메뉴 건너뛰기




Volumn 2, Issue , 2002, Pages 477-480

Capacity-security analysis of data hiding technologies

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY ANALYSIS;

EID: 78449266578     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICME.2002.1035649     Document Type: Conference Paper
Times cited : (23)

References (4)
  • 1
    • 0023295985 scopus 로고
    • Trellis coded modulation with redundant signal sets
    • G. Ungerboek, "Trellis Coded Modulation with Redundant Signal Sets, Parts. I+II, ZEEE Comm. Mag., 25, 2, 5-21, 1987.
    • (1987) Parts. I+II, ZEEE Comm. Mag. , vol.25 , Issue.2 , pp. 5-21
    • Ungerboek, G.1
  • 2
    • 0033344122 scopus 로고    scopus 로고
    • Provably robust digital watermarking
    • Boston, USA, Sept
    • B. Chen and G.W. Womell, "Provably robust digital watermarking", Proc. SPZE, Vol. 3845, 43-54, Boston, USA, Sept. 1999.
    • (1999) Proc. SPZE , vol.3845 , pp. 43-54
    • Chen, B.1    Womell, G.W.2
  • 4
    • 0003243551 scopus 로고    scopus 로고
    • Content adaptive watermarking based on a stochastic multiresolution image modeling
    • Sept 5-8, Tampere, Finland
    • S. Voloshynovskiy, F. Deguillaume, T. Pun, "Content adaptive watermarking based on a stochastic multiresolution image modeling", EUSZPCO2000., Sept. 5-8, 2000, Tampere, Finland.
    • (2000) EUSZPCO2000
    • Voloshynovskiy, S.1    Deguillaume, F.2    Pun, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.