-
1
-
-
33746628959
-
Fundamentals of data hiding security and their application to spread-spectrum analysis
-
Lectures Notes in Computer Science Springer- Verlag, Barcelona, Spain, Jun.
-
P. Comesana, L. Perez-Freire, and F. Perez-Gonzalez, "Fundamentals of data hiding security and their application to spread-spectrum analysis," in Proc. 7th Inf. Hiding Workshop (IH 2005), Lectures Notes in Computer Science, Springer-Verlag, Barcelona, Spain, Jun. 2005, vol. 3727, pp. 146-160.
-
(2005)
Proc. 7th Inf. Hiding Workshop (IH 2005)
, vol.3727
, pp. 146-160
-
-
Comesana, P.1
Perez-Freire, L.2
Perez-Gonzalez, F.3
-
2
-
-
21844463487
-
Watermarking security: Theory and practice
-
Oct.
-
F. Cayre, C. Fontaine, and T. Furon, "Watermarking security: Theory and practice," IEEE Trans. Signal Process., vol. 53, no. 10, pp. 3976-3987, Oct. 2005.
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, Issue.10
, pp. 3976-3987
-
-
Cayre, F.1
Fontaine, C.2
Furon, T.3
-
3
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Dec.
-
I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Process.
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
4
-
-
0038527382
-
The zero-rate spread-spectrum watermarking game
-
Apr.
-
P. Moulin and A. Ivanovic, "The zero-rate spread-spectrum watermarking game," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1098-1117, Apr. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.4
, pp. 1098-1117
-
-
Moulin, P.1
Ivanovic, A.2
-
5
-
-
0038527410
-
Improved spread spectrum: A new modulation technique for robust watermarking
-
Apr.
-
H. S. Malvar and D. A. F. Florencio, "Improved spread spectrum: A new modulation technique for robust watermarking," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 898-905, Apr. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.4
, pp. 898-905
-
-
Malvar, H.S.1
Florencio, D.A.F.2
-
6
-
-
38049169784
-
Natural watermarking: A secure spread spectrum technique for woa
-
Lecture Notes in Computer Science Springer- Verlag, Alexandria, VA, Jul.
-
P. Bas and F. Cayre, "Natural watermarking: A secure spread spectrum technique for woa," in Proc. 8th Inf. Hiding Workshop (IH 2006), Lecture Notes in Computer Science, Springer-Verlag, Alexandria, VA, Jul. 2006, vol. 4437, pp. 1-14.
-
(2006)
Proc. 8th Inf. Hiding Workshop (IH 2006)
, vol.4437
, pp. 1-14
-
-
Bas, P.1
Cayre, F.2
-
7
-
-
70449623532
-
Optimization of natural watermarking using transportation theory
-
Princeton, NJ, Sep.
-
B. Mathon, P. Bas, F. Cayre, and B. Macq, "Optimization of natural watermarking using transportation theory," in Proc. 11th ACM Workshop on Multimedia and Security (MM&Sec'2009), Princeton, NJ, Sep. 2009, pp. 33-38.
-
(2009)
Proc. 11th ACM Workshop on Multimedia and Security (MM&Sec'2009)
, pp. 33-38
-
-
Mathon, B.1
Bas, P.2
Cayre, F.3
Macq, B.4
-
8
-
-
33750916795
-
Achieving subspace or key security for woa using natural or circular watermarking
-
Geneva, Switzerland, Sep.
-
P. Bas and F. Cayre, "Achieving subspace or key security for woa using natural or circular watermarking," in Proc. 8th ACM Workshop Multimedia and Security (MM&Sec'06), Geneva, Switzerland, Sep. 2006, pp. 80-88.
-
(2006)
Proc. 8th ACM Workshop Multimedia and Security (MM&Sec'06)
, pp. 80-88
-
-
Bas, P.1
Cayre, F.2
-
9
-
-
39449113677
-
Kerckhoffs-based embedding security classes for woa data hiding
-
Mar.
-
F. Cayre and P. Bas, "Kerckhoffs-based embedding security classes for woa data hiding," IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 1-15, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.1
, pp. 1-15
-
-
Cayre, F.1
Bas, P.2
-
10
-
-
78549287204
-
A new spread-spectrum watermarking scheme to achieve a trade-off between security and robustness
-
Lectures Notes in Computer Science Springer- Verlag, Calgary, AB, Canada, Jun.
-
J. Cao, J. Huang, and J. Ni, "A new spread-spectrum watermarking scheme to achieve a trade-off between security and robustness," in Proc. 12th Inf. Hiding Workshop (IH 2010), Lectures Notes in Computer Science, Springer-Verlag, Calgary, AB, Canada, Jun. 2010, vol. 6387, pp. 262-276.
-
(2010)
Proc. 12th Inf. Hiding Workshop (IH 2010)
, vol.6387
, pp. 262-276
-
-
Cao, J.1
Huang, J.2
Ni, J.3
-
11
-
-
0001010507
-
On a problem of Monge
-
L. V. Kantorovich, "On a problem of Monge," Uspekhi Math. Nauk., vol. 3, pp. 225-226, 1948.
-
(1948)
Uspekhi Math. Nauk.
, vol.3
, pp. 225-226
-
-
Kantorovich, L.V.1
-
12
-
-
0021421774
-
On the optimal mapping of distributions
-
M. Knott and C. S. Smith, "On the optimal mapping of distributions," J. Optimiz. Theory Applicat., vol. 43, pp. 39-49, 1984.
-
(1984)
J. Optimiz. Theory Applicat.
, vol.43
, pp. 39-49
-
-
Knott, M.1
Smith, C.S.2
|