-
2
-
-
0038826879
-
-
August, Retrieved November 21, 2003, from
-
Anderson, R.J., & Petitcolas, F.A.P. (1999, August). Information hiding: An annotated bibliography. Retrieved November 21, 2003, from www.petitcolas.net/fabien/steganography/bibliography/
-
(1999)
Information Hiding: An Annotated Bibliography
-
-
Anderson, R.J.1
Petitcolas, F.A.P.2
-
3
-
-
84899237569
-
-
(n.d.), Retrieved August 19, 2003, from
-
Bail, M. (n.d.). The Europeans. Retrieved August 19, 2003, from www.brickmag.com
-
The Europeans
-
-
Bail, M.1
-
6
-
-
0030384775
-
Techniques for data hiding
-
Bender, W. et al. (1996). Techniques for data hiding. IBM Systems Journal, 313-336.
-
(1996)
IBM Systems Journal
, pp. 313-336
-
-
Bender, W.1
-
8
-
-
84899243914
-
-
CITED (Copyright in Transmitted Electronic Documents), December, Retrieved August 19, 2003, from
-
CITED (Copyright in Transmitted Electronic Documents). (1993, December). Retrieved August 19, 2003, from www.newcastle.research.ec.org/espsyn/text/5469.html
-
(1993)
-
-
-
9
-
-
84899184873
-
-
COPEARMS, (n.d.). Retrieved August 19, 2003, from
-
COPEARMS. (n.d.). Retrieved August 19, 2003, from www.nlc-bnc.ca/wapp/copearms/cop-surv.htm
-
-
-
-
10
-
-
0030388964
-
Secure spread spectrum watermarking for images, audio and video
-
Cox, I.J. et al. (1996). Secure spread spectrum watermarking for images, audio and video. International Conference on Image Processing, 234-246.
-
(1996)
International Conference On Image Processing
, pp. 234-246
-
-
Cox, I.J.1
-
11
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox, I.J., Kilian, J., Leighton, F.T., & Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12), 1673-1678.
-
(1997)
IEEE Transactions On Image Processing
, vol.6
, Issue.12
, pp. 1673-1678
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
12
-
-
84899385492
-
Watermarking and their properties
-
March 27-29, Las Vegas, NV
-
Cox, I.J., Miller, M.L. & Bloom, J.A. (2000, March 27-29). Watermarking and their properties. Proceedings of the International Conference on Information Technology: Coding and Computing, ITCC 2000, Las Vegas, NV.
-
(2000)
Proceedings of the International Conference On Information Technology: Coding and Computing, ITCC 2000
-
-
Cox, I.J.1
Miller, M.L.2
Bloom, J.A.3
-
14
-
-
7644241281
-
A review of watermarking principles and practices
-
In K. Parhi & T. Nishitani (Eds.)
-
Cox, I.J., Miller, M.L., Linnartz, J.P.N.G., & Kalker, T. (1999). A review of watermarking principles and practices. In K. Parhi & T. Nishitani (Eds.), Digital signal processing in multimedia systems (pp. 461-485).
-
(1999)
Digital Signal Processing In Multimedia Systems
, pp. 461-485
-
-
Cox, I.J.1
Miller, M.L.2
Linnartz, J.P.N.G.3
Kalker, T.4
-
15
-
-
0032121338
-
Low cost spatial watermarking
-
Darmstaedter, V., Delaigle, J.F., Quisquater, J.J., & Macq, B. (1998). Low cost spatial watermarking. Computer & Graphics, 22(4), 417-424.
-
(1998)
Computer & Graphics
, vol.22
, Issue.4
, pp. 417-424
-
-
Darmstaedter, V.1
Delaigle, J.F.2
Quisquater, J.J.3
Macq, B.4
-
16
-
-
18944404163
-
-
September 27, Retrieved November 21, 2003, from
-
Delaigle, J.-F. (1996, September 27). TALISMAN. Retrieved November 21, 2003, from www.tele.ucl.ac.be/TALISMAN/
-
(1996)
TALISMAN
-
-
Delaigle, J.-F.1
-
17
-
-
18944389007
-
-
Digimarc, Retrieved February 2, 2004, from
-
Digimarc. (2001). Secure ID solutions. Retrieved February 2, 2004, from www.digimarc.com/DIDS/AboutIDSystems.asp
-
(2001)
Secure ID Solutions
-
-
-
19
-
-
84899309474
-
-
European Communities. (n.d.), Retrieved November 21, 2003, from
-
European Communities. (n.d.). Esprit programme. Retrieved November 21, 2003, from www.cordis.lu/esprit/home.html
-
Esprit Programme
-
-
-
20
-
-
50249108926
-
Applications of data hiding in digital images
-
November 4-6, Melbourne, Australia
-
Fridrich, J. (1998, November 4-6). Applications of data hiding in digital images. Tutorial of the ISPACS '98 Conference, Melbourne, Australia.
-
(1998)
Tutorial of the ISPACS '98 Conference
-
-
Fridrich, J.1
-
21
-
-
84955119830
-
Echo hiding
-
Gruhl, D., Lu, A., & Bender, W. (1996). Echo hiding. Information Hiding First International Workshop Proceedings, 295-315.
-
(1996)
Information Hiding First International Workshop Proceedings
, pp. 295-315
-
-
Gruhl, D.1
Lu, A.2
Bender, W.3
-
22
-
-
0004073653
-
-
Amsterdam: Elsevier
-
Hanjalic, A., Langelaar, G.C., van Roosmalen, P.M.G., Biemond, J., & Langendijk, R.L. (2000). Image and video databases: Restauration, watermarking and retrieval. Amsterdam: Elsevier.
-
(2000)
Image and Video Databases: Restauration, Watermarking and Retrieval
-
-
Hanjalic, A.1
Langelaar, G.C.2
van Roosmalen, P.M.G.3
Biemond, J.4
Langendijk, R.L.5
-
23
-
-
0032634857
-
Multimedia watermarking techniques
-
Hartung, F., & Kutter, M. (1999). Multimedia watermarking techniques. Proceedings of the IEEE, 87(7), 1079-1107.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1079-1107
-
-
Hartung, F.1
Kutter, M.2
-
24
-
-
0033601672
-
Spread spectrum watermarking: Malicious attacks and counterattacks
-
January, San Jose, CA
-
Hartung, F., Su, J.K., & Girod, B. (1999, January). Spread spectrum watermarking: Malicious attacks and counterattacks. Proceedings of SPIE Electronic Imaging '99, Security and Watermarking of Multimedia Contents, San Jose, CA.
-
(1999)
Proceedings of SPIE Electronic Imaging '99, Security and Watermarking of Multimedia Contents
-
-
Hartung, F.1
Su, J.K.2
Girod, B.3
-
25
-
-
18944379784
-
Performance measures for image watermarking schemes
-
September, Baiona, Spain. Retrieved February 14, 2004, from
-
Heileman, G.L., Pizano, C.E., & Abdallah, C.T. (1999, September). Performance measures for image watermarking schemes. Proceedings of the Fifth Baiona Workshop on Emerging Technologies in Telecommunications, Baiona, Spain. Retrieved February 14, 2004, from www.eece.unm.edu/controls/papers/Hei_Piz_CTA.pdf
-
(1999)
Proceedings of the Fifth Baiona Workshop On Emerging Technologies In Telecommunications
-
-
Heileman, G.L.1
Pizano, C.E.2
Abdallah, C.T.3
-
27
-
-
84899291984
-
-
IMPRIMATUR, January 15, Retrieved August 19, 2003, from
-
IMPRIMATUR. (1999, January 15). Retrieved August 19, 2003, from www.imprimatur.net/about.htm
-
(1999)
-
-
-
28
-
-
0026630755
-
Image coding based on a fractal theory of iterated contractive image transformations
-
Jacquin, A.E. (1992). Image coding based on a fractal theory of iterated contractive image transformations. IEEE Transactions on Image Processing, 2(1), 18-30.
-
(1992)
IEEE Transactions On Image Processing
, vol.2
, Issue.1
, pp. 18-30
-
-
Jacquin, A.E.1
-
31
-
-
85027148221
-
Digital signature of color images using amplitude modulation
-
February 13-14, San Jose, CA
-
Kutter, M., Jordan, F., & Bossen, F. (1997, February 13-14). Digital signature of color images using amplitude modulation. Proceedings of SPIE Storage and Retrieval for Image and Video Databases, San Jose, CA.
-
(1997)
Proceedings of SPIE Storage and Retrieval For Image and Video Databases
-
-
Kutter, M.1
Jordan, F.2
Bossen, F.3
-
32
-
-
0343426679
-
Music on the internet and intellectual property protection problem
-
July
-
Lacy, J., Snyder, J., & Mahler, D. (1997, July). Music on the internet and intellectual property protection problem. Proceedings of ISIE.
-
(1997)
Proceedings of ISIE
-
-
Lacy, J.1
Snyder, J.2
Mahler, D.3
-
33
-
-
33746056772
-
Cryptoanalysis of UCLA watermarking schemes
-
In F.A.P. Petitcolas (Ed.), Berlin: Springer
-
Le, T.V., & Desmedt, Y. (2003). Cryptoanalysis of UCLA watermarking schemes. In F.A.P. Petitcolas (Ed.), Information hiding. 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 2002 (pp. 213-Berlin: Springer.
-
(2003)
Information Hiding. 5th International Workshop, IH 2002, Noordwijkerhout, the Netherlands, October 2002
, pp. 213
-
-
Le, T.V.1
Desmedt, Y.2
-
34
-
-
84899354777
-
-
MediaTrax, (n.d.). Retrieved November 21, 2003, from
-
MediaTrax. (n.d.). Retrieved November 21, 2003, from www.mediatrax.com
-
-
-
-
36
-
-
3242674638
-
-
Microsoft (n.d.), Retrieved November 21, 2003, from
-
Microsoft (n.d.). NGSCB: Next-Generation Secure Computing Base. Retrieved November 21, 2003, from www.microsoft.com/resources/ngscb/default.mspx
-
NGSCB: Next-Generation Secure Computing Base
-
-
-
37
-
-
35248849238
-
Cryptoanalysis of discrete-sequence spread spectrum watermarks
-
In F.A.P. Petitcolas (Ed.), Berlin: Springer
-
Mihcak, M.K., Venkatesan, R., & Kesal, M. (2003). Cryptoanalysis of discrete-sequence spread spectrum watermarks. In F.A.P. Petitcolas (Ed.), Information hiding. 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 2002 (pp. 226-246). Berlin: Springer.
-
(2003)
Information Hiding. 5th International Workshop, IH 2002, Noordwijkerhout, the Netherlands, October 2002
, pp. 226-246
-
-
Mihcak, M.K.1
Venkatesan, R.2
Kesal, M.3
-
38
-
-
7644241281
-
A review of watermarking principles and practices
-
In K.K. Parhi & T. Nishitani (Eds.), Marcel Dekker
-
Miller, M., Cox, I., Linnart, J.P., & Kalker, T. (1999). A review of watermarking principles and practices. In K.K. Parhi & T. Nishitani (Eds.), Digital signal processing in multimedia systems (pp. 461-485). Marcel Dekker.
-
(1999)
Digital Signal Processing In Multimedia Systems
, pp. 461-485
-
-
Miller, M.1
Cox, I.2
Linnart, J.P.3
Kalker, T.4
-
39
-
-
0031338360
-
Effective and ineffective digital watermarks
-
October, Santa Barbara, CA
-
Mintzer, F., Braudaway, G.W., & Yeung, M.M. (1997, October). Effective and ineffective digital watermarks. Proceedings of the IEEE International Conference on Image Processing (ICIP '97), Santa Barbara, CA.
-
(1997)
Proceedings of the IEEE International Conference On Image Processing (ICIP '97)
-
-
Mintzer, F.1
Braudaway, G.W.2
Yeung, M.M.3
-
40
-
-
18944364286
-
-
National Association of Broadcasters, November 10, Retrieved November 21, 2003, from
-
National Association of Broadcasters. (1998, November 10). Electronic music copyright in a digital, web-centric, high-tech universe. Retrieved November 21, 2003, from www.nab.org/Research/Reports/emusic_copyright.htm
-
(1998)
Electronic Music Copyright In a Digital, Web-centric, High-tech Universe
-
-
-
41
-
-
33745295421
-
A multistage VQ based watermarking technique with fake watermarks
-
November, In F.A.P. Petitcolas & H.J. Kim, (Eds.), Berlin: Springer
-
Pan, J.-S., Wang, F.-H., Jain, L., & Ichalkaranje, N. (2002, November). A multistage VQ based watermarking technique with fake watermarks. In F.A.P. Petitcolas & H.J. Kim, (Eds.), Digital watermarking. First International Workshop, IWDW 2002, Seoul, Korea (pp. 81-90). Berlin: Springer.
-
(2002)
Digital Watermarking. First International Workshop, IWDW 2002, Seoul, Korea
, pp. 81-90
-
-
Pan, J.-S.1
Wang, F.-H.2
Jain, L.3
Ichalkaranje, N.4
-
42
-
-
0032680807
-
Information hiding-A survey
-
Petitcolas, F.A.P., Anderson, R.J., & Kuhn, M.G. (1999). Information hiding-A survey. Proceedings of the IEEE, 87(7), 1062-1078.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
43
-
-
84899279734
-
HDTV and front protection systems
-
July 26, Retrieved February 14, 2004, from
-
Rogers, G. (2000, July 26). HDTV and front protection systems. CyberTheater™. The Internet Journal of Home Theater. Retrieved February 14, 2004, from www.cybertheater.com/Tech_Reports/HD_Projectors/hd_projector.html
-
(2000)
CyberTheater™. the Internet Journal of Home Theater
-
-
Rogers, G.1
-
46
-
-
18944397959
-
Library-publisher relations in the next millennium
-
February, Retrieved November 21, 2003, from
-
Scott, M. (1999, February). Library-publisher relations in the next millennium. The Library Perspective, 31(2). Retrieved November 21, 2003, from www.nlc-bnc.ca/publications/2/p2-9902-03-e.html
-
(1999)
The Library Perspective
, vol.31
, Issue.2
-
-
Scott, M.1
-
47
-
-
84899236732
-
-
SDMI, (n.d.). Retrieved November 21, 2003, from
-
SDMI. (n.d.). Retrieved November 21, 2003, from www.sdmi.org
-
-
-
-
48
-
-
84899246890
-
-
Sherman, C. (n.d.), Retrieved from
-
Sherman, C. (n.d.). Presentations to SDMI Organizing Plenary. Retrieved from www.sdmi.org/dscgi/ds.py/GetRepr/File-38/html
-
Presentations to SDMI Organizing Plenary
-
-
-
50
-
-
0032095654
-
Multimedia data embedding and watermarking technologies
-
Swanson, M.D., Kobayashi, M., & Tewfik, A.H. (1998). Multimedia data embedding and watermarking technologies. Proceedings of IEEE, 86(6), 1064-1087.
-
(1998)
Proceedings of IEEE
, vol.86
, Issue.6
, pp. 1064-1087
-
-
Swanson, M.D.1
Kobayashi, M.2
Tewfik, A.H.3
-
51
-
-
84899290926
-
-
TCPA, (n.d.). Retrieved November 21, 2003, from
-
TCPA. (n.d.). Retrieved November 21, 2003, from www.trustedcomputing.org/home/
-
-
-
-
52
-
-
84899354713
-
-
VEIL Interactive Technologies, (n.d.). Retrieved November 21, 2003, from
-
VEIL Interactive Technologies. (n.d.). Retrieved November 21, 2003, from www.veilinteractive.com/2003/index.htm
-
-
-
-
53
-
-
84899264725
-
-
VIVA, (n.d.). Retrieved November 21, 2003, from
-
VIVA. (n.d.). Retrieved November 21, 2003, from www.intec.rug.ac.be/Research/Groups/hfhsdesign/viva/
-
-
-
-
54
-
-
0035417219
-
Attacks on digital watermarks: Classification, estimation-based attacks and benchmarks
-
Voloshynovskiy, S., Pereira, S., Pun, T., Eggers, J.J., & Su, J.K. (2001). Attacks on digital watermarks: Classification, estimation-based attacks and benchmarks. IEEE Communications Magazine, 39(8), 118-127.
-
(2001)
IEEE Communications Magazine
, vol.39
, Issue.8
, pp. 118-127
-
-
Voloshynovskiy, S.1
Pereira, S.2
Pun, T.3
Eggers, J.J.4
Su, J.K.5
-
55
-
-
84899222977
-
Digital watermarking-An overview
-
September 8-11, Island of Rhodes, Greece
-
Voyatzis, G., Nikolaides, N., & Pitas, I. (1998, September 8-11). Digital watermarking-An overview. Proceedings of IX European Signal Processing Conference (EUSIPCO), Island of Rhodes, Greece.
-
(1998)
Proceedings of IX European Signal Processing Conference (EUSIPCO)
-
-
Voyatzis, G.1
Nikolaides, N.2
Pitas, I.3
-
56
-
-
18944369972
-
The role of digital watermarking to the protection of rights for digital media assets
-
April 24-25, Poznan, Poland
-
Woda, K., & Seitz, J. (2002, April 24-25). The role of digital watermarking to the protection of rights for digital media assets. Proceedings of the Fifth International Conference Business Information Systems BIS 2002, Poznan, Poland.
-
(2002)
Proceedings of the Fifth International Conference Business Information Systems BIS 2002
-
-
Woda, K.1
Seitz, J.2
-
58
-
-
35248859737
-
A new blind watermarking technique based on independent component analysis
-
November, In F.A.P. Petitcolas & H.J. Kim (Eds.), Berlin: Springer
-
Yu, D., & Sattar, F. (2002, November). A new blind watermarking technique based on independent component analysis. In F.A.P. Petitcolas & H.J. Kim (Eds.), Digital watermarking. First International Workshop, IWDW 2002, Seoul, Korea (pp. 51-63). Berlin: Springer.
-
(2002)
Digital Watermarking. First International Workshop, IWDW 2002, Seoul, Korea
, pp. 51-63
-
-
Yu, D.1
Sattar, F.2
|