-
1
-
-
0442296538
-
Hiding biometric data
-
Nov.
-
A.K. Jain, U. Uludag, "Hiding biometric data," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, issue 11, Nov. 2003, pp. 1494-1498.
-
(2003)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.25
, Issue.11
, pp. 1494-1498
-
-
Jain, A.K.1
Uludag, U.2
-
2
-
-
0032312612
-
A public key watermark for image verification and authentication
-
Oct. 4-7
-
P. W. Wong, "A public key watermark for image verification and authentication," Proceedings of the International Conference on Image Processing, vol. 1, Oct. 4-7, 1998, pp. 455-459.
-
(1998)
Proceedings of the International Conference on Image Processing
, vol.1
, pp. 455-459
-
-
Wong, P.W.1
-
3
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
P. W. Wong, N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Transaction Image Processing, vol.10, issue 10, 2001, pp. 1593-1601.
-
(2001)
IEEE Transaction Image Processing
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
4
-
-
0032637701
-
Copyright protection for the electronic distribution of text
-
Jun.
-
J. T. Brassil, S. Low, N. F. Maxemchuk, "Copyright protection for the electronic distribution of text," Proceedings of IEEE, vol. 87, no. 7, Jun. 1999, pp. 1181-1196.
-
(1999)
Proceedings of IEEE
, vol.87
, Issue.7
, pp. 1181-1196
-
-
Brassil, J.T.1
Low, S.2
Maxemchuk, N.F.3
-
5
-
-
85032751954
-
Watermarking schemes evaluation
-
May
-
F. A. P Petitcolas, "Watermarking schemes evaluation," IEEE Signal Processing, vol. 17, issue 5, May 2000, pp. 58-64.
-
(2000)
IEEE Signal Processing
, vol.17
, Issue.5
, pp. 58-64
-
-
Petitcolas, F.A.P.1
-
7
-
-
0034266804
-
Watermarking Digital Image and Video Data
-
September
-
G. Langelaar and I. Setyawan, "Watermarking Digital Image and Video Data", IEEE Signal Processing, vol. 17, September 2000, pp. 20-43.
-
(2000)
IEEE Signal Processing
, vol.17
, pp. 20-43
-
-
Langelaar, G.1
Setyawan, I.2
-
8
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I. J Cox, J. Kilian, T. Leighton, T. G. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Transaction Image Processing, vol. 6, issue 12, 1997, pp. 1673-1687.
-
(1997)
IEEE Transaction Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.G.4
-
10
-
-
33845420452
-
Watermarking is not cryptography
-
November 8-10
-
I. J. Cox, G. Doerr, and T. Furon, "Watermarking is not cryptography," Proceedings of 5th International Workshop, IWDW 2006 Jeju Island, Korea, vol. 4283, November 8-10, 2006, pp. 1-15.
-
(2006)
Proceedings of 5th International Workshop, IWDW 2006 Jeju Island, Korea
, vol.4283
, pp. 1-15
-
-
Cox, I.J.1
Doerr, G.2
Furon, T.3
-
11
-
-
18844365338
-
Watermarking relational databases
-
R. Agrawal and J. Kiernan, "Watermarking relational databases," Proceedings of the 28th Very Large Data Bases VLDB Conference, Hong Kong, China, vol. 28, 2002, pp. 155-166.
-
(2002)
Proceedings of the 28th Very Large Data Bases VLDB Conference, Hong Kong, China
, vol.28
, pp. 155-166
-
-
Agrawal, R.1
Kiernan, J.2
-
13
-
-
18844455217
-
A robust watermarking scheme for relational data
-
Y. Li, V. Swarup, and S. Jajodia, "A robust watermarking scheme for relational data," Proceedings of the 13th Workshop on Information Technology and Systems WITS, 2003, pp. 195-200.
-
Proceedings of the 13th Workshop on Information Technology and Systems WITS, 2003
, pp. 195-200
-
-
Li, Y.1
Swarup, V.2
Jajodia, S.3
-
14
-
-
10944220833
-
Rights protection for relational data
-
Dec.
-
R. Sion, M. Atallah, S. Prabhakar, "Rights protection for relational data," IEEE Transactions on Knowledge and Data Engineering, vol. 16, issue 12, Dec. 2004, pp. 1509-1525.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.12
, pp. 1509-1525
-
-
Sion, R.1
Atallah, M.2
Prabhakar, S.3
-
15
-
-
36649016018
-
Watermarking relational databases using optimization based techniques
-
Jan.
-
M. Shehab, E. Bertino, A. Ghafoor, "Watermarking relational databases using optimization based techniques," IEEE Transactions on Knowledge and Data Engineering, vol. 20, issue 1, Jan. 2008.
-
(2008)
IEEE Transactions on Knowledge and Data Engineering
, vol.20
, Issue.1
-
-
Shehab, M.1
Bertino, E.2
Ghafoor, A.3
-
16
-
-
18844420548
-
Tamper Detection and Localization for Categorical Data Using Fragile Watermarks
-
Y. Li, H. Guo, and S. Jajodia, "Tamper Detection and Localization for Categorical Data Using Fragile Watermarks," Proceedings of the 4th ACM Workshop on Digital Rights Management DRM '04, 2004, pp. 73-82.
-
Proceedings of the 4th ACM Workshop on Digital Rights Management DRM '04, 2004
, pp. 73-82
-
-
Li, Y.1
Guo, H.2
Jajodia, S.3
-
17
-
-
6444231864
-
Watermarking relational database using image
-
Zhi-hao Zhang, Xiao-Ming Jin, Jian-Min Wang, De-Yi Li, "Watermarking relational database using image," Proceedings of the Third International Conference on Machine Learning and Cybernetics, Shanghai, Aug. 26-29, 2004.
-
Proceedings of the Third International Conference on Machine Learning and Cybernetics, Shanghai, Aug. 26-29, 2004
-
-
Zhang, Z.-H.1
Jin, X.-M.2
Wang, J.-M.3
Li, D.-Y.4
-
19
-
-
20444476732
-
Prediction-error-based reversible watermarking
-
D. M. Thodi and J. J. Rodriguez, "Prediction-error-based reversible watermarking," Proceedings of IEEE Conference on Image Processing, Singapore, October 2004, pp. 1549-1552.
-
Proceedings of IEEE Conference on Image Processing, Singapore, October 2004
, pp. 1549-1552
-
-
Thodi, D.M.1
Rodriguez, J.J.2
-
20
-
-
13244269881
-
Lossless generalized-lsb data embedding
-
Feb.
-
M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, "Lossless generalized-lsb data embedding," IEEE Transactions on Image Processing, vol. 14, issue 2, Feb. 2005, pp. 253-266.
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.2
, pp. 253-266
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
Saber, E.4
-
21
-
-
0035791606
-
Circular interpretation of histogram for reversible watermarking
-
C. D. Vleeschouwer, J. E. Delaigle, and B. Macq, "Circular interpretation of histogram for reversible watermarking," Proceedings of the IEEE 4th Workshop on Multimedia Signal Processing, France, Oct. 2001, pp. 345-350.
-
Proceedings of the IEEE 4th Workshop on Multimedia Signal Processing, France, Oct. 2001
, pp. 345-350
-
-
Vleeschouwer, C.D.1
Delaigle, J.E.2
Macq, B.3
-
23
-
-
3843102623
-
Reversible watermark using the difference expansion of a generalized integer transform
-
A.M. Alattar. "Reversible watermark using the difference expansion of a generalized integer transform," IEEE Transactions on Image Processing, vol. 13, issue 8, 2004, pp. 1147-1156.
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, Issue.8
, pp. 1147-1156
-
-
Alattar, A.M.1
-
24
-
-
84863234873
-
Reversible and blind database watermarking using difference expansion
-
G. Gupta, J. Pieprzyk. "Reversible and blind database watermarking using difference expansion," Proceedings of eForensics, Jan. 2008, pp. 1-6.
-
Proceedings of EForensics, Jan. 2008
, pp. 1-6
-
-
Gupta, G.1
Pieprzyk, J.2
|