-
1
-
-
0012085074
-
Information Hiding, First International Workshop Proceedings
-
Ed, Springer-Verlag, Berlin
-
R. Anderson, Ed., Information Hiding, First International Workshop Proceedings, Lecture Notes in Computer Science 1174, Springer-Verlag, Berlin, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1174
-
-
Anderson, R.1
-
2
-
-
0030384775
-
Techniques for data hiding
-
W. Bender, D. Gruhl, N. Marimoto, and A. La, “Techniques for data hiding,” IBM Systems Journal 35 (1996).
-
(1996)
IBM Systems Journal
, pp. 35
-
-
Bender, W.1
Gruhl, D.2
Marimoto, N.3
La, A.4
-
3
-
-
0002994426
-
Fingerprinting long unforgiving messages
-
Springer-Verlag, Berlin
-
G.R. Blakely, C. Meadors, and G.B. Purdy, “Fingerprinting long unforgiving messages,” Crypto ‘85, Lecture Notes in Computer Science 218, Springer-Verlag, Berlin (1985), pp.180-189.
-
(1985)
Crypto ‘85, Lecture Notes in Computer Science 218
, pp. 180-189
-
-
Blakely, G.R.1
Meadors, C.2
Purdy, G.B.3
-
4
-
-
84957670625
-
Collusion-secure fingerprinting for digital data
-
Springer-Verlag, Berlin
-
D. Boneh and J. Shaw, “Collusion-secure fingerprinting for digital data,” Crypto ‘95, Lecture Notes in Computer Science 963, Springer-Verlag, Berlin, 1995, pp. 452-465.
-
(1995)
Crypto ‘95, Lecture Notes in Computer Science 963
, pp. 452-465
-
-
Boneh, D.1
Shaw, J.2
-
5
-
-
0030213628
-
Representations that uniquely characterize images modulo translation, rotation, and scaling
-
R.D. Brandt and F. Lin, “Representations that uniquely characterize images modulo translation, rotation, and scaling,” Pattern Recognition Letters 17 (1996), pp. 1001-1015.
-
(1996)
Pattern Recognition Letters
, vol.17
, pp. 1001-1015
-
-
Brandt, R.D.1
Lin, F.2
-
6
-
-
0031342429
-
Protecting publicly-available images with an invisible image watermark
-
G. W. Braudaway, “Protecting publicly-available images with an invisible image watermark,” Proc. IEEE Int. Conf. on Image Procesing, ICIP-97 (1997), Vol. 1, pp. 524-51.
-
(1997)
Proc. IEEE Int. Conf. On Image Procesing, ICIP-97
, vol.1
, pp. 524-551
-
-
Braudaway, G.W.1
-
7
-
-
0000035237
-
Tracing traitors
-
Springer-Verlag, Berlin
-
B. Chor, A. Fiat, and M. Naor, “Tracing traitors,” Crypto ‘94, Lecture Notes in Computer Science 963, Springer-Verlag, Berlin, 1995, pp. 452-465.
-
(1995)
Crypto ‘94, Lecture Notes in Computer Science 963
, pp. 452-465
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
8
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. on Image Processing 6 (1997), 1673-1687.
-
(1997)
IEEE Trans. On Image Processing
, vol.6
, pp. 1673-1687
-
-
Cox, I.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
12
-
-
85076354824
-
Embedded data glyph technology for hardcopy digital documents
-
D.L. Hecht, “ Embedded data glyph technology for hardcopy digital documents,” SPIE 2171 (1995).
-
(1995)
SPIE 2171
-
-
Hecht, D.L.1
-
13
-
-
0038810954
-
Secure copyright protection techniques for digital images
-
A. Herrigal, J.J Ò Ruanaidh, W. Peterson, S. Pereira, and T. Pun, “Secure copyright protection techniques for digital images,” Preliminary Proceedings of the Second International Information Hiding Workshop (1998).
-
(1998)
Preliminary Proceedings of the Second International Information Hiding Workshop
-
-
Herrigal, A.1
Ruanaidh, J.J.Ò.2
Peterson, W.3
Pereira, S.4
Pun, T.5
-
14
-
-
84958101075
-
-
ICIP-47, Vols. I-III, IEEE Computer Society, Los Alamitos, CA
-
Proceedings of the IEEE International Conference on Image Processing, ICIP-47, Vols. I-III, IEEE Computer Society, Los Alamitos, CA, 1997.
-
(1997)
Proceedings of the IEEE International Conference on Image Processing
-
-
-
16
-
-
84958101077
-
-
Dept. of Electrical Engineering, University of Maryland, College Park, MD, manuscript
-
D. Karakos and A. Papamarcou, “Some results on the information capacity of authentication channels,” Dept. of Electrical Engineering, University of Maryland, College Park, MD, manuscript, 1997.
-
(1997)
Some Results on the Information Capacity of Authentication Channels
-
-
Karakos, D.1
Papamarcou, A.2
-
17
-
-
84958101078
-
-
unpublished manuscript
-
J. Kilian, F.T. Leighton, L. Matheson, T. Shamoon, R. Tarjan, and F. Zane, “Resistance of digital fingerprints to collusional attacks,” unpublished manuscript (1997).
-
(1997)
Resistance of Digital Fingerprints to Collusional Attacks
-
-
Kilian, J.1
Leighton, F.T.2
Matheson, L.3
Shamoon, T.4
Tarjan, R.5
Zane, F.6
-
22
-
-
0029777872
-
Protecting publicallyavailable images with a visible image watermark
-
K.A. Magerlein, G.W. Brandaway, and F.C. Mintzer, “Protecting publicallyavailable images with a visible image watermark,” Proc. SPIE Conf. on Optical Security and Counterfeit Deterrence Techniques, SPIE 2659 (1996), pp. 126-132.
-
(1996)
Proc. SPIE Conf. On Optical Security and Counterfeit Deterrence Techniques, SPIE 2659
, pp. 126-132
-
-
Magerlein, K.A.1
Brandaway, G.W.2
Mintzer, F.C.3
-
23
-
-
0030205766
-
Watermarking digital images for copyright protection
-
J.J.K Ò Ruanaidh, W. J. Dowling, and F. M. Boland, “Watermarking digital images for copyright protection,” IEE Proc. on Vision, Image and Signal Processing 143 (1996), pp. 250-256.
-
(1996)
IEE Proc. On Vision, Image and Signal Processing
, vol.143
, pp. 250-256
-
-
Ruanaidh, J.J.1
Dowling, W.J.2
Boland, F.M.3
-
24
-
-
0030385474
-
Phase watermarking of digital images
-
J.J.K. O Ruanaidh, W.J. Dowling, and F.M. Boland, “Phase watermarking of digital images,” Proc. IEEE International Conference on Image Processing ICIP-96 (1996), pp. 239-242.
-
(1996)
Proc. IEEE International Conference on Image Processing ICIP-96
, vol.96
, pp. 239-242
-
-
Ruanaidh, J.1
Dowling, W.J.2
Boland, F.M.3
-
25
-
-
0031365813
-
Rotation, translation and scale invariant digital image watermarking
-
J. 6 Ruanaidh and T. Pun, “Rotation, translation and scale invariant digital image watermarking,” Proceedings 1997 IEEE International Conference on Image Processing (1997), Vol. 1, pp. 536-539.
-
(1997)
Proceedings 1997 IEEE International Conference on Image Processing
, vol.1
, pp. 536-539
-
-
6 Ruanaidh, J.1
Pun, T.2
-
27
-
-
84947921515
-
Anonymous fingerprinting, (Extended abstract)
-
Springer-Verlag, Berlin
-
B. Pfitzmann and M. Shaunter, “Anonymous fingerprinting, (extended abstract),” EUROCRYPT ‘96, Lecture Notes in Computer Science 1070, Springer-Verlag, Berlin (1996), pp. 84-95.
-
(1996)
EUROCRYPT ‘96, Lecture Notes in Computer Science 1070
, pp. 84-95
-
-
Pfitzmann, B.1
Shaunter, M.2
-
30
-
-
0031354216
-
DCT-based watermark recovering without resorting to the uncorrupted original image
-
A. Piva, M. Barni, F. Bartolini, and V. Cappellini, “DCT-based watermark recovering without resorting to the uncorrupted original image,” Proceedings 1997 IEEE International Conference on Image Processing (1997) Vol. 1, pp. 520-523.
-
(1997)
Proceedings 1997 IEEE International Conference on Image Processing
, vol.1
, pp. 520-523
-
-
Piva, A.1
Barni, M.2
Bartolini, F.3
Cappellini, V.4
-
34
-
-
84997769409
-
A digital watermark
-
R. van Schyndel, A. Tirkel, and C. Osborne, “A digital watermark,” Proceedings 1994 IEEE International Conference on Image Processing, (1994), pp. 86-90.
-
(1994)
Proceedings 1994 IEEE International Conference on Image Processing
, pp. 86-90
-
-
Van Schyndel, R.1
Tirkel, A.2
Osborne, C.3
-
36
-
-
0022725396
-
Experiments on pattern recognition using invariant Fourier-Mellon descriptors
-
Y. Sheng and H.H. Arsenault, “Experiments on pattern recognition using invariant Fourier-Mellon descriptors,” J. Optical Society of America A 3 (1986), pp. 771-776.
-
(1986)
J. Optical Society of America A
, vol.3
, pp. 771-776
-
-
Sheng, Y.1
Arsenault, H.H.2
-
37
-
-
84955564864
-
Modulation and information hiding in images
-
R. Anderson, ed., Lecture Notes in Computer Science 1174, Springer-Verlag, Berlin
-
J.R. Smith and B.O. Comisky, “Modulation and information hiding in images,” Information Hiding, First International Workshop Procedings, R. Anderson, ed., Lecture Notes in Computer Science 1174, Springer-Verlag, Berlin (1996), pp. 207-226.
-
(1996)
Information Hiding, First International Workshop Procedings
, pp. 207-226
-
-
Smith, J.R.1
Comisky, B.O.2
-
39
-
-
0030407057
-
Transparent robust image watermarking
-
M.D. Swanson, B. Zhu, and A.A. Tewfik, “Transparent robust image watermarking,” Proc IEEE Int. Conf. On Image Processing, ICIP-96 Vol. 3, (1996) pp. 211-214.
-
(1996)
Proc IEEE Int. Conf. On Image Processing, ICIP-96
, vol.3
, pp. 211-214
-
-
Swanson, M.D.1
Zhu, B.2
Tewfik, A.A.3
-
41
-
-
0031365052
-
Data Hiding for Video in Video
-
M. Swanson, B. Zhu, and A. Tewfik, “Data Hiding for Video in Video,” Proceedings 1997 IEEE International Conference on Image Processing, (1997), Vol 2, pp. 676-679.
-
(1997)
Proceedings 1997 IEEE International Conference on Image Processing
, vol.2
, pp. 676-679
-
-
Swanson, M.1
Zhu, B.2
Tewfik, A.3
-
42
-
-
0002167987
-
Electronic watermark
-
A. Tirkel, G. Rankin, R. van Schyndel, W. Ho, N. Mee, and C Osborne, “Electronic watermark,” Proceedings DICTA-93 (1993), pp. 666-673.
-
(1993)
Proceedings DICTA-93
, pp. 666-673
-
-
Tirkel, A.1
Rankin, G.2
Van Schyndel, R.3
Ho, W.4
Mee, N.5
Osborne, C.6
-
44
-
-
0031385945
-
On resolving rightful ownerships of digital images by invisible watermarks
-
W. Zeng and B. Liu, “On resolving rightful ownerships of digital images by invisible watermarks,” Proc. IEEE Int. Conf. on Image Processing, ICIP-97 (1997), Vol. 1, pp. 552-555.
-
(1997)
Proc. IEEE Int. Conf. On Image Processing, ICIP-97
, vol.1
, pp. 552-555
-
-
Zeng, W.1
Liu, B.2
|