-
1
-
-
85177693003
-
Rainbow: Arobust and invisible non-blindwatermark for network flows
-
San Diego, February. The Internet Society, Washington DC/Reston
-
Houmansadr, A., Kiyavash, N. and Borisov, N. (2009) Rainbow: ARobust and Invisible Non-BlindWatermark for Network Flows. Proc. Network and Distributed System Security Symp., NDSS 2009, San Diego, February. The Internet Society, Washington DC/Reston.
-
(2009)
Proc. Network and Distributed System Security Symp., NDSS 2009
-
-
Houmansadr, A.1
Kiyavash, N.2
Borisov, N.3
-
2
-
-
77949501631
-
Secure and non-blind watermarking scheme for color images based on dwt
-
El-Taweel, G. S., Onsi, H., M. Samy and Darwish, M. (2005) Secure and non-blind watermarking scheme for color images based on dwt. ICGST Int. J. Graph. Vis. Image Process., 05, 1-5.
-
(2005)
ICGST Int. J. Graph. Vis. Image Process.
, vol.5
, pp. 1-5
-
-
El-Taweel, G.S.1
Onsi, H.2
Samy, M.3
Darwish, M.4
-
3
-
-
37249089814
-
A chaos based robust spatial domain watermarking algorithm
-
Advances in Neural Networks - ISNN 2007 - 4th International Symposium on Neural Networks, ISNN 2007, Proceedings
-
Wu, X., Guan, Z.-H. and Wu, Z. (2007) A Chaos based Robust Spatial Domain Watermarking Algorithm. ISNN '07: Proc. 4th Int. Symp. Neural Networks, Nanjing, China, Berlin, June, Lecture Notes in Computer Science 4492, pp. 113-119. Springer. (Pubitemid 350270051)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4492
, Issue.PART 2
, pp. 113-119
-
-
Wu, X.1
Guan, Z.-H.2
Wu, Z.3
-
4
-
-
38049045090
-
Image information hiding encryption using chaotic sequence
-
Italy, Berlin, September. Springer
-
Liu, Z. and Xi, L. (2007) Image Information Hiding Encryption using Chaotic Sequence. Knowledge-Based Intelligent Information and Engineering Systems, 11th Int. Conf., KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, Berlin, September, pp. 202-208. Springer.
-
(2007)
Knowledge-Based Intelligent Information and Engineering Systems, 11th Int. Conf., KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare
, pp. 202-208
-
-
Liu, Z.1
Xi, L.2
-
5
-
-
33745967087
-
A wavelet packets watermarking algorithm based on chaos encryption
-
DOI 10.1007/11751540-100, Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part I
-
Cong, J., Jiang, Y., Qu, Z. and Zhang, Z. (2006) A Wavelet Packets Watermarking Algorithm based on Chaos Encryption. Computational Science and Its Applications-ICCSA 2006, Int. Conf., Glasgow, UK, Berlin, May, Lecture Notes in Computer Science 3980, pp. 921-928. Springer. (Pubitemid 44058354)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3980
, pp. 921-928
-
-
Cong, J.1
Jiang, Y.2
Qu, Z.3
Zhang, Z.4
-
6
-
-
33846161265
-
Chaos-based multipurpose imagewatermarking algorithm
-
Congxu, Z., Xuefeng, L. and Zhihua, L. (2006) Chaos-based multipurpose imagewatermarking algorithm. Wuhan Univ. J. Nat. Sci., 11, 1675-1678.
-
(2006)
Wuhan Univ. J. Nat. Sci.
, vol.11
, pp. 1675-1678
-
-
Congxu, Z.1
Xuefeng, L.2
Zhihua, L.3
-
7
-
-
34247361264
-
A novel digital watermark algorithm based on chaotic maps
-
Wu, X. and Guan, Z.-H. (2007) A novel digital watermark algorithm based on chaotic maps. Phys. Lett. A, 365, 403-406.
-
(2007)
Phys. Lett. A
, vol.365
, pp. 403-406
-
-
Wu, X.1
Guan, Z.-H.2
-
8
-
-
39449113677
-
Kerckhoffs-based embedding security classes for WOA data hiding
-
DOI 10.1109/TIFS.2007.916006
-
Cayre, F. and Bas, P. (2008) Kerckhoffs-based embedding security classes for woa data hiding. IEEE Trans. Inf. Forensics Sec., 3, 1-15. (Pubitemid 351270068)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.1
, pp. 1-15
-
-
Cayre, F.1
Bas, P.2
-
9
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
PII S1057714997084601
-
Cox, I. J., Member, S., Kilian, J., Leighton, F. T. and Shamoon, T. (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process., 6, 1673-1687. (Pubitemid 127770522)
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
10
-
-
78650433655
-
Chaotic iterations versus spread-spectrum: Chaos and stego security
-
Darmstadt, Germany, Washington, DC, October. IEEE Computer Society
-
Guyeux, C., Friot, N. and Bahi, J. (2010) Chaotic Iterations versus Spread-Spectrum: Chaos and Stego Security. 6th Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, Washington, DC, October, pp. 208-211. IEEE Computer Society.
-
(2010)
6th Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010
, pp. 208-211
-
-
Guyeux, C.1
Friot, N.2
Bahi, J.3
-
13
-
-
0000248011
-
Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding
-
Cirencester, UK, Berlin, December, Lecture Notes in Computer Science. Springer
-
Shujun, L., Qi, L., Wenmin, L., Xuanqin, M. and Yuanlong, C. (2001) Statistical Properties of Digital Piecewise Linear Chaotic Maps and their Roles in Cryptography and Pseudo-Random Coding. Cryptography and Coding, 8th IMA Int. Conf., Cirencester, UK, Berlin, December, Lecture Notes in Computer Science 2260, pp. 205-221. Springer.
-
(2001)
Cryptography and Coding, 8th IMA Int. Conf
, vol.2260
, pp. 205-221
-
-
Shujun, L.1
Qi, L.2
Wenmin, L.3
Xuanqin, M.4
Yuanlong, C.5
-
15
-
-
84957868624
-
An information-theoretic model for steganography
-
Portland, Oregon, USA, Berlin, April, Lecture Notes in Computer Science. Springer
-
Cachin, C. (1998) An Information-Theoretic Model for Steganography. Information Hiding, 2nd Int. Workshop, Portland, Oregon, USA, Berlin, April, Lecture Notes in Computer Science 1525, pp. 306-318. Springer.
-
(1998)
Information Hiding, 2nd Int. Workshop
, vol.1525
, pp. 306-318
-
-
Cachin, C.1
-
16
-
-
0002561772
-
An information-theoretic approach to steganography and watermarking
-
Dresden, Germany, Berlin, September,. Springer
-
Mittelholzer, T. (1999) An Information-Theoretic Approach to Steganography and Watermarking. Information Hiding, Third International Workshop, IH'99, Dresden, Germany, Berlin, September, pp. 1-16. Springer.
-
(1999)
Information Hiding, Third International Workshop, IH'99
, pp. 1-16
-
-
Mittelholzer, T.1
-
17
-
-
0035790994
-
Considerations onwatermarking security
-
Cannes, France, Washington, DC, October. IEEE Computer Society
-
Kalker, T. (2001) Considerations onWatermarking Security. 2001 IEEE 4th Workshop on Multimedia Signal Processing, Cannes, France, Washington, DC, October, pp. 201-206. IEEE Computer Society.
-
(2001)
2001 IEEE 4th Workshop on Multimedia Signal Processing
, pp. 201-206
-
-
Kalker, T.1
-
19
-
-
21844463487
-
Watermarking security: Theory and practice
-
DOI 10.1109/TSP.2005.855418
-
Cayre, F., Fontaine, C. and Furon, T. (2005) Watermarking security: theory and practice. IEEE Trans. Signal Process., 53, 3976-3987. (Pubitemid 41638248)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.10
, pp. 3976-3987
-
-
Cayre, F.1
Fontaine, C.2
Furon, T.3
-
20
-
-
80052439767
-
Secret dither estimation in lattice-quantization data hiding:A set-membership approach
-
San Jose, CA, Bellingham, WA, January. Society of Photo-Optical Instrumentation Engineers
-
Perez-Freire, L., Pérez-Gonzalez, F. and Comesana, P. (2006) Secret Dither Estimation in Lattice-Quantization Data Hiding:A Set-Membership Approach. Security, Steganography, andWatermarking of Multimedia Contents, San Jose, CA, Bellingham, WA, January, pp. 1-12. Society of Photo-Optical Instrumentation Engineers.
-
(2006)
Security, Steganography, andWatermarking of Multimedia Contents
, pp. 1-12
-
-
Perez-Freire, L.1
Pérez-Gonzalez, F.2
Comesana, P.3
-
21
-
-
0001217738
-
The prisoners'problem and the subliminal channel
-
University of California, Santa Barbara, New York, August. Plenum Press
-
Simmons, G. J. (1984) The Prisoners'Problem and the Subliminal Channel. Advances in Cryptology, Proc. CRYPTO'83, University of California, Santa Barbara, New York, August, pp. 51-67. Plenum Press.
-
(1984)
Advances in Cryptology, Proc. CRYPTO'83
, pp. 51-67
-
-
Simmons, G.J.1
-
22
-
-
80052422034
-
On the link between strongly connected iteration graphs and chaotic boolean discrete-time dynamical systems
-
Oslo, Norway, Berlin, August, Lecture Notes in Computer Science 6914. Springer
-
Bahi, J., Couchot, J.-F., Guyeux, C. and Richard, A. (2011) On the Link between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems. FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory, Oslo, Norway, Berlin, August, Lecture Notes in Computer Science 6914, pp. 126-137. Springer.
-
(2011)
FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory
, pp. 126-137
-
-
Bahi, J.1
Couchot, J.-F.2
Guyeux, C.3
Richard, A.4
-
24
-
-
58049116934
-
New full-reference quality metrics based on hvs
-
In Li, B. (ed.),. WO Publisher, Scottsdale, USA, January
-
Egiazarian, K., Astola, J., Ponomarenko, V., Nikolayand Lukin, Battisti, F. and Carli, M. (2006) New Full-Reference Quality Metrics based on hvs. In Li, B. (ed.), CD-ROMProceedings of the Second InternationalWorkshop on Video Processing and Quality Metrics. WO Publisher, Scottsdale, USA, January.
-
(2006)
CD-ROMProceedings of the Second InternationalWorkshop on Video Processing and Quality Metrics
-
-
Egiazarian, K.1
Astola, J.2
Ponomarenko, V.3
Lukin, N.4
Battisti, F.5
Carli, M.6
-
25
-
-
31144478351
-
Image information and visual quality
-
DOI 10.1109/TIP.2005.859378
-
Sheikh, H. R. and Bovik, A. C. (2006) Image information and visual quality. IEEE Trans. Image Process., 15, 430-444. (Pubitemid 43126168)
-
(2006)
IEEE Transactions on Image Processing
, vol.15
, Issue.2
, pp. 430-444
-
-
Sheikh, H.R.1
Bovik, A.C.2
-
26
-
-
43249105504
-
On between-coefficient contrast masking of dct basis functions
-
In Li, B. (ed.). WO Publisher, Scottsdale, Arizona, USA, January
-
Ponomarenko, N., Silvestri, F., Egiazarian, K., Carli, M., Astola, J. and Lukin, V. (2007) On between-Coefficient Contrast Masking of dct Basis Functions. In Li, B. (ed.), CD-ROM Proc. 3rd Int. Workshop onVideo Processing and Quality Metrics for Consumer Electronics VPQM-07. WO Publisher, Scottsdale, Arizona, USA, January.
-
(2007)
CD-ROM Proc. 3rd Int. Workshop onVideo Processing and Quality Metrics for Consumer Electronics VPQM-07
-
-
Ponomarenko, N.1
Silvestri, F.2
Egiazarian, K.3
Carli, M.4
Astola, J.5
Lukin, V.6
-
27
-
-
77950648432
-
A two-step framework for constructing blind image quality indices
-
Moorthy, A. K. M. and Bovik, A. C. (2010)A two-step framework for constructing blind image quality indices. IEEE Signal Process. Lett., 17, 513-516.
-
(2010)
IEEE Signal Process. Lett.
, vol.17
, pp. 513-516
-
-
Moorthy, A.K.M.1
Bovik, A.C.2
-
28
-
-
84861842935
-
-
accessed October 14, 2011
-
(2011). Psnr-hvs-m page. http://www. ponomarenko. info/psnrhv sm. htm (accessed October 14, 2011).
-
(2011)
Psnr-Hvs-M Page
-
-
-
29
-
-
84861881447
-
-
accessed October 14, 2011
-
(2011). Biqi page. http://live. ece. utexas. edu/research/quality/BIQI- release. zip (accessed October 14, 2011).
-
(2011)
Biqi Page
-
-
-
30
-
-
33750126120
-
A robust imagewatermarking using multiresolution analysis ofwavelet
-
Washington, DC, October. IEEE Computer Society
-
Temi, C., Choomchuay, S. and Lasakul, A. (2005) A Robust ImageWatermarking using Multiresolution Analysis ofWavelet. ISCIT 2005. IEEE Int. Symp. Communications and Information Technology, Washington, DC, October, pp. 623-626. IEEE Computer Society.
-
(2005)
ISCIT 2005. IEEE Int. Symp. Communications and Information Technology
, pp. 623-626
-
-
Temi, C.1
Choomchuay, S.2
Lasakul, A.3
-
31
-
-
79954570840
-
Watermarking scheme for color images using wavelet transform based texture properties and secret sharing
-
V. Dharwadkar, N. V. and Amberker, B. B. (2010) Watermarking scheme for color images using wavelet transform based texture properties and secret sharing. Int. J. Inf. Commun. Eng., 6, 93-100.
-
(2010)
Int. J. Inf. Commun. Eng.
, vol.6
, pp. 93-100
-
-
Dharwadkar, V.1
Amberker, B.B.2
-
32
-
-
84863767677
-
Robust watermarking of digital images based on chaotic mapping and dct
-
Lausanne, Switzerland, August,. EURASIP
-
Chrysochos, E., Fotopoulos, V. and Skodras, A. N. (2008) Robust Watermarking of Digital Images based on Chaotic Mapping and dct. 16th European Signal Processing Conference (EUSIPCO 2008), Lausanne, Switzerland, August, pp. 17-21. EURASIP.
-
(2008)
16th European Signal Processing Conference (EUSIPCO 2008
, pp. 17-21
-
-
Chrysochos, E.1
Fotopoulos, V.2
Skodras, A.N.3
-
33
-
-
70350509599
-
Invisible watermarking based on creation and robust insertion-extraction of image adaptivewatermarks
-
Mohanty, S. P. and Bhargava, B. K. (2008) Invisible watermarking based on creation and robust insertion-extraction of image adaptivewatermarks. ACMTrans. Multimedia Comput. Commun. Appl., 5, 12:1-12:22.
-
(2008)
ACMTrans. Multimedia Comput. Commun. Appl.
, vol.5
, pp. 121-1222
-
-
Mohanty, S.P.1
Bhargava, B.K.2
-
34
-
-
77749320486
-
Robust digital watermarking scheme using contourlet transform
-
Mohan, B. and Kumar, S. (2008) Robust digital watermarking scheme using contourlet transform. IJCSNS Int. J. Comput. Sci. Netw. Sec., 8, 43-51.
-
(2008)
IJCSNS Int. J. Comput. Sci. Netw. Sec.
, vol.8
, pp. 43-51
-
-
Mohan, B.1
Kumar, S.2
-
36
-
-
78149273184
-
Reversible watermarking via histogram shifting and least square optimization
-
Roma, Italy, New York, NY, USA. ACM
-
Muzzarelli, M., Carli, M., Boato, G. and Egiazarian, K. (2010) Reversible Watermarking via Histogram Shifting and Least Square Optimization. Proc. 12th ACM Workshop on Multimedia and Security, MM&Sec'10, Roma, Italy, New York, NY, USA, pp. 147-152. ACM.
-
(2010)
Proc. 12th ACM Workshop on Multimedia and Security, MM&Sec'10
, pp. 147-152
-
-
Muzzarelli, M.1
Carli, M.2
Boato, G.3
Egiazarian, K.4
-
37
-
-
57849098679
-
Combined dwt-dct digital imagewatermarking
-
Al-Haj, A. (2007) Combined dwt-dct digital imagewatermarking. J. Comput. Sci., 3, 740-746.
-
(2007)
J. Comput. Sci.
, vol.3
, pp. 740-746
-
-
Al-Haj, A.1
-
38
-
-
33645676686
-
New blind steganalysis and its implications
-
San Jose. CA, Bellingham, WA, January. Society of Photo-Optical Instrumentation Engineers
-
Goljan, M., Fridrich, J. J. and Holotyak, T. (2006) New Blind Steganalysis and its Implications. Proc. SPIE, Electronic Imaging, Security, Steganography, andWatermarking of Multimedia Contents VIII, San Jose. CA, Bellingham, WA, January. Society of Photo-Optical Instrumentation Engineers.
-
(2006)
Proc. SPIE, Electronic Imaging, Security, Steganography, andWatermarking of Multimedia Contents VIII
-
-
Goljan, M.1
Fridrich, J.J.2
Holotyak, T.3
-
39
-
-
51749089283
-
Jpeg image steganalysis utilizing both intrablock and interblock correlations
-
Seattle, Washington, USA, Washington, DC, May. IEEE Computer Society
-
Chen, C. and Shi, Y. Q. (2008) Jpeg Image Steganalysis Utilizing both Intrablock and Interblock Correlations. Int. Symp. Circuits and Systems (ISCAS 2008), Seattle, Washington, USA, Washington, DC, May, pp. 3029-3032. IEEE Computer Society.
-
(2008)
Int. Symp. Circuits and Systems (ISCAS 2008
, pp. 3029-3032
-
-
Chen, C.1
Shi, Y.Q.2
-
40
-
-
69949114432
-
Blind image steganalysis based on run-length histogram analysis
-
San Diego, CA, USA, Washington, DC, October. IEEE Computer Society
-
Dong, J. and Tan, T. (2008) Blind Image Steganalysis based on Run-Length Histogram Analysis. Proc. Int. Conf. Image Processing, ICIP 2008, San Diego, CA, USA, Washington, DC, October, pp. 2064-2067. IEEE Computer Society.
-
(2008)
Proc. Int. Conf. Image Processing, ICIP 2008
, pp. 2064-2067
-
-
Dong, J.1
Tan, T.2
-
41
-
-
80053047483
-
Steganalysis of content-adaptive steganography in spatial domain
-
Prague, Czech Republic, Berlin, May Lecture Notes in Computer Science. Springer
-
Fridrich, J. J., Kodovský, J., Holub, V. and Goljan, M. (2011) Steganalysis of Content-Adaptive Steganography in Spatial Domain. Information Hiding-13th Int. Conf., IH 2011, Prague, Czech Republic, Berlin, May Lecture Notes in Computer Science, pp. 102-117. Springer.
-
(2011)
Information Hiding-13th Int. Conf., IH 2011
, pp. 102-117
-
-
Fridrich, J.J.1
Kodovský, J.2
Holub, V.3
Goljan, M.4
|