-
2
-
-
0004192381
-
-
Computer Sciences Applied Mathematics Engineering, CRC press
-
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, Computer Sciences Applied Mathematics Engineering, CRC press, 1997. 90
-
(1997)
Handbook of Applied Cryptography
, pp. 90
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
3
-
-
0004082156
-
-
Electrical Engineering Series, McGraw-Hill International Editions, third edition
-
J. G. Proakis, Digital Communications, Electrical Engineering Series, McGraw-Hill International Editions, third edition, 1995. 92
-
(1995)
Digital Communications
, pp. 92
-
-
Proakis, J.G.1
-
5
-
-
0032074148
-
-
J. J. K. O’ruanaidh, T. Pun “rotation, Scale and Translation Invariant Spread Spectrum Digital Image Watermarking”, in Signal Processing, v 66 no 3, May, 1998. 92
-
(1998)
Rotation, Scale and Translation Invariant Spread Spectrum Digital Image Watermarking, in Signal Processing
, vol.66
, Issue.3
, pp. 92
-
-
O’ruanaidh, J.1
Pun, T.2
-
6
-
-
0030388964
-
“Secure Spread Spectrum Watermarking for Images
-
I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure Spread Spectrum Watermarking for Images, Audio and Video”, in Proceedings of IEEE-ICIP’96, v III, Oct. 1996. 92
-
(1996)
Audio and Video”, in Proceedings of IEEE-ICIP’96, V III
, pp. 92
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
7
-
-
0033601668
-
A DWT-based Technique for Spatio-frequency Masking of Digital Signatures
-
M. Barni, F. Bartolini, V. Cappellini, A. Lippi, and A. Piva, “A DWT-based Technique for Spatio-frequency Masking of Digital Signatures”, in Proceedings of SPIE Security and Watermarking of Multimedia Contents, v 3657, Jan 1999.
-
(1999)
Proceedings of SPIE Security and Watermarking of Multimedia Contents
, vol.3657
-
-
Barni, M.1
Bartolini, F.2
Cappellini, V.3
Lippi, A.4
Piva, A.5
-
9
-
-
0032097263
-
-
Computer Science and Scientific Computing, Academic Press, second edition
-
K. Fukunaga, Introduction to Statistical Pattern Recognition, Computer Science and Scientific Computing, Academic Press, second edition, 1990. 95
-
(1990)
Introduction to Statistical Pattern Recognition
, pp. 95
-
-
Fukunaga, K.1
-
10
-
-
0033601661
-
-
T. Kalker, G. Depovere, J. Haitsma, and M. Maes, “A VideoWatermarking System for Broadcast Monitoring”, in Proceedings of SPIE Security and Watermarking of Multimedia Contents, v 3657, Jan 1999. 95, 97
-
(1999)
A Videowatermarking System for Broadcast Monitoring, in Proceedings of SPIE Security and Watermarking of Multimedia Contents
, vol.3657
, Issue.95
, pp. 97
-
-
Kalker, T.1
Depovere, G.2
Haitsma, J.3
Maes, M.4
-
11
-
-
0032075477
-
-
I. J. Cox and J. P. Linnartz, “Some General Methods for Tampering with Watermark”, in IEEE Journal on Selected areas in communications, v 16 no 4, May 1998. 88, 95, 96
-
(1998)
Some General Methods for Tampering with Watermark, in IEEE Journal on Selected Areas in Communications, V 16 No 4
, vol.88
, Issue.95
, pp. 96
-
-
Cox, I.J.1
Linnartz, J.P.2
-
12
-
-
84948001327
-
-
F. A. P. Petitcolas, R. Anderson, and M. Kuhn, “Attacks on copyright marking systems”, in Proceedings of the Second Int. Workshop on Information Hiding, April 1998. 90
-
(1998)
Attacks on Copyright Marking Systems, in Proceedings of the Second Int. Workshop on Information Hiding
, pp. 90
-
-
Petitcolas, F.1
Anderson, R.2
Kuhn, M.3
-
13
-
-
84947908787
-
-
B. Schneier, Applied Cryptography, John Wiley & Sons, Inc., second edition, 1996. 88, 90
-
(1996)
Applied Cryptography, John Wiley & Sons, Inc., Second Edition
, vol.88
, pp. 90
-
-
Schneier, B.1
-
14
-
-
0032069486
-
-
M.D. Swanson, B. Zhu, A.H. Tewfik and L. Boney, “Robust Audio watermarking using perceptual masking”, in Signal Processing, v 66 no 3, May, 1998. 92
-
(1998)
Robust Audio Watermarking Using Perceptual Masking, in Signal Processing
, vol.66
, Issue.3
, pp. 92
-
-
Swanson, M.D.1
Zhu, B.2
Tewfik, A.H.3
Boney, L.4
-
16
-
-
0003657590
-
-
D. Knuth, The art of computer programming,vol II, Addison-Wesley series in Computer Science and Information Processing, second edition, 1981. 97
-
(1981)
The Art of Computer Programming,Vol II, Addison-Wesley Series in Computer Science and Information Processing, Second Edition
, pp. 97
-
-
Knuth, D.1
|