-
1
-
-
0030384775
-
Techniques for data hiding
-
W. Bender, D. Gruhl, N. Morimoto, and A. Lu Techniques for data hiding IBM Systems J. 35 3-4 1996 313 336
-
(1996)
IBM Systems J.
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
2
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I.J. Cox, J. Kilian, F.T. Leighton, and T. Shamoon Secure spread spectrum watermarking for multimedia IEEE Trans. Image Process. 6 12 Dec. 1997 1673 1687
-
(1997)
IEEE Trans. Image Process.
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
3
-
-
0032625842
-
Watermarking as communication with side information
-
I.J. Cox, M.L. Miller, and A.L. Mckellips Watermarking as communication with side information Proc. IEEE 87 7 Jul. 1999 1127 1141
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1127-1141
-
-
Cox, I.J.1
Miller, M.L.2
McKellips, A.L.3
-
4
-
-
0032075445
-
Robust image watermarking in the spatial domain
-
N. Nikolaidis, and I. Pitas Robust image watermarking in the spatial domain Signal Process. 66 Sep. 1997 385 403
-
(1997)
Signal Process.
, vol.66
, pp. 385-403
-
-
Nikolaidis, N.1
Pitas, I.2
-
5
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
P.W. Wong, and N. Memon Secret and public key image watermarking schemes for image authentication and ownership verification IEEE Trans. Image Process. 10 10 Oct. 2001 1593 1601
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
6
-
-
33646415682
-
Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol
-
T.H. Chen, and D.S. Tsai Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol Pattern Recogn. 39 8 Aug. 2006 1530 1541
-
(2006)
Pattern Recogn.
, vol.39
, Issue.8
, pp. 1530-1541
-
-
Chen, T.H.1
Tsai, D.S.2
-
7
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
C.Y. Lin, and S.F. Chang A robust image authentication method distinguishing JPEG compression from malicious manipulation IEEE Trans. Circuits Systems Video Technol. 11 2 Feb. 2001 153 168
-
(2001)
IEEE Trans. Circuits Systems Video Technol.
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
8
-
-
0032785523
-
Hidden digital watermarks in images
-
C.T. Hsu, and J.L. Wu Hidden digital watermarks in images IEEE Trans. Image Process. 8 1 Jan. 1999 58 68
-
(1999)
IEEE Trans. Image Process.
, vol.8
, Issue.1
, pp. 58-68
-
-
Hsu, C.T.1
Wu, J.L.2
-
10
-
-
34548561714
-
Human visual system based adaptive digital image watermarking
-
H. Qi, D. Zheng, and J. Zhao Human visual system based adaptive digital image watermarking Signal Process. 88 Jul. 2007 174 188
-
(2007)
Signal Process.
, vol.88
, pp. 174-188
-
-
Qi, H.1
Zheng, D.2
Zhao, J.3
-
11
-
-
72249103415
-
Wavelet-based watermarking for color images through visual masking
-
K.-C. Liu Wavelet-based watermarking for color images through visual masking AEU Int. J. Electronics Commun. 64 2 Feb. 2010 112 124
-
(2010)
AEU Int. J. Electronics Commun.
, vol.64
, Issue.2
, pp. 112-124
-
-
Liu, K.-C.1
-
13
-
-
34547663506
-
Circularly orthogonal moments for geometrically robust image watermarking
-
Y. Xin, S. Liao, and M. Pawlak Circularly orthogonal moments for geometrically robust image watermarking Pattern Recogn. 40 May 2007 3740 3752
-
(2007)
Pattern Recogn.
, vol.40
, pp. 3740-3752
-
-
Xin, Y.1
Liao, S.2
Pawlak, M.3
-
14
-
-
7544229419
-
Applications of the naturalness preserving transform to image watermarking and data hiding
-
A.M. Ahmed, and D.D. Day Applications of the naturalness preserving transform to image watermarking and data hiding Digital Signal Process. 14 2004 531 549
-
(2004)
Digital Signal Process.
, vol.14
, pp. 531-549
-
-
Ahmed, A.M.1
Day, D.D.2
-
15
-
-
64549118174
-
A local Tchebichef moments-based robust image watermarking
-
C. Deng, X. Gao, X. Li, and D. Tao A local Tchebichef moments-based robust image watermarking Signal Process. 89 2009 1531 1539
-
(2009)
Signal Process.
, vol.89
, pp. 1531-1539
-
-
Deng, C.1
Gao, X.2
Li, X.3
Tao, D.4
-
16
-
-
0036502697
-
An SVD-based watermarking scheme for protecting rightful ownership
-
R. Liu, and T. Tan An SVD-based watermarking scheme for protecting rightful ownership IEEE Trans. Multimedia 4 1 Mar. 2002 121 128
-
(2002)
IEEE Trans. Multimedia
, vol.4
, Issue.1
, pp. 121-128
-
-
Liu, R.1
Tan, T.2
-
17
-
-
44649181049
-
An improved SVD-based watermarking scheme for protecting rightful ownership
-
A.A. Mohammad, A. Alhaj, and S. Shaltaf An improved SVD-based watermarking scheme for protecting rightful ownership Signal Process. 88 2008 2158 2180
-
(2008)
Signal Process.
, vol.88
, pp. 2158-2180
-
-
Mohammad, A.A.1
Alhaj, A.2
Shaltaf, S.3
-
18
-
-
33645221486
-
A semi-blind digital watermarking scheme based on singular value decomposition
-
J.M. Shieh, D.C. Lou, and M.C. Chang A semi-blind digital watermarking scheme based on singular value decomposition Comput. Stand. Interf. 28 4 Apr. 2006 428 440
-
(2006)
Comput. Stand. Interf.
, vol.28
, Issue.4
, pp. 428-440
-
-
Shieh, J.M.1
Lou, D.C.2
Chang, M.C.3
-
19
-
-
33646809377
-
An SVD-based watermarking method for image content authentication with improved security
-
March
-
S. Lee, D. Jang, C.D. Yoo, An SVD-based watermarking method for image content authentication with improved security, in: Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Process. vol. 2, March 2005, pp. 525-528
-
(2005)
Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Process.
, vol.2
, pp. 525-528
-
-
Lee, S.1
Jang, D.2
Yoo, C.D.3
-
20
-
-
34247585102
-
On SVD-based watermarking algorithm
-
K.L. Chung, W.N. Yang, Y.H. Huang, S.T. Wu, and Y.C. Hsu On SVD-based watermarking algorithm Appl. Math. Comput. 188 1 2007 54 57
-
(2007)
Appl. Math. Comput.
, vol.188
, Issue.1
, pp. 54-57
-
-
Chung, K.L.1
Yang, W.N.2
Huang, Y.H.3
Wu, S.T.4
Hsu, Y.C.5
-
22
-
-
50249158477
-
An improved SVD-based watermarking technique for image and document authentication
-
Singapore, December
-
J.C. Patra, W. Soh, E.L. Ang, P.K. Meher, An improved SVD-based watermarking technique for image and document authentication, in: Proc. IEEE Asia Pacific Conference on Circuits and Systems, Singapore, December 2006, pp. 1984-1987
-
(2006)
Proc. IEEE Asia Pacific Conference on Circuits and Systems
, pp. 1984-1987
-
-
Patra, J.C.1
Soh, W.2
Ang, E.L.3
Meher, P.K.4
-
25
-
-
0036396975
-
Hierarchical access control based on Chinese remainder theorem
-
T.-S. Chen, and Y.-F. Chung Hierarchical access control based on Chinese remainder theorem Comp. Security 2 6 2002 565 570
-
(2002)
Comp. Security
, vol.2
, Issue.6
, pp. 565-570
-
-
Chen, T.-S.1
Chung, Y.-F.2
-
26
-
-
45549098627
-
Sharing secrets in stego images with authentication
-
C.-C. Chang, Y.-P. Hsieh, and C.-H. Lin Sharing secrets in stego images with authentication Pattern Recogn. 41 2008 3130 3137
-
(2008)
Pattern Recogn.
, vol.41
, pp. 3130-3137
-
-
Chang, C.-C.1
Hsieh, Y.-P.2
Lin, C.-H.3
-
27
-
-
27844564305
-
A combining method of quasi-cyclic LDPC codes by Chinese remainder theorem
-
S. Myung, and K. Yang A combining method of quasi-cyclic LDPC codes by Chinese remainder theorem IEEE Commun. Lett. 9 9 Sep. 2005 823 825
-
(2005)
IEEE Commun. Lett.
, vol.9
, Issue.9
, pp. 823-825
-
-
Myung, S.1
Yang, K.2
-
28
-
-
0346146968
-
RNS sign detector based on Chinese remainder theorem II (CRT II)
-
E. Al-Radadi, and P. Siy RNS sign detector based on Chinese remainder theorem II (CRT II) Comp. Math. Appl. 46 2003 1559 1570
-
(2003)
Comp. Math. Appl.
, vol.46
, pp. 1559-1570
-
-
Al-Radadi, E.1
Siy, P.2
-
29
-
-
56149118070
-
Robust t-out-of-n oblivious transfer mechanism based on CRT
-
C.-C. Chang, and J.-S. Lee Robust t-out-of-n oblivious transfer mechanism based on CRT J. Network Comp. Appl. 32 1 Jan. 2009 226 235
-
(2009)
J. Network Comp. Appl.
, vol.32
, Issue.1
, pp. 226-235
-
-
Chang, C.-C.1
Lee, J.-S.2
-
30
-
-
69949143570
-
Robust CRT-based watermarking technique for authentication of image and document
-
Singapore, October
-
J.C. Patra, A. Karthik, P.K. Meher, C. Bornand, Robust CRT-based watermarking technique for authentication of image and document, in: Proc. IEEE Int. Conf. Systems, Man, and Cybernetics (SMC 2008), Singapore, October 2008, pp. 3250-3255
-
(2008)
Proc. IEEE Int. Conf. Systems, Man, and Cybernetics (SMC 2008)
, pp. 3250-3255
-
-
Patra, J.C.1
Karthik, A.2
Meher, P.K.3
Bornand, C.4
-
31
-
-
76349090439
-
A novel CRT-based watermarking technique for authentication of multimedia contents
-
J.C. Patra, A. Karthik, and C. Bornand A novel CRT-based watermarking technique for authentication of multimedia contents Digital Signal Process. 20 2010 442 453
-
(2010)
Digital Signal Process.
, vol.20
, pp. 442-453
-
-
Patra, J.C.1
Karthik, A.2
Bornand, C.3
-
34
-
-
33646870762
-
Blind MPEG-2 video watermarking robust against geometric attacks: A set of approaches in DCT domain
-
Y. Wang, and A. Pearmain Blind MPEG-2 video watermarking robust against geometric attacks: A set of approaches in DCT domain IEEE Trans. Image Process. 15 June 2006 1536 1543
-
(2006)
IEEE Trans. Image Process.
, vol.15
, pp. 1536-1543
-
-
Wang, Y.1
Pearmain, A.2
|