-
1
-
-
67349144090
-
A new robust reference watermarking scheme based onDWT-SVD
-
G. Bhatnagar and B. Raman, "A new robust reference watermarking scheme based onDWT-SVD," Computer Standards&Interfaces 31(5), 1002-1013 (2009).
-
(2009)
Computer Standards&Interfaces
, vol.31
, Issue.5
, pp. 1002-1013
-
-
Bhatnagar, G.1
Raman, B.2
-
2
-
-
64249099540
-
A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography
-
M.-S. Wang and W.-C. Chen, "A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography," Computer Standards & Interfaces 31(4) 757-762 (2009).
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.4
, pp. 757-762
-
-
Wang, M.-S.1
Chen, W.-C.2
-
3
-
-
1942486241
-
Wavelet tree quantization for copyright protection watermarking
-
S. H. Wang and Y. P. Lin, "Wavelet tree quantization for copyright protection watermarking," IEEE Trans. Image Process. 13(2), 154-165 (2004).
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.2
, pp. 154-165
-
-
Wang, S.H.1
Lin, Y.P.2
-
4
-
-
17444411953
-
A new wavelet based logo-watermarking scheme
-
DOI 10.1016/j.patrec.2004.09.047, PII S016786550400296X
-
M. Barni, F. Bartolini, and A. Piva, "Improved wavelet-based watermarking through pixel-wise masking," IEEE Trans. Image Process. 8, 783-791 (2001). (Pubitemid 40538761)
-
(2005)
Pattern Recognition Letters
, vol.26
, Issue.7
, pp. 1019-1027
-
-
Reddy, A.A.1
Chatterji, B.N.2
-
5
-
-
0035333285
-
Improved wavelet-based watermarking through pixel-wise masking
-
DOI 10.1109/83.918570, PII S1057714901024770
-
A. A. Reddy and B. N. Chatterji, "A new wavelet based logowatermarking scheme," Pattern Recogn. Lett. 26(7) 1019-1027 (2005). (Pubitemid 32505603)
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.5
, pp. 783-791
-
-
Barni, M.1
Bartolini, F.2
Piva, A.3
-
6
-
-
57849098679
-
Combined DWT-DCT digital image watermarking
-
A. Al-Haj, "Combined DWT-DCT digital image watermarking," J. Comput. Sci. 3(9), 740-746 (2007).
-
(2007)
J. Comput. Sci.
, vol.3
, Issue.9
, pp. 740-746
-
-
Al-Haj, A.1
-
7
-
-
0032785523
-
Hidden digital watermarks in images
-
C. T. Hsu and J. L. Wu, "Hidden digital watermarks in images," IEEE Trans. Image Process. 8, 58-68 (1999).
-
(1999)
IEEE Trans. Image Process.
, vol.8
, pp. 58-68
-
-
Hsu, C.T.1
Wu, J.L.2
-
8
-
-
0035127750
-
Optimal differential energy watermarking of DCT encoded images and video
-
DOI 10.1109/83.892451
-
G. C. Langelaar and R. L. Lagendijk, "Optimal differential energy watermarking of DCT encoded images and video," IEEE Trans. Image Process. 10, 148-158 (2001). (Pubitemid 32136889)
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.1
, pp. 148-158
-
-
Langelaar, G.C.1
Lagendijk, R.L.2
-
9
-
-
0038612961
-
DCT-based image watermarking using subsampling
-
W. C. Chu, "DCT-based image watermarking using subsampling," IEEE Trans. Multimedia 5, 34-38 (2003).
-
(2003)
IEEE Trans. Multimedia
, vol.5
, pp. 34-38
-
-
Chu, W.C.1
-
10
-
-
40849120015
-
A new genetic algorithm approach for secure JPEG steganography
-
Islamabad, Pakistan
-
A. M. Fard, M. Akbarzadeh-T, and F. Varasteh-A, "A new genetic algorithm approach for secure JPEG steganography," in Proc. IEEE Int. Conf. on Engineering of Intelligent Systems, Vol. 22-23, pp. 1-6, Islamabad, Pakistan (2006).
-
(2006)
Proc. IEEE Int. Conf. on Engineering of Intelligent Systems
, vol.22-23
, pp. 1-6
-
-
Fard, A.M.1
Akbarzadeh-T, M.2
Varasteh-A, F.3
-
11
-
-
33749634310
-
A practical print-scan resilient watermarking scheme
-
DOI 10.1109/ICIP.2005.1529736, 1529736, IEEE International Conference on Image Processing 2005, ICIP 2005
-
D. He and Q. Sun, "A practical print-scan resilient watermarking scheme," in IEEE Proc. Int. Conf. on Image Processing (ICIP), pp. 257-260, Genova, Italy (2005). (Pubitemid 44538627)
-
(2005)
Proceedings - International Conference on Image Processing, ICIP
, vol.1
, pp. 257-260
-
-
He, D.1
Sun, Q.2
-
12
-
-
77249163739
-
Efficient general print-scanning resilient data hiding based on uniform log-polar mapping
-
X. Kang, J. Huang, and W. Zeng "Efficient general print-scanning resilient data hiding based on uniform log-polar mapping," IEEE Transactions on Information Forensics Security 5(1), 1-12 (2010).
-
(2010)
IEEE Transactions on Information Forensics Security
, vol.5
, Issue.1
, pp. 1-12
-
-
Kang, X.1
Huang, J.2
Zeng, W.3
-
13
-
-
0033726714
-
Robust template matching for affine resistant image watermarks
-
S. Pereira and T. Pun, "Robust template matching for affine resistant image watermarks," in IEEE Trans. Image Process. 9(6), 1123-1129 (2000).
-
(2000)
IEEE Trans. Image Process.
, vol.9
, Issue.6
, pp. 1123-1129
-
-
Pereira, S.1
Pun, T.2
-
14
-
-
35048838074
-
A robust image watermarking scheme to geometrical attacks for embedment of multibit information
-
J. S. Lee andW. Y. Kim, "A robust image watermarking scheme to geometrical attacks for embedment of multibit information," Lect. Notes Comp. Sci. 3333, 348-355 (2005).
-
(2005)
Lect. Notes Comp. Sci.
, vol.3333
, pp. 348-355
-
-
Lee, J.S.1
Kim, W.Y.2
-
15
-
-
58349090016
-
Multiple domain watermarking for print-scan and JPEG resilient data hiding
-
A. Pramila, A Keskinarkaus, and T. Seppänen, "Multiple domain watermarking for print-scan and JPEG resilient data hiding," Lect. Notes Comp. Sci. 5041, 279-293 (2008).
-
(2008)
Lect. Notes Comp. Sci.
, vol.5041
, pp. 279-293
-
-
Pramila, A.1
Keskinarkaus, A.2
Seppänen, T.3
-
16
-
-
84928174250
-
A secure image steganography using LSB, DCT, and compression techniques on raw images
-
Bangalore, India
-
K. B. Raja, C. R. Chowdary, K. R. Venugopal, and L. M. Patnaik, "A secure image steganography using LSB, DCT, and compression techniques on raw images," in Proceedings of IEEE 3rd International Conference on Intelligent Sensing and Information Processing, pp. 170-176, Bangalore, India (2005).
-
(2005)
Proceedings of IEEE 3rd International Conference on Intelligent Sensing and Information Processing
, pp. 170-176
-
-
Raja, K.B.1
Chowdary, C.R.2
Venugopal, K.R.3
Patnaik, L.M.4
-
17
-
-
70350710022
-
Digital image steganography: Suvey and analysis of current methods
-
A. Cheddad, J. Condell, K. Curran, and M. Kevitt: "Digital image steganography: suvey and analysis of current methods," Signal Process. 90, 727-752 (2010).
-
(2010)
Signal Process.
, vol.90
, pp. 727-752
-
-
Cheddad, A.1
Condell, J.2
Curran, K.3
Kevitt, M.4
-
18
-
-
20444458008
-
Estimating and undoing rotation for print-scan resilient data hiding
-
2004 International Conference on Image Processing, ICIP 2004
-
K. Solanki, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, "Estimating and undoing rotation for print-scan resilient data hiding," IEEE Proc. Int. Conf. on Image Processing (ICIP), Singapore, Vol. 1, pp. 39-42 (2004). (Pubitemid 40820852)
-
(2004)
Proceedings - International Conference on Image Processing, ICIP
, vol.1
, pp. 39-42
-
-
Solanki, K.1
Madhow, U.2
Manjunath, B.S.3
Chandrasekaran, S.4
-
19
-
-
0036028610
-
Digimarc MediaBridge: The birth of a consumer product from concept to commercial application
-
B. Perry, B.MacIntosh, and D. Cushman, "Digimarc MediaBridge: the birth of a consumer product from concept to commercial application," Proc. SPIE, 4675, 118 (2002).
-
(2002)
Proc. SPIE
, vol.4675
, pp. 118
-
-
Perry, B.1
Macintosh, B.2
Cushman, D.3
-
20
-
-
0034780126
-
A public automated web-based evaluation service for watermarking schemes: StirMark Benchmark
-
The Society for Imaging Science and Technology (I.S.&T.) and the International Society for Optical Engineering (SPIE)
-
F. A. P. Petitcolas, M. Steinebach, F. Raynal, J. Dittmann, C. Fontaine, and N. Fatès, "A public automated web-based evaluation service for watermarking schemes: StirMark Benchmark," in Proceedings of Electronic Imaging, Security, andWatermarking ofMultimedia Contents III, Vol. 4314,. The Society for Imaging Science and Technology (I.S.&T.) and the International Society for Optical Engineering (SPIE) (2001).
-
(2001)
Proceedings of Electronic Imaging, Security, AndWatermarking OfMultimedia Contents III
, vol.4314
-
-
Petitcolas, F.A.P.1
Steinebach, M.2
Raynal, F.3
Dittmann, J.4
Fontaine, C.5
Fatès, N.6
-
21
-
-
85032751954
-
Watermarking schemes evaluation
-
F. A. P. Petitcolas, "Watermarking schemes evaluation," IEEE Signal Process. 17(5), 58-64 (2000).
-
(2000)
IEEE Signal Process.
, vol.17
, Issue.5
, pp. 58-64
-
-
Petitcolas, F.A.P.1
-
23
-
-
0035335388
-
Rotation, scale, and translation resilient watermaking for images
-
DOI 10.1109/83.918569, PII S1057714901024782
-
C. Y. Lin, M. Wu, J. Bloom, I. Cox, M. Miller, and Y. Lui, "Rotation, scale, and translation resilient watermarking for images," IEEE Trans. Image Process. 10(5), 767-782 (2001). (Pubitemid 32505602)
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.5
, pp. 767-782
-
-
Lin, C.-Y.1
Wu, M.2
Bloom, J.A.3
Cox, I.J.4
Miller, M.L.5
Lui, Y.M.6
-
24
-
-
80055051483
-
Computing the probability of false watermark detection
-
Springer, Berlin/Heidelberg
-
M. L. Miller and J. A. Bloom, "Computing the probability of false watermark detection," Information Hiding, LNCS, Vol. 1768, pp. 146-158, Springer, Berlin/Heidelberg (2005).
-
(2005)
Information Hiding, LNCS
, vol.1768
, pp. 146-158
-
-
Miller, M.L.1
Bloom, J.A.2
-
25
-
-
0141638482
-
ADWT-DFT composite watermarking scheme robust to affine transform and JPEG compression
-
X. Kang, J. Huang, Y. Q. Shi, and Y. Lin, "ADWT-DFT composite watermarking scheme robust to affine transform and JPEG compression," IEEE Trans. Circuits Syst. Video Technol. 13(8), 776-786 (2003).
-
(2003)
IEEE Trans. Circuits Syst. Video Technol.
, vol.13
, Issue.8
, pp. 776-786
-
-
Kang, X.1
Huang, J.2
Shi, Y.Q.3
Lin, Y.4
|