-
1
-
-
33746628959
-
Fundamentals of data hiding security and their application to spread-spectrum analysis
-
Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) LNCS Springer, Heidelberg
-
Comesaña, P., Pérez-Freire, L., Pérez- González, F.: Fundamentals of data hiding security and their application to spread-spectrum analysis. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 146-160. Springer, Heidelberg (2005)
-
(2005)
IH 2005
, vol.3727
, pp. 146-160
-
-
Comesaña, P.1
Pérez-Freire, L.2
Pérez-González, F.3
-
3
-
-
0035790994
-
Considerations on watermarking security
-
October
-
Kalker, T.: Considerations on watermarking security. In: Proc. MMSP, Cannes, France, pp. 201-206 (October 2001)
-
(2001)
Proc. MMSP, Cannes, France
, pp. 201-206
-
-
Kalker, T.1
-
4
-
-
21844463487
-
Watermarking security: Theory and practice
-
Cayre, F., Furon, T., Fontaine, C.: Watermarking security: Theory and practice. IEEE Trans. Signal Process. 53(10), 3976-3987 (2005)
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, Issue.10
, pp. 3976-3987
-
-
Cayre, F.1
Furon, T.2
Fontaine, C.3
-
5
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox, I., Killian, J., Leighton, F., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Processing 6(12), 1673-1687 (1997)
-
(1997)
IEEE Trans. Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.1
Killian, J.2
Leighton, F.3
Shamoon, T.4
-
6
-
-
0038527410
-
Improved spread spectrum: A new modulation technique for robust watermarking
-
Malvar, H.S., Flôrencio, D.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Trans. Signal Process. 53, 898-905 (2003)
-
(2003)
IEEE Trans. Signal Process.
, vol.53
, pp. 898-905
-
-
Malvar, H.S.1
Flôrencio, D.2
-
7
-
-
33750916795
-
Achieving subspace or key security for woa using natural or circular watermarking
-
Geneva
-
Bas, P., Cayre, F.: Achieving subspace or key security for woa using natural or circular watermarking. In: Proc. ACM Multimedia Security Workshop, Geneva (2006)
-
(2006)
Proc. ACM Multimedia Security Workshop
-
-
Bas, P.1
Cayre, F.2
-
8
-
-
39449113677
-
Kerckhoffs-based embedding security classes for WOA data hiding
-
Cayre, F., Bas, P.: Kerckhoffs-based embedding security classes for WOA Data Hiding. IEEE Trans. Inf. Forensics and Security 3(1), 1-15 (2008)
-
(2008)
IEEE Trans. Inf. Forensics and Security
, vol.3
, Issue.1
, pp. 1-15
-
-
Cayre, F.1
Bas, P.2
-
9
-
-
38049169784
-
Natural watermarking: A secure spread spectrum technique for WOA
-
Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) LNCS Springer, Heidelberg
-
Bas, P., Cayre, F.: Natural watermarking: a secure spread spectrum technique for WOA. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 1-14. Springer, Heidelberg (2007)
-
(2007)
IH 2006
, vol.4437
, pp. 1-14
-
-
Bas, P.1
Cayre, F.2
-
11
-
-
0030519411
-
Packing lines, plaries, etc.: Packings in grassmanian spaces
-
Conway, J.H., Hardin, R.H., Sloane, N.J.A.: Packing lines, plaries, etc.: Packings in grassmanian spaces. Experimental Mathematics 5(2), 139-159 (1996)
-
(1996)
Experimental Mathematics
, vol.5
, Issue.2
, pp. 139-159
-
-
Conway, J.H.1
Hardin, R.H.2
Sloane, N.J.A.3
|