-
1
-
-
0031648635
-
-
Chapman & Hall, New York, NY, USA
-
J. L. Mitchell, W. B. Pennebaker, C. E. Fogg, and D. J. LeGall, MPEG Video Compression Standard, Chapman & Hall, New York, NY, USA, 1997.
-
(1997)
MPEG Video Compression Standard
-
-
Mitchell, J.L.1
Pennebaker, W.B.2
Fogg, C.E.3
Legall, D.J.4
-
2
-
-
0345720310
-
-
Marcel Dekker, New York, NY, USA
-
J. Chen, U. Koc, and K. J. R. Liu, Design of Digital Video Coding Systems, Marcel Dekker, New York, NY, USA, 2002.
-
(2002)
Design of Digital Video Coding Systems
-
-
Chen, J.1
Koc, U.2
Liu, K.J.R.3
-
3
-
-
0037670830
-
-
Marcel Dekker, New York, NY, USA
-
K. Ngan, C. Yap, and K. Tan, Video Coding forWireless Communication Systems, Marcel Dekker, New York, NY, USA, 2001.
-
(2001)
Video Coding ForWireless Communication Systems
-
-
Ngan, K.1
Yap, C.2
Tan, K.3
-
4
-
-
0003898289
-
-
Marcel Dekker, New York, NY, USA
-
A. Puri and T. Chen, Eds., Multimedia Systems, Standards, and Networks, Marcel Dekker, New York, NY, USA, 2000.
-
(2000)
Multimedia Systems, Standards, and Networks
-
-
Puri, A.1
Chen, T.2
-
5
-
-
0038520452
-
-
MPEG Committee, ISO/IEC JTC1/SC29/WG11/ N5525.
-
MPEG committee, "MPEG-7 overview," ISO/IEC JTC1/SC29/WG11/ N5525.
-
MPEG-7 Overview
-
-
-
6
-
-
0038553341
-
-
Tech. Rep., International Intellectual Property Alliance (IIPA), Washington, DC, USA
-
S. Siwek, "Copyright industries in the U.S. economy, the 2002 report," Tech. Rep., International Intellectual Property Alliance (IIPA), Washington, DC, USA, 2002.
-
(2002)
Copyright Industries in the U.S. Economy, the 2002 Report
-
-
Siwek, S.1
-
8
-
-
0010730394
-
-
MPEG Committee, ISO/IEC JTC1/SC29/WG11/ N4801.
-
MPEG committee, "MPEG-21 overview," ISO/IEC JTC1/SC29/WG11/ N4801.
-
MPEG-21 Overview
-
-
-
10
-
-
84873672588
-
-
MPEG4 IPMP FPDAM, ISO/IEC 14 496-1: 2001/AMD3, ISO/IEC JTC 1/SC 29/WG11 N4701, March 2002
-
MPEG4 IPMP FPDAM, ISO/IEC 14 496-1: 2001/AMD3, ISO/IEC JTC 1/SC 29/WG11 N4701, March 2002.
-
-
-
-
11
-
-
0030419062
-
Methods for encrypting and decrypting MPEG video data efficiently
-
Boston, Mass, USA, November
-
L. Tang, "Methods for encrypting and decrypting MPEG video data efficiently," in Proc. 4th ACM International Conference onMultimedia (MULTIMEDIA '96), pp. 219-229, Boston, Mass, USA, November 1996.
-
(1996)
Proc. 4th ACM International Conference OnMultimedia (MULTIMEDIA '96)
, pp. 219-229
-
-
Tang, L.1
-
12
-
-
0038273965
-
Efficient frequency domain selective scrambling of digital video
-
W. Zeng and S. Lei, "Efficient frequency domain selective scrambling of digital video," IEEE Trans. Multimedia, vol. 5, no. 1, pp. 118-129, 2003.
-
(2003)
IEEE Trans. Multimedia
, vol.5
, Issue.1
, pp. 118-129
-
-
Zeng, W.1
Lei, S.2
-
13
-
-
0036612847
-
AndW. Jin, "a format-compliant configurable encryption framework for access control of video
-
J.Wen, M. Severa,W. Zeng, M. H. Luttrell, andW. Jin, "A format-compliant configurable encryption framework for access control of video," IEEE Trans. Circuits Syst. Video Technol., vol. 12, no. 6, pp. 545-557, 2002.
-
(2002)
IEEE Trans. Circuits Syst. Video Technol.
, vol.12
, Issue.6
, pp. 545-557
-
-
Wen, J.1
Severa, M.2
Zeng, W.3
Luttrell, M.H.4
-
14
-
-
0034769486
-
Dynamic key distribution scheme using data embedding for secure multimedia multicast
-
Santa Clara, Calif, USA, January
-
J. Song, R. Poovendran, W. Trappe, and K. J. R. Liu, "Dynamic key distribution scheme using data embedding for secure multimedia multicast," in Security andWatermarking ofMultimedia Contents III, vol. 4314 of Proceedings of SPIE, pp. 618-628, Santa Clara, Calif, USA, January 2001.
-
(2001)
Security AndWatermarking OfMultimedia Contents III, Vol. 4314 of Proceedings of SPIE
, pp. 618-628
-
-
Song, J.1
Poovendran, R.2
Trappe, W.3
Liu, K.J.R.4
-
15
-
-
0034849209
-
Key distribution for secure multimedia multicasts via data embedding
-
Salt Lake City, Utah, USA, May
-
W. Trappe, J. Song, R. Poovendran, and K. J. R. Liu, "Key distribution for secure multimedia multicasts via data embedding," in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '01), vol. 3, pp. 1449-1452, Salt Lake City, Utah, USA, May 2001.
-
(2001)
Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '01)
, vol.3
, pp. 1449-1452
-
-
Trappe, W.1
Song, J.2
Poovendran, R.3
Liu, K.J.R.4
-
16
-
-
0344395626
-
Key management and distribution for secure multimedia multicast
-
W. Trappe, J. Song, R. Poovendran, and K. J. R. Liu, "Key management and distribution for secure multimedia multicast," IEEE Trans.Multimedia, vol. 5, no. 4, pp. 544-557, 2003.
-
(2003)
IEEE Trans.Multimedia
, vol.5
, Issue.4
, pp. 544-557
-
-
Trappe, W.1
Song, J.2
Poovendran, R.3
Liu, K.J.R.4
-
17
-
-
0003782852
-
-
Morgan Kaufmann, San Francisco, Calif, USA
-
I. J. Cox, J. A. Bloom, andM. L.Miller, DigitalWatermarking: Principles and Practice, Morgan Kaufmann, San Francisco, Calif, USA, 2001.
-
(2001)
DigitalWatermarking: Principles and Practice
-
-
Cox, I.J.1
Bloom, J.A.2
Miller, M.L.3
-
18
-
-
0141736242
-
-
Springer, New York, NY,USA
-
M.Wu and B. Liu, Multimedia Data Hiding, Springer, New York, NY,USA, 2003.
-
(2003)
Multimedia Data Hiding
-
-
Wu, M.1
Liu, B.2
-
19
-
-
0032095654
-
Multimedia dataembedding and watermarking technologies
-
M. D. Swanson, M. Kobayashi, and A. H. Tewfik, "Multimedia dataembedding and watermarking technologies," Proc. IEEE, vol. 86, no. 6, pp. 1064-1087, 1998.
-
(1998)
Proc. IEEE
, vol.86
, Issue.6
, pp. 1064-1087
-
-
Swanson, M.D.1
Kobayashi, M.2
Tewfik, A.H.3
-
20
-
-
0032680807
-
Information hiding - A survey
-
F. A. P. Petitcolas, R. J. Anderson, andM. G. Kuhn, "Information hiding - a survey," Proc. IEEE, vol. 87, no. 7, pp. 1062-1078, 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
21
-
-
0032634857
-
Multimedia watermarking techniques
-
F. Hartung and M. Kutter, "Multimedia watermarking techniques," Proc. IEEE, vol. 87, no. 7, pp. 1079-1107, 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1079-1107
-
-
Hartung, F.1
Kutter, M.2
-
22
-
-
85013986121
-
Object-based transparent video watermarking
-
Princeton, NJ, USA, June
-
M. D. Swanson, B. Zhu, B. Chau, and A. H. Tewfik, "Object-based transparent video watermarking," in Proc. IEEE 1st Workshop on Multimedia Signal Processing (MMSP '97), pp. 369-374, Princeton, NJ, USA, June 1997.
-
(1997)
Proc. IEEE 1st Workshop on Multimedia Signal Processing (MMSP '97)
, pp. 369-374
-
-
Swanson, M.D.1
Zhu, B.2
Chau, B.3
Tewfik, A.H.4
-
23
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I. J. Cox, J. Kilian, F. T. Leighton, and T. G. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Processing, vol. 6, no. 12, pp. 1673-1687, 1997.
-
(1997)
IEEE Trans. Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.G.4
-
24
-
-
0032072279
-
Image-adaptive watermarking using visual models
-
C. I. Podilchuk and W. Zeng, "Image-adaptive watermarking using visual models," IEEE J. Select. Areas Commun., vol. 16, no. 4, pp. 525-539, 1998.
-
(1998)
IEEE J. Select. Areas Commun.
, vol.16
, Issue.4
, pp. 525-539
-
-
Podilchuk, C.I.1
Zeng, W.2
-
25
-
-
0000863143
-
Wavelet transform based watermark for digital images
-
X. G. Xia, C. G. Boncelet, and G. R. Arce, "Wavelet transform based watermark for digital images," Optics Express, vol. 3, no. 12, pp. 497-511, 1998.
-
(1998)
Optics Express
, vol.3
, Issue.12
, pp. 497-511
-
-
Xia, X.G.1
Boncelet, C.G.2
Arce, G.R.3
-
26
-
-
0032643733
-
Multiresolution watermarking for images and video
-
W. Zhu, Z. Xiong, and Y.-Q. Zhang, "Multiresolution watermarking for images and video," IEEE Trans. Circuits Syst. Video Technol., vol. 9, no. 4, pp. 545-550, 1999.
-
(1999)
IEEE Trans. Circuits Syst. Video Technol.
, vol.9
, Issue.4
, pp. 545-550
-
-
Zhu, W.1
Xiong, Z.2
Zhang, Y.-Q.3
-
27
-
-
0033690185
-
A source and channel-coding framework for vector-based data hiding in video
-
D. Mukherjee, J. J. Chae, and S. K. Mitra, "A source and channel-coding framework for vector-based data hiding in video," IEEE Trans. Circuits Syst. Video Technol., vol. 10, no. 4, pp. 630-645, 2000.
-
(2000)
IEEE Trans. Circuits Syst. Video Technol.
, vol.10
, Issue.4
, pp. 630-645
-
-
Mukherjee, D.1
Chae, J.J.2
Mitra, S.K.3
-
28
-
-
0032664574
-
Perceptual watermarks for digital images and video
-
R. B. Wolfgang, C. I. Podilchuk, and E. J. Delp, "Perceptual watermarks for digital images and video," Proc. IEEE, vol. 87, no. 7, pp. 1108-1126, 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1108-1126
-
-
Wolfgang, R.B.1
Podilchuk, C.I.2
Delp, E.J.3
-
29
-
-
0003851399
-
-
JohnWiley & Sons, New York, NY, USA, 2nd edition
-
B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, JohnWiley & Sons, New York, NY, USA, 2nd edition, 1996.
-
(1996)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
30
-
-
84944878354
-
-
CRC Press, Boca Raton, Fla, USA
-
A. J.Menezes, P. C. Van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, Fla, USA, 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
31
-
-
0041602326
-
-
Prentice Hall, New York, NY, USA
-
W. Trappe and L. C.Washington, Introduction to Cryptography with Coding Theory, Prentice Hall, New York, NY, USA, 2001.
-
(2001)
Introduction to Cryptography with Coding Theory
-
-
Trappe, W.1
Washington, L.C.2
-
32
-
-
0032656890
-
Copy protection for DVD video
-
J. A. Bloom, I. J. Cox, T. Kalker, J.-P. M. G. Linnartz, M. L. Miller, and C. B. S. Traw, "Copy protection for DVD video," Proc. IEEE, vol. 87, no. 7, pp. 1267-1276, 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1267-1276
-
-
Bloom, J.A.1
Cox, I.J.2
Kalker, T.3
Linnartz, J.-P.M.G.4
Miller, M.L.5
Traw, C.B.S.6
-
33
-
-
0034769486
-
Dynamic key distribution scheme using data embedding for secure multimedia multicast
-
San Jose, Calif, USA, January
-
J. Song, R. Poovendran, W. Trappe, and K. J. R. Liu, "Dynamic key distribution scheme using data embedding for secure multimedia multicast," in Security andWatermarking ofMultimedia Contents III, vol. 4314 of Proceedings of SPIE, pp. 618-628, San Jose, Calif, USA, January 2001.
-
(2001)
Security AndWatermarking OfMultimedia Contents III, Vol. 4314 of Proceedings of SPIE
, pp. 618-628
-
-
Song, J.1
Poovendran, R.2
Trappe, W.3
Liu, K.J.R.4
-
34
-
-
0034842530
-
Error concealment using data hiding
-
Salt Lake City, Utah, USA, May
-
P. Yin, B. Liu, and H. H. Yu, "Error concealment using data hiding," in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '01), vol. 3, pp. 1453-1456, Salt Lake City, Utah, USA, May 2001.
-
(2001)
Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '01)
, vol.3
, pp. 1453-1456
-
-
Yin, P.1
Liu, B.2
Yu, H.H.3
-
35
-
-
0036030669
-
Robust error-resilient approach forMPEG video transmission over internet
-
San Jose, Calif, USA, January
-
P. Yin, M.Wu, and B. Liu, "Robust error-resilient approach forMPEG video transmission over internet," in Visual Communications and Image Processing, vol. 4671 of Proceedings of SPIE, pp. 103-111, San Jose, Calif, USA, January 2002.
-
(2002)
Visual Communications and Image Processing, Vol. 4671 of Proceedings of SPIE
, pp. 103-111
-
-
Yin, P.1
Wu, M.2
Liu, B.3
-
36
-
-
0001476552
-
A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images
-
W. Zeng and B. Liu, "A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images," IEEE Trans. Image Processing, vol. 8, no. 11, pp. 1534-1548, 1999.
-
(1999)
IEEE Trans. Image Processing
, vol.8
, Issue.11
, pp. 1534-1548
-
-
Zeng, W.1
Liu, B.2
-
37
-
-
0033312461
-
Multi-level data hiding for digital image and video
-
Boston, Mass, USA, September
-
M. Wu, H. Yu, and A. Gelman, "Multi-level data hiding for digital image and video," in Multimedia Systems and Applications II, vol. 3845 of Proceedings of SPIE, pp. 10-21, Boston, Mass, USA, September 1999.
-
(1999)
Multimedia Systems and Applications II, Vol. 3845 of Proceedings of SPIE
, pp. 10-21
-
-
Wu, M.1
Yu, H.2
Gelman, A.3
-
38
-
-
0037353686
-
Information-theoretic analysis of information hiding
-
P. Moulin and J. A. O'Sullivan, "Information-theoretic analysis of information hiding," IEEE Trans. Inform. Theory, vol. 49, no. 3, pp. 563-593, 2003.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, Issue.3
, pp. 563-593
-
-
Moulin, P.1
O'Sullivan, J.A.2
-
39
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
B. Chen and G. W. Wornell, "Quantization index modulation: a class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inform. Theory, vol. 47, no. 4, pp. 1423-1443, 2001.
-
(2001)
IEEE Trans. Inform. Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
40
-
-
0020752342
-
Writing on dirty paper
-
M. H. M Costa, "Writing on dirty paper," IEEE Trans. Inform. Theory, vol. 29, no. 3, pp. 439-441, 1983.
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, Issue.3
, pp. 439-441
-
-
Costa, M.H.M.1
-
41
-
-
84873640152
-
Iteratively decodable codes for watermarking applications
-
Brest, France, September
-
M. Kesal, M. K. Mihcak, R. Koetter, and P. Moulin, "Iteratively decodable codes for watermarking applications," in Proc. 2nd International Symposium on Turbo Codes and Related Topics (ISTC '00), Brest, France, September 2000.
-
(2000)
Proc. 2nd International Symposium on Turbo Codes and Related Topics (ISTC '00)
-
-
Kesal, M.1
Mihcak, M.K.2
Koetter, R.3
Moulin, P.4
-
42
-
-
0037737759
-
Scalar Costa scheme for information embedding
-
J. J. Eggers, R. Bauml, R. Tzschoppe, and B. Girod, "Scalar Costa scheme for information embedding," IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 1003-1019, 2003.
-
(2003)
IEEE Trans. Signal Processing
, vol.51
, Issue.4
, pp. 1003-1019
-
-
Eggers, J.J.1
Bauml, R.2
Tzschoppe, R.3
Girod, B.4
-
43
-
-
0035335388
-
Rotation, scale, and translation resilient watermarking for images
-
C.-Y. Lin,M.Wu, J. A. Bloom, I. J. Cox, M. L. Miller, and Y. M. Lui, "Rotation, scale, and translation resilient watermarking for images," IEEE Trans. Image Processing, vol. 10, no. 5, pp. 767-782, 2001.
-
(2001)
IEEE Trans. Image Processing
, vol.10
, Issue.5
, pp. 767-782
-
-
Lin, C.-Y.1
Wu, M.2
Bloom, J.A.3
Cox, I.J.4
Miller, M.L.5
Lui, Y.M.6
-
44
-
-
0242408710
-
Robust content-dependent highfidelity watermark for tracking in digital cinema
-
Santa Clara, Calif, USA, June
-
J. Lubin, J. A. Bloom, and H. Cheng, "Robust content-dependent highfidelity watermark for tracking in digital cinema," in Security and Watermarking of Multimedia Contents V, vol. 5020 of Proceedings of SPIE, pp. 536-545, Santa Clara, Calif, USA, June 2003.
-
(2003)
Security and Watermarking of Multimedia Contents V, Vol. 5020 of Proceedings of SPIE
, pp. 536-545
-
-
Lubin, J.1
Bloom, J.A.2
Cheng, H.3
-
45
-
-
0004082156
-
-
McGraw-Hill, New York, NY, USA, 4th edition
-
J. G. Proakis, Digital Communications, McGraw-Hill, New York, NY, USA, 4th edition, 2000.
-
(2000)
Digital Communications
-
-
Proakis, J.G.1
-
46
-
-
0001946274
-
A Bayesian approach to affine transformation resistant image and video watermarking
-
Hotel Elbflorenz, Dresden, Germany, September-October
-
G. Csurka, F. Deguillaume, J. J. K. Ó Ruanaidh, and T. Pun, "A Bayesian approach to affine transformation resistant image and video watermarking," in Proc. 3rd Information Hiding Workshop (IHW '99), Lecture Notes in Computer Science, pp. 315-330, Hotel Elbflorenz, Dresden, Germany, September-October 1999.
-
(1999)
Proc. 3rd Information Hiding Workshop (IHW '99), Lecture Notes in Computer Science
, pp. 315-330
-
-
Csurka, G.1
Deguillaume, F.2
Ruanaidh, J.J.K.Ó.3
Pun, T.4
-
47
-
-
0038209204
-
Fast robust template matching for affine resistant image watermarks
-
Hotel Elbflorenz, Dresden, Germany, September-October
-
S. Pereira and T. Pun, "Fast robust template matching for affine resistant image watermarks," in Proc. 3rd Information Hiding Workshop (IHW '99), vol. 1768 of Lecture Notes in Computer Science, pp. 207-218, Hotel Elbflorenz, Dresden, Germany, September-October 1999.
-
(1999)
Proc. 3rd Information Hiding Workshop (IHW '99), Vol. 1768 of Lecture Notes in Computer Science
, pp. 207-218
-
-
Pereira, S.1
Pun, T.2
-
48
-
-
0003195355
-
Recovery of watermarks from distorted images
-
Hotel Elbflorenz, Dresden, Germany, September-October
-
N. F. Johnson, Z. Duric, and S. Jajodia, "Recovery of watermarks from distorted images," in Proc. 3rd Information Hiding Workshop (IHW '99), pp. 361-375, Hotel Elbflorenz, Dresden, Germany, September-October 1999.
-
(1999)
Proc. 3rd Information Hiding Workshop (IHW '99)
, pp. 361-375
-
-
Johnson, N.F.1
Duric, Z.2
Jajodia, S.3
-
49
-
-
0034501289
-
Geometric distortion correction through image normalization
-
New York, NY, USA, July-August
-
M. Alghoniemy and A. H. Tewfik, "Geometric distortion correction through image normalization," in Proc. IEEE International Conference on Multimedia and Expo (ICME '00), vol. 3, pp. 1291-1294, New York, NY, USA, July-August 2000.
-
(2000)
Proc. IEEE International Conference on Multimedia and Expo (ICME '00)
, vol.3
, pp. 1291-1294
-
-
Alghoniemy, M.1
Tewfik, A.H.2
-
50
-
-
85032751604
-
Collusion-resistant fingerprinting for multimedia
-
M. Wu, W. Trappe, Z. J. Wang, and K. J. R. Liu, "Collusion-resistant fingerprinting for multimedia," IEEE Signal Processing Mag., vol. 21, no. 2, pp. 15-27, 2004.
-
(2004)
IEEE Signal Processing Mag.
, vol.21
, Issue.2
, pp. 15-27
-
-
Wu, M.1
Trappe, W.2
Wang, Z.J.3
Liu, K.J.R.4
-
51
-
-
0035171717
-
A content dependent spatially localized video watermark for resistance to collusion and interpolation attacks
-
Thessaloniki, Greece, October
-
K. Su, D. Kundur, and D. Hatzinakos, "A content dependent spatially localized video watermark for resistance to collusion and interpolation attacks," in Proc. IEEE International Conference on Image Processing (ICIP '01), vol. 1, pp. 818-821, Thessaloniki, Greece, October 2001.
-
(2001)
Proc. IEEE International Conference on Image Processing (ICIP '01)
, vol.1
, pp. 818-821
-
-
Su, K.1
Kundur, D.2
Hatzinakos, D.3
-
52
-
-
0032070304
-
Multiresolution scene-based video watermarking using perceptual models
-
M. D. Swanson, B. Zhu, and A. H. Tewfik, "Multiresolution scene-based video watermarking using perceptual models," IEEE J. Select. Areas Commun., vol. 16, no. 4, pp. 540-550, 1998.
-
(1998)
IEEE J. Select. Areas Commun.
, vol.16
, Issue.4
, pp. 540-550
-
-
Swanson, M.D.1
Zhu, B.2
Tewfik, A.H.3
-
53
-
-
0038104797
-
Blind pattern matching attack on watermarking systems
-
D. Kirovski and F. A. P. Petitcolas, "Blind pattern matching attack on watermarking systems," IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 1045- 1053, 2003.
-
(2003)
IEEE Trans. Signal Processing
, vol.51
, Issue.4
, pp. 1045-1053
-
-
Kirovski, D.1
Petitcolas, F.A.P.2
-
54
-
-
0003506181
-
-
Springer, New York, NY, USA, 2nd edition
-
H. V. Poor, An Introduction to Signal Detection and Estimation, Springer, New York, NY, USA, 2nd edition, 1999.
-
(1999)
An Introduction to Signal Detection and Estimation
-
-
Poor, H.V.1
-
55
-
-
0038156469
-
Data hiding in image and video. II. Designs and applications
-
M. Wu, H. Yu, and B. Liu, "Data hiding in image and video. II. Designs and applications," IEEE Trans. Image Processing, vol. 12, no. 6, pp. 696-705, 2003.
-
(2003)
IEEE Trans. Image Processing
, vol.12
, Issue.6
, pp. 696-705
-
-
Wu, M.1
Yu, H.2
Liu, B.3
-
56
-
-
0034780384
-
Optimal adaptive diversity watermarking with channel state estimation
-
San Jose, Calif, USA, January
-
S. V. Voloshynovskiy, F.Deguillaume, S. Pereira, and T. Pun, "Optimal adaptive diversity watermarking with channel state estimation," in Security and Watermarking of Multimedia Contents III, vol. 4314 of Proceedings of SPIE, pp. 673-685, San Jose, Calif, USA, January 2001.
-
(2001)
Security and Watermarking of Multimedia Contents III, Vol. 4314 of Proceedings of SPIE
, pp. 673-685
-
-
Voloshynovskiy, S.V.1
Deguillaume, F.2
Pereira, S.3
Pun, T.4
-
57
-
-
0033882559
-
DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure
-
Special Issue on Image and Video Processing for Digital Libraries
-
J. R. Hernandez, M. Amado, and F. Perez-Gonzalez, "DCT-domain watermarking techniques for still images: detector performance analysis and a new structure," IEEE Trans. Image Processing, vol. 9, no. 1, pp. 55-68, 2000, Special Issue on Image and Video Processing for Digital Libraries.
-
(2000)
IEEE Trans. Image Processing
, vol.9
, Issue.1
, pp. 55-68
-
-
Hernandez, J.R.1
Amado, M.2
Perez-Gonzalez, F.3
-
58
-
-
20444373301
-
Anti-collusion forensics ofmultimedia fingerprinting using orthogonalmodulation
-
Z. J.Wang, M. Wu, H. Zhao, W. Trappe, and K. J. R. Liu, "Anti-collusion forensics ofmultimedia fingerprinting using orthogonalmodulation," IEEE Trans. Image Processing, vol. 14, no. 6, pp. 804-821, 2005.
-
(2005)
IEEE Trans. Image Processing
, vol.14
, Issue.6
, pp. 804-821
-
-
Wang, Z.J.1
Wu, M.2
Zhao, H.3
Trappe, W.4
Liu, K.J.R.5
-
59
-
-
0141856343
-
Resistance of orthogonal Gaussian fingerprints to collusion attacks
-
Hong Kong, China, April
-
Z. J. Wang, M. Wu, H. Zhao, K. J. R. Liu, and W. Trappe, "Resistance of orthogonal Gaussian fingerprints to collusion attacks," in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '03), vol. 4, pp. 724-727, Hong Kong, China, April 2003.
-
(2003)
Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '03)
, vol.4
, pp. 724-727
-
-
Wang, Z.J.1
Wu, M.2
Zhao, H.3
Liu, K.J.R.4
Trappe, W.5
-
60
-
-
0141855111
-
Nonlinear collusion attacks on independent fingerprints for multimedia
-
Hong Kong, China, April
-
H. Zhao, M. Wu, Z. J. Wang, and K. J. R. Liu, "Nonlinear collusion attacks on independent fingerprints for multimedia," in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '03), vol. 5, pp. 664-667, Hong Kong, China, April 2003.
-
(2003)
Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '03)
, vol.5
, pp. 664-667
-
-
Zhao, H.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
-
61
-
-
0003808672
-
-
Ginn and Company, Boston, Mass, USA
-
H. D. Brunk, An Introduction to Mathematical Statistics, Ginn and Company, Boston, Mass, USA, 1960.
-
(1960)
An Introduction to Mathematical Statistics
-
-
Brunk, H.D.1
-
62
-
-
0003538515
-
Analysis of attacks on image watermarks with randomized coefficients
-
NEC Research Institute, Princeton, NJ, USA
-
H. Stone, "Analysis of attacks on image watermarks with randomized coefficients," Tech. Rep. 96-045, NEC Research Institute, Princeton, NJ, USA, 1996.
-
(1996)
Tech. Rep. 96-045
-
-
Stone, H.1
-
63
-
-
0030407057
-
Transparent robust image watermarking
-
Lausanne, Switzerland, September
-
M. D. Swanson, B. Zhu, and A.H. Tewfik, "Transparent robust image watermarking," in Proc. International Conference on Image Processing (ICIP '96), vol. 3, pp. 211-214, Lausanne, Switzerland, September 1996.
-
(1996)
Proc. International Conference on Image Processing (ICIP '96)
, vol.3
, pp. 211-214
-
-
Swanson, M.D.1
Zhu, B.2
Tewfik, A.H.3
-
64
-
-
85076001847
-
An improved detection model for DCT coefficient quantization
-
Bellingham,Wash, USA, February
-
H. A. Peterson, A. J. Ahumada Jr., and A. B. Watson, "An improved detection model for DCT coefficient quantization," in Human Vision, Visual Processing, and Digital Display IV, vol. 1913 of Proceedings of SPIE, pp. 191- 201, Bellingham,Wash, USA, February 1993.
-
(1993)
Human Vision, Visual Processing, and Digital Display IV, Vol. 1913 of Proceedings of SPIE
, pp. 191-201
-
-
Peterson, H.A.1
Ahumada Jr., A.J.2
Watson, A.B.3
-
65
-
-
85076054853
-
DCT quantization matrices visually optimized for individual images
-
San Jose, Calif, USA, February
-
A. B. Watson, "DCT quantization matrices visually optimized for individual images," in Human Vision, Visual Processing, and Digital Display IV, vol. 1913 of Proceedings of SPIE, pp. 202-216, San Jose, Calif, USA, February 1993.
-
(1993)
Human Vision, Visual Processing, and Digital Display IV, Vol. 1913 of Proceedings of SPIE
, pp. 202-216
-
-
Watson, A.B.1
-
67
-
-
0026818192
-
The JPEG still picture compression standard
-
G. K. Wallace, "The JPEG still picture compression standard," IEEE Trans. Consumer Electron., vol. 38, no. 1, pp. 18-34, 1992.
-
(1992)
IEEE Trans. Consumer Electron.
, vol.38
, Issue.1
, pp. 18-34
-
-
Wallace, G.K.1
-
68
-
-
0030672116
-
Adaptive watermarking in the DCT domain
-
Munich, Germany, April
-
B. Tao and B. Dickinson, "Adaptive watermarking in the DCT domain," in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '97), vol. 4, pp. 2985-2988, Munich, Germany, April 1997.
-
(1997)
Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '97)
, vol.4
, pp. 2985-2988
-
-
Tao, B.1
Dickinson, B.2
-
69
-
-
84957610906
-
A note on the limits of collusion-resistant watermarks
-
Prague, Czech Republic, May
-
F. Ergun, J. Kilian, and R. Kumar, "A note on the limits of collusion-resistant watermarks," in Advances in Cryptology (Eurocrypt '99), vol. 1592 of Lecture Notes in Computer Science, pp. 140-149, Prague, Czech Republic,May 1999.
-
(1999)
Advances in Cryptology (Eurocrypt '99), Vol. 1592 of Lecture Notes in Computer Science
, pp. 140-149
-
-
Ergun, F.1
Kilian, J.2
Kumar, R.3
-
70
-
-
0037796443
-
Resistance of digital watermarks to collusive attacks
-
Department of Computer Science, Princeton University, Princeton, NJ, USA
-
J. Kilian, F. T. Leighton, L. R. Matheson, T. G. Shamoon, R. Tajan, and F. Zane, "Resistance of digital watermarks to collusive attacks," Tech. Rep. TR- 585-98, Department of Computer Science, Princeton University, Princeton, NJ, USA, 1998.
-
(1998)
Tech. Rep. TR-585-98
-
-
Kilian, J.1
Leighton, F.T.2
Matheson, L.R.3
Shamoon, T.G.4
Tajan, R.5
Zane, F.6
-
71
-
-
33645654061
-
Improving collusion resistance of error correcting code basedmultimedia fingerprinting
-
Philadelphia, Pa, USA, March
-
S. He and M. Wu, "Improving collusion resistance of error correcting code basedmultimedia fingerprinting," in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '05), vol. 2, pp. 1029-1032, Philadelphia, Pa, USA, March 2005.
-
(2005)
Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '05)
, vol.2
, pp. 1029-1032
-
-
He, S.1
Wu, M.2
-
72
-
-
84937053497
-
Capacity of digital watermarks subjected to an optimal collusion attack
-
Tampere, Finland, September
-
J. Su, J. Eggers, and B. Girod, "Capacity of digital watermarks subjected to an optimal collusion attack," in Proc. 10th European Signal Processing Conference (EUSIPCO '00), Tampere, Finland, September 2000.
-
(2000)
Proc. 10th European Signal Processing Conference (EUSIPCO '00)
-
-
Su, J.1
Eggers, J.2
Girod, B.3
-
73
-
-
18844402053
-
Histo-cepstral analysis for reverseengineering watermarks
-
Princeton, NJ, USA, March
-
S. Craver, B. Liu, and W. Wolf, "Histo-cepstral analysis for reverseengineering watermarks," in Proc. 38th Conference on Information Sciences and Systems (CISS '04), pp. 824-826, Princeton, NJ, USA, March 2004.
-
(2004)
Proc. 38th Conference on Information Sciences and Systems (CISS '04)
, pp. 824-826
-
-
Craver, S.1
Liu, B.2
Wolf, W.3
-
74
-
-
0003707560
-
-
John Wiley & Sons, New York, NY, USA, 2nd edition
-
H. A. David, Order Statistics, John Wiley & Sons, New York, NY, USA, 2nd edition, 1981.
-
(1981)
Order Statistics
-
-
David, H.A.1
-
75
-
-
0037823843
-
Adaptive quadrature - revisited
-
W. Gander andW. Gautschi, "Adaptive quadrature - revisited," BIT Numerical Mathematics, vol. 40, no. 1, pp. 84-101, 2000.
-
(2000)
BIT Numerical Mathematics
, vol.40
, Issue.1
, pp. 84-101
-
-
Gander, W.1
Gautschi, W.2
-
76
-
-
18844458745
-
Performance of detection statistics under collusion attacks on independent multimedia fingerprints
-
Baltimore, Md, USA, July
-
H. Zhao, M. Wu, Z. J.Wang, and K. J. R. Liu, "Performance of detection statistics under collusion attacks on independent multimedia fingerprints," in Proc. IEEE International Conference onMultimedia and Expo (ICME '03), vol. 1, pp. 205-208, Baltimore, Md, USA, July 2003.
-
(2003)
Proc. IEEE International Conference OnMultimedia and Expo (ICME '03)
, vol.1
, pp. 205-208
-
-
Zhao, H.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
-
77
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," IEEE Trans. Inform. Theory, vol. 44, no. 5, pp. 1897-1905, 1998.
-
(1998)
IEEE Trans. Inform. Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
78
-
-
84944317710
-
Efficient watermark detection and collusion security
-
Anguilla, BritishWest Indies, February
-
F. Zane, "Efficient watermark detection and collusion security," in Proc. Financial Cryptography (FC '00), vol. 1962 of Lecture Notes in Computer Science, pp. 21-32, Anguilla, BritishWest Indies, February 2000.
-
(2000)
Proc. Financial Cryptography (FC '00), Vol. 1962 of Lecture Notes in Computer Science
, pp. 21-32
-
-
Zane, F.1
-
79
-
-
0038156437
-
Data hiding in image and video. I. Fundamental issues and solutions
-
M. Wu and B. Liu, "Data hiding in image and video. I. Fundamental issues and solutions," IEEE Trans. Image Processing, vol. 12, no. 6, pp. 685-695, 2003.
-
(2003)
IEEE Trans. Image Processing
, vol.12
, Issue.6
, pp. 685-695
-
-
Wu, M.1
Liu, B.2
-
80
-
-
0038527384
-
Anti-collusion fingerprinting for multimedia
-
Special Issue on Signal Processing for Data Hiding in Digital Media
-
W. Trappe,M.Wu, Z. J.Wang, and K. J. R. Liu, "Anti-collusion fingerprinting for multimedia," IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 1069- 1087, 2003, Special Issue on Signal Processing for Data Hiding in Digital Media.
-
(2003)
IEEE Trans. Signal Processing
, vol.51
, Issue.4
, pp. 1069-1087
-
-
Trappe, W.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
-
81
-
-
20444370385
-
Appendix 3b: The Gaussian integral q(x)
-
Prentice Hall, Englewood Cliffs, NJ, USA
-
M. K. Simon, S. M. Hinedi, and W. C. Lindsey, "Appendix 3b: the Gaussian integral q(x)," in Digital Communication Techniques: Signal Design and Detection, Prentice Hall, Englewood Cliffs, NJ, USA, 1995.
-
(1995)
Digital Communication Techniques: Signal Design and Detection
-
-
Simon, M.K.1
Hinedi, S.M.2
Lindsey, W.C.3
-
82
-
-
18844450187
-
Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting
-
H. Zhao, M. Wu, Z. J. Wang, and K. J. R. Liu, "Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting," IEEE Trans. Image Processing, vol. 14, no. 5, pp. 646-661, 2005.
-
(2005)
IEEE Trans. Image Processing
, vol.14
, Issue.5
, pp. 646-661
-
-
Zhao, H.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
-
83
-
-
84947900806
-
Secure copyright protection techniques for digital images
-
Portland, Ore, USA, April
-
A. Herrigel, J. J. K. Ó Ruanaidh, H. Petersen, S. Pereira, and T. Pun, "Secure copyright protection techniques for digital images," in Proc. 2nd Information Hiding Workshop (IHW '98), vol. 1525 of Lecture Notes in Computer Science, pp. 169-190, Portland, Ore, USA, April 1998.
-
(1998)
Proc. 2nd Information Hiding Workshop (IHW '98), Vol. 1525 of Lecture Notes in Computer Science
, pp. 169-190
-
-
Herrigel, A.1
Ó, J.J.K.2
Petersen, R.H.3
Pereira, S.4
Pun, T.5
-
84
-
-
0004116989
-
-
McGraw-Hill, New York, NY, USA
-
T. H. Cormen, C. E. Leiserson, and R. L. Rivest, Introduction to Algorithms, McGraw-Hill, New York, NY, USA, 1989.
-
(1989)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
-
85
-
-
0002400370
-
Searching in the presence of linearly bounded errors
-
ACM Press, New Orleans, La, USA, May
-
J. A. Aslam and A. Dhagat, "Searching in the presence of linearly bounded errors," in Proc. 23rd Annual ACM Symposium on Theory of Computing (STOC '91), pp. 486-493, ACM Press, New Orleans, La, USA, May 1991.
-
(1991)
Proc. 23rd Annual ACM Symposium on Theory of Computing (STOC '91)
, pp. 486-493
-
-
Aslam, J.A.1
Dhagat, A.2
-
86
-
-
0028381404
-
Modifications of competitive group testing
-
D.-Z. Du, G.-L. Xue, S.-Z. Sun, and S.-W. Cheng, "Modifications of competitive group testing," SIAM Journal on Computing, vol. 23, no. 1, pp. 82- 96, 1994.
-
(1994)
SIAM Journal on Computing
, vol.23
, Issue.1
, pp. 82-96
-
-
Du, D.-Z.1
Xue, G.-L.2
Sun, S.-Z.3
Cheng, S.-W.4
-
87
-
-
0028516487
-
On competitive group testing
-
D.-Z. Du and H. Park, "On competitive group testing," SIAM Journal on Computing, vol. 23, no. 5, pp. 1019-1025, 1994.
-
(1994)
SIAM Journal on Computing
, vol.23
, Issue.5
, pp. 1019-1025
-
-
Du, D.-Z.1
Park, H.2
-
88
-
-
0035767626
-
Modulation and multiplexing techniques for multimedia data hiding
-
Denver, Colo, USA, August
-
M.Wu and B. Liu, "Modulation and multiplexing techniques for multimedia data hiding," in Multimedia Systems and Applications IV, vol. 4518 of Proceedings of SPIE, pp. 228-238, Denver, Colo, USA, August 2001.
-
(2001)
Multimedia Systems and Applications IV, Vol. 4518 of Proceedings of SPIE
, pp. 228-238
-
-
Wu, M.1
Liu, B.2
-
89
-
-
0003807773
-
-
Prentice Hall, Englewood Cliffs, NJ, USA
-
E. Lehmann, Adaptive Filter Theory, Prentice Hall, Englewood Cliffs, NJ, USA, 1996.
-
(1996)
Adaptive Filter Theory
-
-
Lehmann, E.1
-
91
-
-
0004111233
-
-
Prentice Hall, New York, NY, USA, 3rd edition
-
H. Stark and J. Woods, Probability and Random Processes with Applications to Signal Processing, Prentice Hall, New York, NY, USA, 3rd edition, 2002.
-
(2002)
Probability and Random Processes with Applications to Signal Processing
-
-
Stark, H.1
Woods, J.2
-
92
-
-
84937541590
-
Improved Boneh-Shaw content fingerprinting
-
San Francisco, Calif, USA, April
-
Y. Yacobi, "Improved Boneh-Shaw content fingerprinting," in Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference (CT-RSA '01), vol. 2020 of Lecture Notes in Computer Science, pp. 378-391, San Francisco, Calif, USA, April 2001.
-
(2001)
Topics in Cryptology - CT-RSA 2001, the Cryptographer's Track at RSA Conference (CT-RSA '01), Vol. 2020 of Lecture Notes in Computer Science
, pp. 378-391
-
-
Yacobi, Y.1
-
93
-
-
0036293565
-
Collusion-resistant fingerprinting for multimedia
-
Orlando, Fla, USA, May
-
W. Trappe, M. Wu, and K. J. R. Liu, "Collusion-resistant fingerprinting for multimedia," in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '02), vol. 4, pp. 3309-3312, Orlando, Fla, USA, May 2002.
-
(2002)
Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '02)
, vol.4
, pp. 3309-3312
-
-
Trappe, W.1
Wu, M.2
Liu, K.J.R.3
-
94
-
-
0004162159
-
-
JohnWiley & Sons, New York, NY, USA
-
J. H. Dinitz and D. R. Stinson, Contemporary Design Theory: A Collection of Surveys, JohnWiley & Sons, New York, NY, USA, 1992.
-
(1992)
Contemporary Design Theory: A Collection of Surveys
-
-
Dinitz, J.H.1
Stinson, D.R.2
-
95
-
-
0003938168
-
-
CRC Press, Boca Raton, Fla, USA
-
C. J. Colbourn and J. H. Dinitz, The CRC Handbook of Combinatorial Designs, CRC Press, Boca Raton, Fla, USA, 1996.
-
(1996)
The CRC Handbook of Combinatorial Designs
-
-
Colbourn, C.J.1
Dinitz, J.H.2
-
96
-
-
0000676728
-
Combining digital watermarks and collusion secure fingerprints for digital images
-
J. Dittmann, P. Schmitt, E. Saar, J. Schwenk, and J. Ueberberg, "Combining digital watermarks and collusion secure fingerprints for digital images," SPIE Journal of Electronic Imaging, vol. 9, no. 4, pp. 456-467, 2000.
-
(2000)
SPIE Journal of Electronic Imaging
, vol.9
, Issue.4
, pp. 456-467
-
-
Dittmann, J.1
Schmitt, P.2
Saar, E.3
Schwenk, J.4
Ueberberg, J.5
-
97
-
-
0003773164
-
-
CRC Press, Boca Raton, Fla, USA
-
C. C. Lindner and C. A. Rodger, Design Theory, CRC Press, Boca Raton, Fla, USA, 1997.
-
(1997)
Design Theory
-
-
Lindner, C.C.1
Rodger, C.A.2
-
99
-
-
0027542641
-
Maximum likelihood parameter estimation of superimposed signals by dynamic programming
-
S. F. Yau and Y. Bresler, "Maximum likelihood parameter estimation of superimposed signals by dynamic programming," IEEE Trans. Signal Processing, vol. 41, no. 2, pp. 804-820, 1993.
-
(1993)
IEEE Trans. Signal Processing
, vol.41
, Issue.2
, pp. 804-820
-
-
Yau, S.F.1
Bresler, Y.2
-
100
-
-
0024089986
-
Maximum likelihood localization of multiple sources by alternating projection
-
I. Ziskind and M. Wax, "Maximum likelihood localization of multiple sources by alternating projection," IEEE Trans. Acoust., Speech, Signal Processing, vol. 36, no. 10, pp. 1553-1560, 1988.
-
(1988)
IEEE Trans. Acoust., Speech, Signal Processing
, vol.36
, Issue.10
, pp. 1553-1560
-
-
Ziskind, I.1
Wax, M.2
-
101
-
-
0028540116
-
A least-squares algorithm for multipath time-delay estimation
-
T. G. Manickam, R. J. Vaccaro, and D. W. Tufts, "A least-squares algorithm for multipath time-delay estimation," IEEE Trans. Signal Processing, vol. 42, no. 11, pp. 3229-3233, 1994.
-
(1994)
IEEE Trans. Signal Processing
, vol.42
, Issue.11
, pp. 3229-3233
-
-
Manickam, T.G.1
Vaccaro, R.J.2
Tufts, D.W.3
-
102
-
-
18844443043
-
Anti-collusion of grouporiented fingerprinting
-
Baltimore, Md, USA, July
-
Z. J. Wang, M. Wu, W. Trappe, and K. J. R. Liu, "Anti-collusion of grouporiented fingerprinting," in Proc. IEEE International Conference on Multimedia and Expo (ICME '03), vol. 2, pp. 217-220, Baltimore, Md, USA, July 2003.
-
(2003)
Proc. IEEE International Conference on Multimedia and Expo (ICME '03)
, vol.2
, pp. 217-220
-
-
Wang, Z.J.1
Wu, M.2
Trappe, W.3
Liu, K.J.R.4
-
103
-
-
24344436358
-
Collusion-resistant fingerprints from WBE sequence sets
-
to appear, Seoul, Korea, May
-
Z. Li and W. Trappe, "Collusion-resistant fingerprints from WBE sequence sets," to appear in Proc. IEEE International Conference on Communications (ICC '05), Seoul, Korea, May 2005.
-
(2005)
Proc. IEEE International Conference on Communications (ICC '05)
-
-
Li, Z.1
Trappe, W.2
-
104
-
-
0031644084
-
The shortest vector problem in L2 is NP-Hard for randomized reductions
-
Dallas, Tex, USA, May
-
M. Ajtai, "The shortest vector problem in L2 is NP-Hard for randomized reductions," in Proc. 30th Annual ACM Symposium on Theory of Computing (STOC '98), pp. 10-19, Dallas, Tex, USA, May 1998.
-
(1998)
Proc. 30th Annual ACM Symposium on Theory of Computing (STOC '98)
, pp. 10-19
-
-
Ajtai, M.1
-
105
-
-
84966239268
-
Improvedmethods for calculating vectors of short length in a lattice, including a complexity analysis
-
U. Fincke andM. Pohst, "Improvedmethods for calculating vectors of short length in a lattice, including a complexity analysis,"Mathematics of Computation, vol. 44, no. 4, pp. 463-471, 1985.
-
(1985)
Mathematics of Computation
, vol.44
, Issue.4
, pp. 463-471
-
-
Fincke, U.1
Pohst, M.2
-
106
-
-
0004014971
-
-
Kluwer Academic, Boston, Mass, USA
-
S. Paul, Multicast on the Internet and Its Application, Kluwer Academic, Boston, Mass, USA, 1998.
-
(1998)
Multicast on the Internet and Its Application
-
-
Paul, S.1
-
107
-
-
0035009221
-
Modeling the branching characteristics and efficiency gains in globalmulticast trees
-
Anchorage, Alaska, USA, April
-
R. C. Chalmers and K. C. Almeroth, "Modeling the branching characteristics and efficiency gains in globalmulticast trees," in Proc. 20th IEEE Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '01), vol. 1, pp. 449-458, Anchorage, Alaska, USA, April 2001.
-
(2001)
Proc. 20th IEEE Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '01)
, vol.1
, pp. 449-458
-
-
Chalmers, R.C.1
Almeroth, K.C.2
-
108
-
-
77958563955
-
Fingerprint multicast in secure video streaming
-
to appear, Fall
-
H. Zhao and K. J. R. Liu, "Fingerprint multicast in secure video streaming," to appear in IEEE Trans. Image Processing, Fall 2005.
-
(2005)
IEEE Trans. Image Processing
-
-
Zhao, H.1
Liu, K.J.R.2
-
109
-
-
0004198635
-
-
Prentice Hall PTR, Upper Saddle River, NJ, USA
-
C. Pfleeger, Security in Computing, Prentice Hall PTR, Upper Saddle River, NJ, USA, 1996.
-
(1996)
Security in Computing
-
-
Pfleeger, C.1
-
110
-
-
0032075477
-
Some general methods for tampering with watermarks
-
I. J. Cox and J.-P. M. G. Linnartz, "Some general methods for tampering with watermarks," IEEE J. Select. Areas Commun., vol. 16, no. 4, pp. 587- 593, 1998.
-
(1998)
IEEE J. Select. Areas Commun.
, vol.16
, Issue.4
, pp. 587-593
-
-
Cox, I.J.1
Linnartz, J.-P.M.G.2
-
111
-
-
0033601672
-
Spread spectrum watermarking: Malicious attacks and counterattacks
-
San Jose, Calif, USA, April
-
F. Hartung, J. K. Su, and B. Girod, "Spread spectrum watermarking: Malicious attacks and counterattacks," in Security and Watermarking of Multimedia Contents, Electronic Imaging, vol. 3657 of Proceedings of SPIE, pp. 147-158, San Jose, Calif, USA, April 1999.
-
(1999)
Security and Watermarking of Multimedia Contents, Electronic Imaging, Vol. 3657 of Proceedings of SPIE
, pp. 147-158
-
-
Hartung, F.1
Su, J.K.2
Girod, B.3
-
112
-
-
4544310181
-
A secure multicast protocol with copyright protection
-
H.-H. Chu, L. Qiao, and K. Nahrstedt, "A secure multicast protocol with copyright protection," ACM SIGCOMM Computer Communications Review, vol. 32, no. 2, pp. 42-60, 2002.
-
(2002)
ACM SIGCOMM Computer Communications Review
, vol.32
, Issue.2
, pp. 42-60
-
-
Chu, H.-H.1
Qiao, L.2
Nahrstedt, K.3
-
113
-
-
11144253373
-
Video fingerprinting and encryption principles for digital rights management
-
D. Kundur and K. Karthik, "Video fingerprinting and encryption principles for digital rights management," Proc. IEEE, vol. 92, no. 6, pp. 918-932, 2004.
-
(2004)
Proc. IEEE
, vol.92
, Issue.6
, pp. 918-932
-
-
Kundur, D.1
Karthik, K.2
-
114
-
-
84957663275
-
Watercasting: Distributed watermarking of multicast media
-
Pisa, Italy, November
-
I. Brown, C. Perkins, and J. Crowcroft, "Watercasting: Distributed watermarking of multicast media," in Proc. 1st International Workshop on Networked Group Communication (NGC '99), pp. 286-300, Pisa, Italy, November 1999.
-
(1999)
Proc. 1st International Workshop on Networked Group Communication (NGC '99)
, pp. 286-300
-
-
Brown, I.1
Perkins, C.2
Crowcroft, J.3
-
115
-
-
84873648175
-
Enabling hierarchical and bulk-distribution for watermarked content
-
New Orleans, La, USA, December
-
G. Caronni and C. Schuba, "Enabling hierarchical and bulk-distribution for watermarked content," in Proc. 17th Annual Computer Security Applications Conference (ACSAC '01), pp. 277-285, New Orleans, La, USA, December 2001.
-
(2001)
Proc. 17th Annual Computer Security Applications Conference (ACSAC '01)
, pp. 277-285
-
-
Caronni, G.1
Schuba, C.2
-
116
-
-
30144438818
-
-
Tech. Rep., Object Systems Group, Center Universitaire d'Informatique of University of Geneva, Geneva, Switzerland
-
D. Konstantas and D. Thanos, "Commercial dissemination of video over open networks: issues and approaches," Tech. Rep., Object Systems Group, Center Universitaire d'Informatique of University of Geneva, Geneva, Switzerland, 2000.
-
(2000)
Commercial Dissemination of Video over Open Networks: Issues and Approaches
-
-
Konstantas, D.1
Thanos, D.2
-
117
-
-
30144438577
-
Enabling hierarchical and bulk-distribution for watermarked content
-
Darmstadt, Germany, May
-
R. Parviainen and R. Parnes, "Enabling hierarchical and bulk-distribution for watermarked content," in Proc. IFIP TC6/TC11 International Conference on Communications and Multimedia Security Issues, vol. 192, Darmstadt, Germany, May 2001.
-
(2001)
Proc. IFIP TC6/TC11 International Conference on Communications and Multimedia Security Issues
, vol.192
-
-
Parviainen, R.1
Parnes, R.2
-
118
-
-
10044241476
-
WHIM:Watermarking multicast video with a hierarchy of intermediaries
-
Chapel Hill, NC, USA, June
-
P. Judge and M. Ammar, "WHIM:Watermarking multicast video with a hierarchy of intermediaries," in Proc. 10th InternationalWorkshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV '00), Chapel Hill, NC, USA, June 2000.
-
(2000)
Proc. 10th InternationalWorkshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV '00)
-
-
Judge, P.1
Ammar, M.2
-
119
-
-
7644221206
-
Selective encryption and watermarking of MPEG video
-
Las Vegas, Nev, USA, June-July
-
T. Wu and S. F. Wu, "Selective encryption and watermarking of MPEG video," in Proc. International Conference on Imaging Science, Systems, and Technology (CISST '97), Las Vegas, Nev, USA, June-July 1997.
-
(1997)
Proc. International Conference on Imaging Science, Systems, and Technology (CISST '97)
-
-
Wu, T.1
Wu, S.F.2
-
120
-
-
11844303521
-
Group-oriented fingerprinting formultimedia forensics
-
Z. J. Wang, M. Wu, W. Trappe, and K. J. R. Liu, "Group-oriented fingerprinting formultimedia forensics," EURASIP Journal on Applied Signal Processing, vol. 2004, no. 14, pp. 2153-2173, 2004.
-
(2004)
EURASIP Journal on Applied Signal Processing
, vol.2004
, Issue.14
, pp. 2153-2173
-
-
Wang, Z.J.1
Wu, M.2
Trappe, W.3
Liu, K.J.R.4
-
121
-
-
4544295238
-
Bandwidth efficient fingerprint multicast for video streaming
-
Montreal, Quebec, Canada, May
-
H. Zhao and K. J. R. Liu, "Bandwidth efficient fingerprint multicast for video streaming," in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '04), vol. 5, pp. 849-852, Montreal, Quebec, Canada, May 2004.
-
(2004)
Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '04)
, vol.5
, pp. 849-852
-
-
Zhao, H.1
Liu, K.J.R.2
-
122
-
-
84942242681
-
Communication-friendly encryption of multimedia
-
St. Thomas, Virgin Islands, USA, December
-
M. Wu and Y. Mao, "Communication-friendly encryption of multimedia," in IEEE Workshop on Multimedia Signal Processing (MMSP '02), pp. 292- 295, St. Thomas, Virgin Islands, USA, December 2002.
-
(2002)
IEEE Workshop on Multimedia Signal Processing (MMSP '02)
, pp. 292-295
-
-
Wu, M.1
Mao, Y.2
-
123
-
-
0011081382
-
A new algorithm for MPEG video encryption
-
Las Vegas, Nev, USA, June
-
L. Qiao and K. Nahrstedt, "A new algorithm for MPEG video encryption," in Proc. International Conference on Imaging Science, Systems and Technology (CISST '97), pp. 21-29, Las Vegas, Nev, USA, June 1997.
-
(1997)
Proc. International Conference on Imaging Science, Systems and Technology (CISST '97)
, pp. 21-29
-
-
Qiao, L.1
Nahrstedt, K.2
-
124
-
-
18144414571
-
A secure multicast scheme for anti-collusion fingerprinted video
-
Dallas, Tex, USA, November-December
-
H. Zhao and K. J. R. Liu, "A secure multicast scheme for anti-collusion fingerprinted video," in Proc. IEEE Global Telecommunications Conference (GLOBECOM '04), vol. 2, pp. 571-575, Dallas, Tex, USA, November- December 2004.
-
(2004)
Proc. IEEE Global Telecommunications Conference (GLOBECOM '04)
, vol.2
, pp. 571-575
-
-
Zhao, H.1
Liu, K.J.R.2
-
125
-
-
23044526820
-
Pricingmulticast communication: A costbased approach
-
J. C.-I. Chuang and M. A. Sirbu, "Pricingmulticast communication: A costbased approach," Telecommunication Systems, vol. 17, no. 3, pp. 281-297, 2001.
-
(2001)
Telecommunication Systems
, vol.17
, Issue.3
, pp. 281-297
-
-
Chuang, J.C.-I.1
Sirbu, M.A.2
-
126
-
-
0032072064
-
Watermarking of uncompressed and compressed video
-
F. Hartung and B. Girod, "Watermarking of uncompressed and compressed video," Signal Processing, vol. 66, no. 3, pp. 283-301, 1998.
-
(1998)
Signal Processing
, vol.66
, Issue.3
, pp. 283-301
-
-
Hartung, F.1
Girod, B.2
-
127
-
-
0141744760
-
Watermarking 2D/3D graphics for copyright protection
-
Hong Kong, China, April
-
H.-H. Chang, T. Chen, and K.-S. Kan, "Watermarking 2D/3D graphics for copyright protection," in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '03), vol. 4, pp. 720-723, Hong Kong, China, April 2003.
-
(2003)
Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '03)
, vol.4
, pp. 720-723
-
-
Chang, H.-H.1
Chen, T.2
Kan, K.-S.3
-
128
-
-
0036488241
-
Robust watermarking of cartographic images
-
M. Barni, F. Bartolini, A. Piva, and F. Salucco, "Robust watermarking of cartographic images," EURASIP Journal on Applied Signal Processing, vol. 2002, no. 2, pp. 197-208, 2002.
-
(2002)
EURASIP Journal on Applied Signal Processing
, vol.2002
, Issue.2
, pp. 197-208
-
-
Barni, M.1
Bartolini, F.2
Piva, A.3
Salucco, F.4
-
129
-
-
3042583370
-
Watermarking polygonal lines using Fourier descriptors
-
V. Solachidis and I. Pitas, "Watermarking polygonal lines using Fourier descriptors," IEEE Comput. Graph. Appl., vol. 24, no. 3, pp. 44-51, 2004.
-
(2004)
IEEE Comput. Graph. Appl.
, vol.24
, Issue.3
, pp. 44-51
-
-
Solachidis, V.1
Pitas, I.2
-
130
-
-
84884765600
-
Watermarking 2D vector maps in the mesh-spectral domain
-
Seoul, Korea, May
-
R. Ohbuchi, H. Ueda, and S. Endoh, "Watermarking 2D vector maps in the mesh-spectral domain," in Proc. Shape Modeling International (SMI '03), pp. 216-228, Seoul, Korea, May 2003.
-
(2003)
Proc. Shape Modeling International (SMI '03)
, pp. 216-228
-
-
Ohbuchi, R.1
Ueda, H.2
Endoh, S.3
-
131
-
-
0001320242
-
Embedding robust labels into images for copyright protection
-
Vienna, Austria, August
-
J. Zhao and E. Koch, "Embedding robust labels into images for copyright protection," in Proc. International Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, pp. 242-251, Vienna, Austria, August 1995.
-
(1995)
Proc. International Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies
, pp. 242-251
-
-
Zhao, J.1
Koch, E.2
-
132
-
-
0034515656
-
Data hiding in digital binary image
-
New York, NY, USA, July-August
-
M. Wu, E. Tang, and B. Lin, "Data hiding in digital binary image," in Proc. IEEE International Conference on Multimedia and Expo (ICME '00), vol. 1, pp. 393-396, New York, NY, USA, July-August 2000.
-
(2000)
Proc. IEEE International Conference on Multimedia and Expo (ICME '00)
, vol.1
, pp. 393-396
-
-
Wu, M.1
Tang, E.2
Lin, B.3
-
133
-
-
3242759877
-
Data hiding in binary image for authentication and annotation
-
M. Wu and B. Liu, "Data hiding in binary image for authentication and annotation," IEEE Trans. Multimedia, vol. 6, no. 4, pp. 528-538, 2004.
-
(2004)
IEEE Trans. Multimedia
, vol.6
, Issue.4
, pp. 528-538
-
-
Wu, M.1
Liu, B.2
-
134
-
-
0000370347
-
Video-steganography: How to secretly embed a signature in a picture
-
K. Matsui and K. Tanaka, "Video-steganography: how to secretly embed a signature in a picture," IMA Intellectual Property Project Proceedings, vol. 1, no. 1, pp. 187-205, 1994.
-
(1994)
IMA Intellectual Property Project Proceedings
, vol.1
, Issue.1
, pp. 187-205
-
-
Matsui, K.1
Tanaka, K.2
-
135
-
-
0031384941
-
Marking text documents
-
Santa Barbara, Calif, USA, October
-
N. F. Maxemchuk and S. Low, "Marking text documents," in Proc. IEEE International Conference on Image Processing (ICIP '97), vol. 3, pp. 13-13, Santa Barbara, Calif, USA, October 1997.
-
(1997)
Proc. IEEE International Conference on Image Processing (ICIP '97)
, vol.3
, pp. 13-13
-
-
Maxemchuk, N.F.1
Low, S.2
-
136
-
-
84947210322
-
A shape-preserving data embedding algorithm for NURBS curves and surfaces
-
Canmore, Canada, June
-
R. Ohbuchi, H. Masuda, and M. Aono, "A shape-preserving data embedding algorithm for NURBS curves and surfaces," in Proc. Computer Graphics International (CGI '99), pp. 180-188, Canmore, Canada, June 1999.
-
(1999)
Proc. Computer Graphics International (CGI '99)
, pp. 180-188
-
-
Ohbuchi, R.1
Masuda, H.2
Aono, M.3
-
137
-
-
84942235270
-
Watermarking for 3D NURBS graphic data
-
St. Thomas, Virgin Islands, USA, December
-
J. J. Lee, N. I. Cho, and J. W. Kim, "Watermarking for 3D NURBS graphic data," in Proc. IEEEWorkshop onMultimedia Signal Processing (MMSP '02), pp. 304-307, St. Thomas, Virgin Islands, USA, December 2002.
-
(2002)
Proc. IEEEWorkshop OnMultimedia Signal Processing (MMSP '02)
, pp. 304-307
-
-
Lee, J.J.1
Cho, N.I.2
Kim, J.W.3
-
138
-
-
11844252646
-
Watermarking algorithms for 3D nurbs graphic data
-
J. J. Lee, N. I. Cho, and S. U. Lee, "Watermarking algorithms for 3D nurbs graphic data," EURASIP Journal on Applied Signal Processing, vol. 2004, no. 14, pp. 2142-2152, 2004.
-
(2004)
EURASIP Journal on Applied Signal Processing
, vol.2004
, Issue.14
, pp. 2142-2152
-
-
Lee, J.J.1
Cho, N.I.2
Lee, S.U.3
-
139
-
-
0038717860
-
Shape intrinsic fingerprints for free-form object matching
-
Seattle, Wash, USA, June
-
K. H. Ko, T. Maekawa, N. M. Patrikalakis, H. Masuda, and F.-E. Wolter, "Shape intrinsic fingerprints for free-form object matching," in Proc. 8th ACM Symposium on Solid Modeling and Applications, pp. 196-207, Seattle, Wash, USA, June 2003.
-
(2003)
Proc. 8th ACM Symposium on Solid Modeling and Applications
, pp. 196-207
-
-
Ko, K.H.1
Maekawa, T.2
Patrikalakis, N.M.3
Masuda, H.4
Wolter, F.-E.5
-
141
-
-
20444477579
-
Data hiding in curves for collusion-resistant digital fingerprinting
-
Singapore, October
-
H. Gou and M. Wu, "Data hiding in curves for collusion-resistant digital fingerprinting," in Proc. IEEE International Conference on Image Processing (ICIP '04), vol. 1, pp. 51-54, Singapore, October 2004.
-
(2004)
Proc. IEEE International Conference on Image Processing (ICIP '04)
, vol.1
, pp. 51-54
-
-
Gou, H.1
Wu, M.2
-
142
-
-
85086953172
-
Fingerprinting curves
-
Seoul, Korea, October-November
-
H. Gou and M. Wu, "Fingerprinting curves," in Proc. IEEE International Workshop on Digital Watermarking (IWDW '04), pp. 13-28, Seoul, Korea, October-November 2004.
-
(2004)
Proc. IEEE International Workshop on Digital Watermarking (IWDW '04)
, pp. 13-28
-
-
Gou, H.1
Wu, M.2
-
143
-
-
0003409571
-
-
Prentice Hall, Englewood Cliffs, NJ, USA
-
A. K. Jain, Fundamentals of Digital Image Processing, Prentice Hall, Englewood Cliffs, NJ, USA, 1989.
-
(1989)
Fundamentals of Digital Image Processing
-
-
Jain, A.K.1
-
144
-
-
0003655743
-
-
Academic Press, New York, NY, USA, 4th edition
-
G. E. Farin, Curves and Surfaces for Computer-Aided Geometric Design: A Practical Guide, Academic Press, New York, NY, USA, 4th edition, 1997.
-
(1997)
Curves and Surfaces for Computer-Aided Geometric Design: A Practical Guide
-
-
Farin, G.E.1
-
145
-
-
0038715134
-
Multimedia content screening using a dual watermarking and fingerprinting system
-
Juan Les Pins, France, December
-
D. Kirovski, H. S. Malvar, and Y. Yacobi, "Multimedia content screening using a dual watermarking and fingerprinting system," in Proc. ACM Multimedia, pp. 372-381, Juan Les Pins, France, December 2002.
-
(2002)
Proc. ACM Multimedia
, pp. 372-381
-
-
Kirovski, D.1
Malvar, H.S.2
Yacobi, Y.3
-
146
-
-
0030269660
-
Affine-invariant B-spline moments for curve matching
-
Z. Huang and F. S. Cohen, "Affine-invariant B-spline moments for curve matching," IEEE Trans. Image Processing, vol. 5, no. 10, pp. 1473-1480, 1996.
-
(1996)
IEEE Trans. Image Processing
, vol.5
, Issue.10
, pp. 1473-1480
-
-
Huang, Z.1
Cohen, F.S.2
-
147
-
-
0025547190
-
Automatic representation of binary images
-
C. A. Cabrelli and U. M. Molter, "Automatic representation of binary images," IEEE Trans. Pattern Anal. Machine Intell., vol. 12, no. 12, pp. 1190- 1196, 1990.
-
(1990)
IEEE Trans. Pattern Anal. Machine Intell.
, vol.12
, Issue.12
, pp. 1190-1196
-
-
Cabrelli, C.A.1
Molter, U.M.2
-
148
-
-
0004027284
-
-
John Wiley & Sons, New York, NY, USA, 2nd edition
-
H. S. M. Coxeter, Introduction to Geometry, John Wiley & Sons, New York, NY, USA, 2nd edition, 1969.
-
(1969)
Introduction to Geometry
-
-
Coxeter, H.S.M.1
-
149
-
-
0028336090
-
Part I: Modeling image curves using invariant 3-D object curve models - A path to 3-D recognition and shape estimation from image contours
-
F. S. Cohen and J.-Y. Wang, "Part I: Modeling image curves using invariant 3-D object curve models-a path to 3-D recognition and shape estimation from image contours," IEEE Trans. Pattern Anal. Machine Intell., vol. 16, no. 1, pp. 1-12, 1994.
-
(1994)
IEEE Trans. Pattern Anal. Machine Intell.
, vol.16
, Issue.1
, pp. 1-12
-
-
Cohen, F.S.1
Wang, J.-Y.2
-
150
-
-
0010359261
-
Calculating the Hausdorff distance between curves
-
E. Belogay, C. A. Cabrelli, U.M.Molter, and R. Shonkwiler, "Calculating the Hausdorff distance between curves," Information Processing Letters, vol. 64, no. 1, pp. 17-22, 1997.
-
(1997)
Information Processing Letters
, vol.64
, Issue.1
, pp. 17-22
-
-
Belogay, E.1
Cabrelli, C.A.2
Molter, U.M.3
Shonkwiler, R.4
-
151
-
-
2442558011
-
Image registration by "super-curves
-
M. Xia and B. Liu, "Image registration by "Super-curves", " IEEE Trans. Image Processing, vol. 13, no. 5, pp. 720-732, 2004.
-
(2004)
IEEE Trans. Image Processing
, vol.13
, Issue.5
, pp. 720-732
-
-
Xia, M.1
Liu, B.2
-
152
-
-
0042878478
-
Multicast over wireless networks
-
U. Varshney, "Multicast over wireless networks," Communications of the ACM, vol. 45, no. 12, pp. 31-37, 2002.
-
(2002)
Communications of the ACM
, vol.45
, Issue.12
, pp. 31-37
-
-
Varshney, U.1
|