digital watermarking of color images using amplitude modulation
-
Kuttcr M., Jordan F., Bossen F.: Digital watermarking of color images using amplitude modulation, Journal of Electronic Imaging, 7, 2, 1998, pp. 326-332. (Pubitemid 128447816)
-
(1998)
Journal of Electronic Imaging
, vol.7
, Issue.2
, pp. 326-332
-
-
Kutter, M.1
Jordan, F.2
Bossen, F.3
-
14
-
-
4544296977
-
Image tamper detection and classification using support vector machines
-
Knowles H. D., Winne D. A., Canagarajah C. N., Bull D. R.: Image tamper detection and classification using support vector machines. In: IEEE Proceedings-Vision, Image and Signal Processing, 2004, pp. 322-328.
-
(2004)
IEEE Proceedings-Vision, Image and Signal Processing
, pp. 322-328
-
-
Knowles, H.D.1
Winne, D.A.2
Canagarajah, C.N.3
Bull, D.R.4
-
15
-
-
0036505670
-
A comparison of methods for multiclass support vector machines
-
Hsu C. W., Lin C. J.: A comparison of methods for multiclass support vector machines, IEEE Transactions on Neural Networks, 13, 2, 2002, pp. 415-425.
-
(2002)
IEEE Transactions on Neural Networks
, vol.13
, Issue.2
, pp. 415-425
-
-
Hsu, C.W.1
Lin, C.J.2
-
16
-
-
56549090053
-
Enhanced random search based incremental extreme learning machine
-
Huang G. B., Chen L.: Enhanced Random Search Based Incremental Extreme Learning Machine, Neurocomputing, 71, 16-18, 2008, pp. 3460-3468.
-
(2008)
Neurocomputing
, vol.71
, Issue.16-18
, pp. 3460-3468
-
-
Huang, G.B.1
Chen, L.2
-
20
-
-
34548574837
-
Locally optimum detection for Barni's multiplicative watermarking in DWT domain
-
Wang J. W., Liu G. J., Dai Y. W., Sun J. S., Wang Z. Q., Lian S. G.: Locally optimum detection for Barni's multiplicative watermarking in DWT domain, Signal Processing, 88, 1, 2008, pp. 117-130.
-
(2008)
Signal Processing
, vol.88
, Issue.1
, pp. 117-130
-
-
Wang, J.W.1
Liu, G.J.2
Dai, Y.W.3
Sun, J.S.4
Wang, Z.Q.5
Lian, S.G.6
-
21
-
-
34250017964
-
Commutative encryption and watermarking in video compression
-
Lian S. G., Liu Z. X., Ren Z., Wang H. L.: Commutative Encryption and Watermarking in Video Compression, IEEE Trans. Circuits Syst. Video Techn., 17, 6, 2007, pp. 774-778.
-
(2007)
IEEE Trans. Circuits Syst. Video Techn.
, vol.17
, Issue.6
, pp. 774-778
-
-
Lian, S.G.1
Liu, Z.X.2
Ren, Z.3
Wang, H.L.4
-
22
-
-
77955209964
-
Secure multimedia communication
-
Lian S. G., Zhang Y., Park J. H., Kitsos P.: Secure multimedia communication, Security and Communication Networks, 1, 6, 2008, pp. 437-440.
-
(2008)
Security and Communication Networks
, vol.1
, Issue.6
, pp. 437-440
-
-
Lian, S.G.1
Zhang, Y.2
Park, J.H.3
Kitsos, P.4
-
23
-
-
37249076006
-
Secure media distribution scheme based on chaotic neural network
-
Lian S. G., Liu Z. X., Ren Z., Wang H. L.: Secure Media Distribution Scheme Based on Chaotic Neural Network. In: Proceedings of the 4th international symposium on Neural Networks, 2007, pp. 79-87.
-
(2007)
Proceedings of the 4th International Symposium on Neural Networks
, pp. 79-87
-
-
Lian, S.G.1
Liu, Z.X.2
Ren, Z.3
Wang, H.L.4
-
24
-
-
37549057620
-
Color image watermarking scheme based on linear discriminant analysis
-
Fu Y. G., Shen R. M.: Color image watermarking scheme based on linear discriminant analysis, Computer Standards & Interfaces, 30, 3, 2008, pp. 115-120.
-
(2008)
Computer Standards & Interfaces
, vol.30
, Issue.3
, pp. 115-120
-
-
Fu, Y.G.1
Shen, R.M.2
-
25
-
-
19744376440
-
SVD based digital image watermarking scheme
-
Chang C. C., Tsai P. Y., Lin C. C.: SVD based digital image watermarking scheme. Pattern Recognition Letters, 26, 10, 2005, pp. 1577-1586.
-
(2005)
Pattern Recognition Letters
, vol.26
, Issue.10
, pp. 1577-1586
-
-
Chang, C.C.1
Tsai, P.Y.2
Lin, C.C.3
-
26
-
-
33644649363
-
Robust embedding of Visual Watermarks using DWT-SVD
-
Ganic E., Eskiciogulu A. M.: Robust embedding of Visual Watermarks using DWT-SVD, Journal of Electronic Imaging, 4, 4, 2005, pp. 0430041-0430049.
-
(2005)
Journal of Electronic Imaging
, vol.4
, Issue.4
, pp. 430041-430049
-
-
Ganic, E.1
Eskiciogulu, A.M.2
-
27
-
-
24944469705
-
On the security of an SVD based ownership watermarking
-
Wu Y. D.: On the Security of an SVD based Ownership Watermarking, IEEE Transactions on Multimedia, 7, 4, 2005, pp. 624-627.
-
(2005)
IEEE Transactions on Multimedia
, vol.7
, Issue.4
, pp. 624-627
-
-
Wu, Y.D.1
-
28
-
-
0035333285
-
Improved wavelet-based watermarking through pixel-wise masking
-
Barni M., Bartolini F., Cappcllini V., Piva A.: Improved wavelet-based watermarking through pixel-wise masking, IEEE Trans. Image Process., 10, 5, 2001, pp. 783-791.
-
(2001)
IEEE Trans. Image Process
, vol.10
, Issue.5
, pp. 783-791
-
-
Barni, M.1
Bartolini, F.2
Cappcllini, V.3
Piva, A.4
-
29
-
-
0035394220
-
Watermarking method for embedding index data into images utilizing features of wavelet transform
-
Iwata M., Shiozaki A.: Watermarking method for embedding index data into images utilizing features of wavelet transform, IEICE Trans. Fundam, E84-A, 7, 2001, pp. 1772-1778.
-
(2001)
IEICE Trans. Fundam
, vol.E84-A
, Issue.7
, pp. 1772-1778
-
-
Iwata, M.1
Shiozaki, A.2
|