-
1
-
-
53349159971
-
-
2nd ed., Morgan Kaufmann
-
I. J. Cox, J. Fridrich, J. A. Bloom, M. L. Miller, and T. Kalker, Digital Watermarking and Steganography, 2nd ed., Morgan Kaufmann (2007).
-
(2007)
Digital Watermarking and Steganography
-
-
Cox, I.J.1
Fridrich, J.2
Bloom, J.A.3
Miller, M.L.4
Kalker, T.5
-
2
-
-
0032680807
-
Information hiding - A survey
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding - a survey," Proc. IEEE 87(7), 1062-1078 (1999).
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
3
-
-
85032751954
-
Watermarking schemes evaluation
-
F. A. Petitcolas, "Watermarking schemes evaluation," IEEE Signal Processing 17(5), 58-64 (2000).
-
(2000)
IEEE Signal Processing
, vol.17
, Issue.5
, pp. 58-64
-
-
Petitcolas, F.A.1
-
6
-
-
0035417219
-
Attacks on digital watermarks: Classification, estimation-based attacks, and benchmarks
-
S. Voloshynovskiy, S. Pereira, and T. Pun, "Attacks on digital watermarks: classification, estimation-based attacks, and benchmarks," IEEE Commun. Mag. 39(8), 118-126 (2001).
-
(2001)
IEEE Commun. Mag.
, vol.39
, Issue.8
, pp. 118-126
-
-
Voloshynovskiy, S.1
Pereira, S.2
Pun, T.3
-
7
-
-
0030388964
-
Secure spread spectrum watermarking of images, audio and video
-
I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking of images, audio and video," in Proc. IEEE Int. Conf. on Image Processing, Vol. 3, pp. 243-246 (1996).
-
(1996)
Proc. IEEE Int. Conf. on Image Processing
, vol.3
, pp. 243-246
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
8
-
-
84947906380
-
Cocktail watermarking on images
-
C.-S. Lu, H.-Y. M. Liao, S.-K. Huang, and C.-J. Sze, "Cocktail watermarking on images," Lect. Notes Comp. Sci., 1768, 333-347 (2000).
-
(2000)
Lect. Notes Comp. Sci.
, vol.1768
, pp. 333-347
-
-
Lu, C.-S.1
Liao, H.-Y.M.2
Huang, S.-K.3
Sze, C.-J.4
-
9
-
-
0033601670
-
Watermarking by DCT coefficient removal: Statistical approach to optimal parameter settings
-
R. L. G. Langelaar and J. Biemond, "Watermarking by DCT coefficient removal: statistical approach to optimal parameter settings," Proc. SPIE 3657, 2 (1999).
-
(1999)
Proc. SPIE
, vol.3657
, pp. 2
-
-
Langelaar, R.L.G.1
Biemond, J.2
-
10
-
-
1942422086
-
Analysis and design of watermarking algorithms for improved resistance to compression
-
C. Fei, D. Kundur, and R. H. Kwong, "Analysis and design of watermarking algorithms for improved resistance to compression," IEEE Trans. Image Process. 13, 126-144 (2004).
-
(2004)
IEEE Trans. Image Process.
, vol.13
, pp. 126-144
-
-
Fei, C.1
Kundur, D.2
Kwong, R.H.3
-
11
-
-
20444378085
-
Multipurpose image watermarking algorithm based on multistage vector quantization
-
DOI 10.1109/TIP.2005.847324
-
Z.-M.Lu, D.-G. Xu, and S.-H. Sun, "Multipurpose imagewatermarking algorithm based on multistage vector quantization," IEEE Trans. Image Proc. 14(6), 822-831 (2005). (Pubitemid 40794813)
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.6
, pp. 822-831
-
-
Lu, Z.-M.1
Xu, D.-G.2
Sun, S.-H.3
-
12
-
-
1242350682
-
New blind image watermarking in dct domain
-
G. Jiang, M. Yu, S. Shi, X. Liu, and Y.-D. Kim, "New blind image watermarking in dct domain," in Proc. of the 6th Int. Conf. on Signal Processing, Vol. 2, pp. 1580-1583 (2002).
-
(2002)
Proc. of the 6th Int. Conf. on Signal Processing
, vol.2
, pp. 1580-1583
-
-
Jiang, G.1
Yu, M.2
Shi, S.3
Liu, X.4
Kim, Y.-D.5
-
13
-
-
1942517830
-
Dual domain watermarking for authentication and compression of cultural heritage image
-
Y. Zhao, P. Campisi, and D. Kundur, "Dual domain watermarking for authentication and compression of cultural heritage image," IEEE Trans. Image Process. 13(3), 430-448 (2004).
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.3
, pp. 430-448
-
-
Zhao, Y.1
Campisi, P.2
Kundur, D.3
-
14
-
-
67349131541
-
Wavelet basedmultipurpose color image authenticationwatermarking by using dualwatermarkswith human vision system models
-
M.-J. Tsai and C.-W. Lin, "Wavelet basedmultipurpose color image authenticationwatermarking by using dualwatermarkswith human vision system models," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E91-A(6), pp. 1426-1437 (2008).
-
(2008)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E91-A
, Issue.6
, pp. 1426-1437
-
-
Tsai, M.-J.1
Lin, C.-W.2
-
15
-
-
0034779965
-
Digital watermarking based on color differences
-
H. S. Kim, H. K. Lee, H. Y. Lee, and Y. H. Ha, "Digital watermarking based on color differences," Proc. SPIE 4314, 10-17 (2001).
-
(2001)
Proc. SPIE
, vol.4314
, pp. 10-17
-
-
Kim, H.S.1
Lee, H.K.2
Lee, H.Y.3
Ha, Y.H.4
-
16
-
-
72249103415
-
Wavelet-based watermarking for color images through visual masking
-
K.-C. Liu, "Wavelet-based watermarking for color images through visual masking," AEU, Int. J. Electron. Commun. 64(2), 112-124 (2010).
-
(2010)
AEU, Int. J. Electron. Commun.
, vol.64
, Issue.2
, pp. 112-124
-
-
Liu, K.-C.1
-
17
-
-
67349098470
-
Blind self-authentication of images for robustwatermarking using integerwavelet transform
-
A. Bohra, O. Farooq, and Izharuddinc, "Blind self-authentication of images for robustwatermarking using integerwavelet transform,"AEU, Int. J. Electron. Commun. 63(8), 703-707 (2009).
-
(2009)
AEU, Int. J. Electron. Commun.
, vol.63
, Issue.8
, pp. 703-707
-
-
Bohra, A.1
Farooq, O.2
Izharuddinc3
-
18
-
-
77951203648
-
A robust blind color image watermarking based on wavelet-tree bit host difference selection
-
H. Al-Otum and N. Samara, "A robust blind color image watermarking based on wavelet-tree bit host difference selection," Signal Processing J. 90(8), 2498-2512 (2010).
-
(2010)
Signal Processing J.
, vol.90
, Issue.8
, pp. 2498-2512
-
-
Al-Otum, H.1
Samara, N.2
-
19
-
-
78049310391
-
A perceptually tunedwatermarking scheme for color images
-
C.-H.Chou and K.-C. Liu, "A perceptually tunedwatermarking scheme for color images," IEEE Trans. Image Process. 19(11), 2966-2982 (2010).
-
(2010)
IEEE Trans. Image Process.
, vol.19
, Issue.11
, pp. 2966-2982
-
-
Chou, C.-H.1
Liu, K.-C.2
-
20
-
-
70449661029
-
Image watermark using visual model based discrete wavelet transform
-
C. Jin, L.-G. Pan, and T. Su, "Image watermark using visual model based discrete wavelet transform," Int. J. Comput. Sci. 1(2), 119-124 (2007).
-
(2007)
Int. J. Comput. Sci.
, vol.1
, Issue.2
, pp. 119-124
-
-
Jin, C.1
Pan, L.-G.2
Su, T.3
-
21
-
-
67849088702
-
Adaptive color image watermarking based on a modified improved pixel-wise masking technique
-
H. Al-Otum and A. Taba'a, "Adaptive color image watermarking based on a modified improved pixel-wise masking technique," Comput. Electr. Eng. 35(5), 673-695 (2009).
-
(2009)
Comput. Electr. Eng.
, vol.35
, Issue.5
, pp. 673-695
-
-
Al-Otum, H.1
Taba'a, A.2
-
22
-
-
77049125095
-
DHT domain digital watermarking with low loss in image informations
-
S. P. Maity andM. K. Kundu, "DHT domain digital watermarking with low loss in image informations," AEU, Int. J. Electron. Commun. 64, 243-257 (2010).
-
(2010)
AEU, Int. J. Electron. Commun.
, vol.64
, pp. 243-257
-
-
Maity, S.P.1
Kundu, M.K.2
-
23
-
-
0010057774
-
Normalization of statistical variates and the use of rectangular co-ordinates in the theory of sampling distributions
-
P. Mahalanobis, "Normalization of statistical variates and the use of rectangular co-ordinates in the theory of sampling distributions," Sankhay 3, 1-40 (1937).
-
(1937)
Sankhay
, vol.3
, pp. 1-40
-
-
Mahalanobis, P.1
-
25
-
-
77957932916
-
Numerical analysis of Mahalanobis metric in vector space," presented at
-
S. Joken, N. Inoue, and Y. Yamashtia, "Numerical analysis of Mahalanobis metric in vector space," presented at 19th IEEE Int. Conf. on Pattern Recognition (ICPR-2008), pp. 1-4, (2008).
-
(2008)
19th IEEE Int. Conf. on Pattern Recognition (ICPR-2008)
, pp. 1-4
-
-
Joken, S.1
Inoue, N.2
Yamashtia, Y.3
-
26
-
-
84875610608
-
-
anonymous: http://figment.cse.usf.edu/~sfefilat/data/papers/WeBT4.1. pdf.
-
-
-
-
28
-
-
0142091346
-
Morphological operators for color image processing based onMahalanobis distance measure
-
H. Al-Otum, "Morphological operators for color image processing based onMahalanobis distance measure," Opt. Eng. 42(9), 2595-2606 (2003).
-
(2003)
Opt. Eng.
, vol.42
, Issue.9
, pp. 2595-2606
-
-
Al-Otum, H.1
-
29
-
-
33748415611
-
Colour image compression using a modified angular vector quantization algorithm
-
H. Al-Otum, W. Shahab, and M. Smadi, "Colour image compression using a modified angular vector quantization algorithm," J. Electrical Engineering 57(4), 226-234 (2006). (Pubitemid 44343782)
-
(2006)
Journal of Electrical Engineering
, vol.57
, Issue.4
, pp. 226-234
-
-
Al-Otum, H.1
Shahab, W.2
Smadi, M.3
-
30
-
-
33744821108
-
Automatic vascular tree formation using the Mahalanobis distance
-
DOI 10.1007/11566489-99, Medical Image Computing and Computer-Assisted Intervention - MICCAI 2005 - 8th International Conference, Proceedings
-
J. Jomier, V. LeDigarcher, and S. R. Aylward, "Automatic vascular tree formation using the Mahalanobis distance," Lect. Notes Comp. Sci. 3750, 806-812 (2005). (Pubitemid 43828438)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3750
, pp. 806-812
-
-
Jomier, J.1
LeDigarcher, V.2
Aylward, S.R.3
-
31
-
-
0033601672
-
Spread spectrum watermarking: Malicious attacks and counterattacks
-
F. H. Hartung, J. K. Su, and B. Girod, "Spread spectrum watermarking: malicious attacks and counterattacks," Proc. SPIE 3657, 147-158 (1999).
-
(1999)
Proc. SPIE
, vol.3657
, pp. 147-158
-
-
Hartung, F.H.1
Su, J.K.2
Girod, B.3
-
33
-
-
0038636389
-
Combining low frequency and spread spectrum watermarking
-
J. Fridrich, "Combining low frequency and spread spectrum watermarking," Proc. SPIE 3456, 2-12 (1998).
-
(1998)
Proc. SPIE
, vol.3456
, pp. 2-12
-
-
Fridrich, J.1
|