-
3
-
-
85144453286
-
-
Delhi: Motilal Banarsidass
-
Jagadguru Swami Shri Bharati Krishna Tirthaji Maharaja (1988) Vedic Mathematics Delhi: Motilal Banarsidass
-
(1988)
Vedic Mathematics
-
-
-
7
-
-
0029394108
-
Electronic marking and identification techniques to discourage document copying
-
J. Brassil, S. Low, N. Maxemchuk and L.Ó. Gorman (1995) Electronic marking and identification techniques to discourage document copying. IEEE Journal on Selected Areas in Communication 13(8), 1495-1504.
-
(1995)
IEEE Journal on Selected Areas in Communication
, vol.13
, Issue.8
, pp. 1495-1504
-
-
Brassil, J.1
Low, S.2
Maxemchuk, N.3
Gorman, L.Ó.4
-
8
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I.J. Cox, J. Kilian, T. Leighton and T. Shamoon (1997) Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6(12), 1673-1687.
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
10
-
-
0032625842
-
Watermarking as communication with side information
-
I.J. Cox, M.L. Miller and A.L. McKellips (1999) Watermarking as communication with side information. Proc. of IEEE 87 1127-1141.
-
(1999)
Proc. of IEEE
, vol.87
, pp. 1127-1141
-
-
Cox, I.J.1
Miller, M.L.2
McKellips, A.L.3
-
11
-
-
0000957054
-
On the duality between data hiding and distributed source coding
-
J. Chou, S.S. Pradhan, L.E. Ghaoui and K. Ramchandran (1999) On the duality between data hiding and distributed source coding. Proc. of 33rd Annual Asilomar conference on Signals, Systems, and Computers
-
(1999)
Proc. of 33rd Annual Asilomar conference on Signals, Systems, and Computers
-
-
Chou, J.1
Pradhan, S.S.2
Ghaoui, L.E.3
Ramchandran, K.4
-
12
-
-
0037854454
-
The duality between information embedding source coding with side information and its implications—applications
-
R.J. Barron, B. Chen and G.W. Wornell (2003) The duality between information embedding source coding with side information and its implications—applications. IEEE Transactions on Information Theory 4(5), 1159-1180.
-
(2003)
IEEE Transactions on Information Theory
, vol.4
, Issue.5
, pp. 1159-1180
-
-
Barron, R.J.1
Chen, B.2
Wornell, G.W.3
-
13
-
-
0030384775
-
Techniques for data hiding
-
W. Bender, D. Gruhl, N. Morimoto and A. Lu (1996) Techniques for data hiding. IBM Systems Journal 35(3–4), 313-336.
-
(1996)
IBM Systems Journal
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
14
-
-
84947937393
-
A secure, robust, watermark for multimedia
-
I.J. Cox, J. Kilian, T. Leighton and T. Shamoon (1996) A secure, robust, watermark for multimedia. Proc. of 1st int. Information Hiding Workshop 185-206.
-
(1996)
Proc. of 1st int. Information Hiding Workshop
, pp. 185-206
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
17
-
-
0032073388
-
Performance analysis of a 2-d multipulse amplitude modulation scheme for data hiding and watermarking of still images
-
J.R. Hernandez, F. Perez-Gonzalez, J.M. Rodriguez and G. Nieto (1998) Performance analysis of a 2-d multipulse amplitude modulation scheme for data hiding and watermarking of still images. IEEE J. Select. Areas Commun. 16(4), 510-524.
-
(1998)
IEEE J. Select. Areas Commun.
, vol.16
, Issue.4
, pp. 510-524
-
-
Hernandez, J.R.1
Perez-Gonzalez, F.2
Rodriguez, J.M.3
Nieto, G.4
-
20
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
May
-
B. Chen and G.W. Wornell (May 2001) Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 47(4), 1423-1443.
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
24
-
-
0036611624
-
Nested linear/lattice codes for structured multiterminal binning
-
R. Zamir, S. Shamai and U. Erez (2002) Nested linear/lattice codes for structured multiterminal binning. IEEE Transactions on Information Theory 48(5), 1250-1276.
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.5
, pp. 1250-1276
-
-
Zamir, R.1
Shamai, S.2
Erez, U.3
-
29
-
-
0002152920
-
Assuring ownership rights for digital images
-
Vieweg Publishing Company
-
G. Caronni (1995) Assuring ownership rights for digital images. Proc. of Reliable IT Systems Vieweg Publishing Company
-
(1995)
Proc. of Reliable IT Systems
-
-
Caronni, G.1
-
31
-
-
0000082307
-
Wavelet-based digital image watermarking
-
December
-
H.-J.M. Wang, P.-C. Su and C.-C.J. Kuo (December 1998) Wavelet-based digital image watermarking. Optics Express 3(12), 491-496.
-
(1998)
Optics Express
, vol.3
, Issue.12
, pp. 491-496
-
-
Wang, H.-J.M.1
Su, P.-C.2
Kuo, C.-C.J.3
-
35
-
-
0037737759
-
Scalar Costa scheme for information embedding
-
J.J. Eggers, R. Bauml, R. Tzschoppe and B. Girod (2003) Scalar Costa scheme for information embedding. IEEE Transactions on Signal Processing 51(4), 1003-1019.
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, Issue.4
, pp. 1003-1019
-
-
Eggers, J.J.1
Bauml, R.2
Tzschoppe, R.3
Girod, B.4
-
36
-
-
0038188753
-
Performance analysis of existing and new methods for data hiding with known-host information in additive channels
-
F. Perez-Gonzalez, F. Balado and J.R. Hernandez Martin (2003) Performance analysis of existing and new methods for data hiding with known-host information in additive channels. IEEE Transactions on Signal Processing 51(4), 960-980.
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, Issue.4
, pp. 960-980
-
-
Perez-Gonzalez, F.1
Balado, F.2
Hernandez Martin, J.R.3
-
37
-
-
0038527410
-
Improved spread spectrum: a new modulation for robust watermarking
-
H. Malvar and D.A.F. Florencio (2003) Improved spread spectrum: a new modulation for robust watermarking. IEEE Transactions on Signal Processing 51(4), 898-905.
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, Issue.4
, pp. 898-905
-
-
Malvar, H.1
Florencio, D.A.F.2
-
38
-
-
0001560154
-
Channels with side information at the transmitter
-
C.E. Shannon (1958) Channels with side information at the transmitter. IBM Journal of Research and Development 2 289-293.
-
(1958)
IBM Journal of Research and Development
, vol.2
, pp. 289-293
-
-
Shannon, C.E.1
-
47
-
-
33644584690
-
Efficient codebook structures for practical information hiding systems
-
March
-
H.T. Sencar, M. Ramkumar and A.N. Akansu (March 2001) Efficient codebook structures for practical information hiding systems. Proc. of CISS
-
(2001)
Proc. of CISS
-
-
Sencar, H.T.1
Ramkumar, M.2
Akansu, A.N.3
-
49
-
-
0345134575
-
A new perspective for embedding-detection methods with distortion compensation and thresholding processing techniques
-
H.T. Sencar, M. Ramkumar and A.N. Akansu (2003) A new perspective for embedding-detection methods with distortion compensation and thresholding processing techniques. Proc. of IEEE-ICIP Conference
-
(2003)
Proc. of IEEE-ICIP Conference
-
-
Sencar, H.T.1
Ramkumar, M.2
Akansu, A.N.3
-
50
-
-
0035424886
-
Capacity estimates for data hiding in compressed images
-
M. Ramkumar and A.N. Akansu (2001) Capacity estimates for data hiding in compressed images. IEEE Transaction on Image Processing 10(8), 1252-1263.
-
(2001)
IEEE Transaction on Image Processing
, vol.10
, Issue.8
, pp. 1252-1263
-
-
Ramkumar, M.1
Akansu, A.N.2
-
54
-
-
0030173121
-
A new fast and efficient implementation of an image codec based on set partitioning in hierarchical trees
-
A. Said and W.A. Pearlman (1996) A new fast and efficient implementation of an image codec based on set partitioning in hierarchical trees. IEEE Transactions on Circuits and Systems for Video Technology 6 243-250.
-
(1996)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.6
, pp. 243-250
-
-
Said, A.1
Pearlman, W.A.2
-
55
-
-
0000082307
-
Wavelet based digital image watermarking
-
H.-J.M. Wang, P.-C. Su and C.-C.J. Kuo (1998) Wavelet based digital image watermarking. Optics Express 3(12), 491-496.
-
(1998)
Optics Express
, vol.3
, Issue.12
, pp. 491-496
-
-
Wang, H.-J.M.1
Su, P.-C.2
Kuo, C.-C.J.3
-
56
-
-
0000867725
-
Modulation and information hiding in image
-
UK: University of Cambridge
-
J.R. Smith and B.O. Comiskey (1996) Modulation and information hiding in image. Workshop on Information Hiding UK: University of Cambridge 463-470.
-
(1996)
Workshop on Information Hiding
, pp. 463-470
-
-
Smith, J.R.1
Comiskey, B.O.2
-
58
-
-
0032073388
-
Performance analysis of a 2-d multipulse amplitude modulation scheme for data hiding and watermarking of still images
-
J.R. Hernandez, F. Perez-Gonzalez, J.M. Rodriguez and G. Nieto (1998) Performance analysis of a 2-d multipulse amplitude modulation scheme for data hiding and watermarking of still images. IEEE Journal on Selected Areas in Communications 16(4), 510-524.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 510-524
-
-
Hernandez, J.R.1
Perez-Gonzalez, F.2
Rodriguez, J.M.3
Nieto, G.4
-
64
-
-
84902734609
-
Multiple codebook information hiding based on minimum distortion criterion
-
March
-
H.T. Sencar, M. Ramkumar and A.N. Akansu (March 2003) Multiple codebook information hiding based on minimum distortion criterion. Proc. of CISS
-
(2003)
Proc. of CISS
-
-
Sencar, H.T.1
Ramkumar, M.2
Akansu, A.N.3
-
72
-
-
0032653659
-
Watermarking resistent to translation, rotation, and scaling
-
November
-
M. Kutter (November 1998) Watermarking resistent to translation, rotation, and scaling. Proc. SPIE Multimedia Systems and Applications 423-431.
-
(1998)
Proc. SPIE Multimedia Systems and Applications
, pp. 423-431
-
-
Kutter, M.1
-
77
-
-
0035369792
-
Attack modelling: Towards a second generation benchmark
-
6, V. Cappellini, M. Barni, F. Bartolini (Eds), June 2001, Special Issue:
-
S. Voloshynovskiy, S. Pereira, V. Iquise and T. Pun (2001) Attack modelling: Towards a second generation benchmark. 6 V. Cappellini, M. Barni, F. Bartolini (Eds) Information Theoretic Issues in Digital Watermarking Signal Processing 81 1177-1214. June 2001 Special Issue:
-
(2001)
Information Theoretic Issues in Digital Watermarking Signal Processing
, vol.81
, pp. 1177-1214
-
-
Voloshynovskiy, S.1
Pereira, S.2
Iquise, V.3
Pun, T.4
-
78
-
-
0035417219
-
Attacks on digital watermarks: Classification, estimation-based attacks and benchmarks
-
(Special Issue on Digital watermarking for copyright protection: a communications perspective)
-
S. Voloshynovskiy, S. Pereira, T. Pun, J. Eggers and J. Su (2001) Attacks on digital watermarks: Classification, estimation-based attacks and benchmarks. IEEE Communications Magazine 39(8), 118-127. (Special Issue on Digital watermarking for copyright protection: a communications perspective)
-
(2001)
IEEE Communications Magazine
, vol.39
, Issue.8
, pp. 118-127
-
-
Voloshynovskiy, S.1
Pereira, S.2
Pun, T.3
Eggers, J.4
Su, J.5
-
81
-
-
0032074580
-
Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
-
S. Craver, N. Memon, B.-L. Yeo and M.M. Yeung (1998) Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications 16(4), 573-586.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 573-586
-
-
Craver, S.1
Memon, N.2
Yeo, B.-L.3
Yeung, M.M.4
-
83
-
-
85144469148
-
Robust protocols for proving ownership of multimedia content.
-
to appear
-
M. Ramkumar and A. N. Akansu. Robust protocols for proving ownership of multimedia content. IEEE Trans. on Multimedia, to appear.
-
IEEE Trans. on Multimedia
-
-
Ramkumar, M.1
Akansu, A.N.2
-
84
-
-
84902734613
-
-
United States Patent 5, 917, 912
-
K.L. Ginter, V.H. Shear, F.J. Spahn and D.M. Van Wie (1999) System and methods for secure transaction management and electronic rights proctection United States Patent 5, 917, 912
-
(1999)
System and methods for secure transaction management and electronic rights proctection
-
-
Ginter, K.L.1
Shear, V.H.2
Spahn, F.J.3
Van Wie, D.M.4
-
86
-
-
0029517251
-
A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile
-
C.H. Chou and Y.C. Li (1995) A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile. IEEE Trans. on Circuits, Systems and Video Technology 5(6), 467-476.
-
(1995)
IEEE Trans. on Circuits, Systems and Video Technology
, vol.5
, Issue.6
, pp. 467-476
-
-
Chou, C.H.1
Li, Y.C.2
-
91
-
-
0019569248
-
The importance of phase in signals
-
A.V. Oppenheim and J.S. Lim (1981) The importance of phase in signals. Proc. of the IEEE 69 529-541.
-
(1981)
Proc. of the IEEE
, vol.69
, pp. 529-541
-
-
Oppenheim, A.V.1
Lim, J.S.2
-
93
-
-
84902734614
-
The role of phase in adaptive image coding
-
Pittsburgh: University of Southern California
-
A.G. Tescher (1978) The role of phase in adaptive image coding. Tech USCIPI Pub. 510, Image Processing Institute Pittsburgh: University of Southern California
-
(1978)
Tech USCIPI Pub. 510, Image Processing Institute
-
-
Tescher, A.G.1
-
95
-
-
0026142897
-
The jpeg still picture compression standard
-
April
-
G.K. Wallace (April 1991) The jpeg still picture compression standard. Communications of the ACM 34(4), 31-44.
-
(1991)
Communications of the ACM
, vol.34
, Issue.4
, pp. 31-44
-
-
Wallace, G.K.1
-
96
-
-
0031385945
-
On resolving rightful ownerships of digital images by invisible watermarks
-
W. Zeng and B. Liu (1997) On resolving rightful ownerships of digital images by invisible watermarks. IEEE International Conference on Image Processing 552-555.
-
(1997)
IEEE International Conference on Image Processing
, pp. 552-555
-
-
Zeng, W.1
Liu, B.2
-
100
-
-
0003855464
-
-
Second Edition, New York: Wiley & Sons
-
B. Schneier (1996) Applied Cryptography Second Edition New York: Wiley & Sons
-
(1996)
Applied Cryptography
-
-
Schneier, B.1
-
103
-
-
85144430047
-
Optimal design of data hiding methods robust to lossy compression.
-
to appear
-
M. Ramkumar and A. N. Akansu. Optimal design of data hiding methods robust to lossy compression. IEEE Trans. on Multimedia, to appear.
-
IEEE Trans. on Multimedia
-
-
Ramkumar, M.1
Akansu, A.N.2
-
105
-
-
0032074148
-
Rotation, scale and translation invariant spread spectrum digital image watermarking
-
J.J.K.Ó. Ruanaidh and T. Pun (1998) Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Processing 66(3), 303-317.
-
(1998)
Signal Processing
, vol.66
, Issue.3
, pp. 303-317
-
-
Ruanaidh, J.J.K.Ó.1
Pun, T.2
-
106
-
-
0032155522
-
Watermarking schemes and protocols for protecting rightful ownership and customer's rights
-
L. Qiao and K. Nahrstedt (1998) Watermarking schemes and protocols for protecting rightful ownership and customer's rights. Journal of Visual Communication and Image Representation 9 194-210.
-
(1998)
Journal of Visual Communication and Image Representation
, vol.9
, pp. 194-210
-
-
Qiao, L.1
Nahrstedt, K.2
|