-
4
-
-
33144467852
-
On joint coding for watermarking and encryption
-
DOI 10.1109/TIT.2005.860427
-
N. Merhav On joint coding for watermarking and encryption IEEE Transactions on Information Theory 52 1 2006 190 205 (Pubitemid 43263127)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.1
, pp. 190-205
-
-
Merhav, N.1
-
10
-
-
34547554409
-
Secure embedding of spread-spectrum watermarks using look-up tables
-
M. Celik, A. Lemma, S. Katzenbeisser, M. Van der Veen, Secure embedding of spread-spectrum watermarks using look-up tables, in: Proceedings of International Conference on Acoustics, Speech and Signal Processing, May 2007.
-
(2007)
Proceedings of International Conference on Acoustics, Speech and Signal Processing, May
-
-
Celik, M.1
Lemma, A.2
Katzenbeisser, S.3
Veen Der M.Van4
-
11
-
-
49949091356
-
Combining tardos fingerprinting codes and fingercasting
-
S. Katzenbeisser, B. Skoric, M. Celik, A.R. Sadeghi, Combining tardos fingerprinting codes and fingercasting, in: Proceedings of the Ninth International Workshop on Information Hiding, June 2007.
-
(2007)
Proceedings of the Ninth International Workshop on Information Hiding, June
-
-
Katzenbeisser, S.1
Skoric, B.2
Celik, M.3
Sadeghi, A.R.4
-
12
-
-
33751435956
-
Commutative watermarking and encryption for media data
-
S. Lian, Z. Liu, and H. Wang Commutative watermarking and encryption for media data Optical Engineering Letters 45 8 2006 080510
-
(2006)
Optical Engineering Letters
, vol.45
, Issue.8
, pp. 080510
-
-
Lian, S.1
Liu, Z.2
Wang, H.3
-
13
-
-
34250017964
-
Commutative encryption and watermarking in video compression
-
DOI 10.1109/TCSVT.2007.896635
-
S. Lian, Z. Liu, Z. Ren, and H. Wang Commutative encryption and watermarking in video compression IEEE Transactions on Circuits and Systems for Video Technology 17 6 2007 774 778 (Pubitemid 46883413)
-
(2007)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.17
, Issue.6
, pp. 774-778
-
-
Lian, S.1
Liu, Z.2
Ren, Z.3
Wang, H.4
-
16
-
-
0034317464
-
Double random fractional Fourier-domain encoding for optical security
-
G. Unnikrishnan, and K. Singh Double random fractional Fourier-domain encoding for optical security Journal of Optical Engineering 39 11 2000 2853 2859
-
(2000)
Journal of Optical Engineering
, vol.39
, Issue.11
, pp. 2853-2859
-
-
Unnikrishnan, G.1
Singh, K.2
-
17
-
-
1442284159
-
Selective encryption of wavelet-packet encoded image dataefficiency and security
-
A. Pommer, and A. Uhl Selective encryption of wavelet-packet encoded image dataefficiency and security Multimedia System Journal 9 3 2003 279 287
-
(2003)
Multimedia System Journal
, vol.9
, Issue.3
, pp. 279-287
-
-
Pommer, A.1
Uhl, A.2
-
21
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
DOI 10.1109/18.923725, PII S0018944801028346
-
B. Chen, and G. Wornell Quantization index modulation: a class of provably good methods for digital watermarking and information embedding IEEE Transactions on Information Theory 47 4 2001 1423 1443 (Pubitemid 32508483)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
22
-
-
0037737759
-
Scalar Costa scheme for information embedding
-
J. Eggers, R. Buml, R. Tzschoppe, and B. Girod Scalar Costa scheme for information embedding IEEE Transaction on Signal Processing 51 4 2003 1003 1019
-
(2003)
IEEE Transaction on Signal Processing
, vol.51
, Issue.4
, pp. 1003-1019
-
-
Eggers, J.1
Buml, R.2
Tzschoppe, R.3
Girod, B.4
-
23
-
-
36049006182
-
Access control to hidden data by biometric features
-
M. Cancellaro, M. Carli, K. Egiazarian, A. Neri, Access control to hidden data by biometric features, in: Proceedings of the SPIE Defense and Security, Mobile Multimedia/Image Processing For Military And Security Applications, April 2007.
-
(2007)
Proceedings of the SPIE Defense and Security, Mobile Multimedia/Image Processing for Military and Security Applications, April
-
-
Cancellaro, M.1
Carli, M.2
Egiazarian, K.3
Neri, A.4
-
24
-
-
0035369792
-
Attack modelling: Towards a second generation watermarking benchmark
-
S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun Attack modelling: towards a second generation watermarking benchmark Signal Processing, Special Issue on Information Theoretic Issues in Digital Watermarking 81 6 2001 1177 1214
-
(2001)
Signal Processing, Special Issue on Information Theoretic Issues in Digital Watermarking
, vol.81
, Issue.6
, pp. 1177-1214
-
-
Voloshynovskiy, S.1
Pereira, S.2
Iquise, V.3
Pun, T.4
-
27
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon Secure spread spectrum watermarking for multimedia IEEE Transaction on Image Processing 6 12 1997 1673 1687
-
(1997)
IEEE Transaction on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
29
-
-
78651077048
-
Digital image watermarking using discrete wavelet transform: Performance comparison of error correction codes
-
N. Terzija, M. Repges, K. Luck, W. Geisselhardt, Digital image watermarking using discrete wavelet transform: performance comparison of error correction codes, in: Proceedings of the Conference of International Association of Science and Technology for Development, September 2002.
-
(2002)
Proceedings of the Conference of International Association of Science and Technology for Development, September
-
-
Terzija, N.1
Repges, M.2
Luck, K.3
Geisselhardt, W.4
-
30
-
-
2642518919
-
Impact of different Reed-Solomon codes on digital watermarks based on DWT
-
N. Terzija, M. Repges, K. Luck, W. Geisselhardt, Impact of different ReedSolomon codes on digital watermarks based on DWT, in: Proceedings of Multimedia and Security Workshop at ACM Multimedia, December 2002.
-
(2002)
Proceedings of Multimedia and Security Workshop at ACM Multimedia, December
-
-
Terzija, N.1
Repges, M.2
Luck, K.3
Geisselhardt, W.4
-
31
-
-
63749109368
-
Overview on selective encryption of image and video: Challenges and perspectives
-
A. Massoudi, F. Lefebvre, C. De Vleeschouwer, B. Macq, and J.-J. Quisquater Overview on selective encryption of image and video: challenges and perspectives EURASIP Journal on Information Security 2008 November 2008
-
(2008)
EURASIP Journal on Information Security
, vol.2008
, Issue.NOV.
-
-
Massoudi, A.1
Lefebvre, F.2
De Vleeschouwer, C.3
MacQ, B.4
Quisquater, J.-J.5
-
33
-
-
33847755567
-
On the design of perceptual MPEG-video encryption algorithms
-
S. Li, G. Chen, A. Cheung, B. Bhargava, and K.T. Lo On the design of perceptual MPEG-video encryption algorithms IEEE Transactions on Circuits and Systems for Video Technology 17 2 2007 214 223
-
(2007)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.17
, Issue.2
, pp. 214-223
-
-
Li, S.1
Chen, G.2
Cheung, A.3
Bhargava, B.4
Lo, K.T.5
|