-
1
-
-
85051146974
-
-
Cambridge, UK Lecture Notes in Computer Science, Berlin Heidelberg New York Springer-Verlag
-
R Anderson, (ed.), Informalion hiding: first international workshop, Cambridge, UK Lecture Notes in Computer Science, vol. 1174, Berlin Heidelberg New York Springer-Verlag, 19%.
-
(1996)
Informalion Hiding: First International Workshop
, vol.1174
-
-
Anderson, R.1
-
2
-
-
0012543218
-
The Steganographic File System
-
Portland, Oregon, USA, April, To be published
-
R Anderson, R Needham, A. Shamir, "The Steganographic File System", Proc. IMormation Hiding Workshop, Portland, Oregon, USA, April 1998. To be published.
-
(1998)
Proc. IMormation Hiding Workshop
-
-
Anderson, R.1
Needham, R.2
Shamir, A.3
-
3
-
-
0030384775
-
Techniques for Data Hiding
-
MIT Media Lab
-
W. Bender, D. Gruhl, N. Morimoto, A. Lu, "Techniques for Data Hiding", IBM Systems Journal Vol. 35, No. 3-4. MIT Media Lab, pp. 313-336, 1996.
-
(1996)
IBM Systems Journal
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
4
-
-
61849153506
-
Document Marking and Identification using Both Line and Word Shifting
-
Boston, April 1995
-
J. Brassil, L. O'Gorman, N.F. Maxemchuk, S.H. Low, "Document Marking and Identification using Both Line and Word Shifting", Infocom 1995, Boston, April 1995, pp. 853-860
-
(1995)
Infocom
, pp. 853-860
-
-
Brassil, J.1
O'Gorman, L.2
Maxemchuk, N.F.3
Low, S.H.4
-
5
-
-
84947937393
-
-
I. Cox, J. Kilian, T. Shamoon, T. Leighton, "A Secure, Robust Watermark for Multimedia", In: [1] pp 185- 206, 1996.
-
(1996)
A Secure, Robust Watermark for Multimedia
, pp. 185-206
-
-
Cox, I.1
Kilian, J.2
Shamoon, T.3
Leighton, T.4
-
6
-
-
85051135264
-
Resolving Rightful Ownerships with Invisible Watermarking Techniques
-
S. Craver, N. Memon, B. Yeo, N.M. Yeung, "Resolving Rightful Ownerships with Invisible Watermarking Techniques", Research Report RC 20755 (91985), Computer ScienceMathematics, IBM Research Division, 1997.
-
(1997)
Research Report RC 20755 (91985), Computer ScienceMathematics, IBM Research Division
-
-
Craver, S.1
Memon, N.2
Yeo, B.3
Yeung, N.M.4
-
7
-
-
84955601215
-
-
E. Franz, A. Jerichow, S. Moller, A. pfitzmann, I. Stierand, "Computer Based Steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best", In: [1] pp. 7-2 1, 1996.
-
(1996)
Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best
, pp. 7-21
-
-
Franz, E.1
Jerichow, A.2
Moller, S.3
Pfitzmann, A.4
Stierand, I.5
-
12
-
-
0031996445
-
Exploring Steganography: Seeing the Unseen
-
February
-
N.F. Johnson, S. Jajdia, "Exploring Steganography: Seeing the Unseen", IEEE Computer, February 1998, vol. 31, no. 2, pp.26-34
-
(1998)
IEEE Computer
, vol.31
, Issue.2
, pp. 26-34
-
-
Johnson, N.F.1
Jajdia, S.2
-
13
-
-
0001217283
-
Steganalysis of Images Created Using Current Steganography Software
-
Portland, Oregon, USA, April, To be published
-
N.F. Johnson, S. Jajodia, "Steganalysis of Images Created Using Current Steganography Software", Proc. Information Hiding Workshop, Portland, Oregon, USA, April 1998. To be published.
-
(1998)
Proc. Information Hiding Workshop
-
-
Johnson, N.F.1
Jajodia, S.2
-
14
-
-
33746611339
-
Reliable Blind Information Hiding for Images
-
Portland, Oregon, USA, April, To be published
-
L.M. Marvel, C.G. Boncelet, Jr., C.T. Retter, "Reliable Blind Information Hiding for Images", Proc. Informution Hiding Workshop, Portland, Oregon, USA, April 1998. To be published.
-
(1998)
Proc. Informution Hiding Workshop
-
-
Marvel, L.M.1
Boncelet, C.G.2
Retter, C.T.3
-
15
-
-
0000230675
-
Attacks on Copyright Marking Systems
-
Portland, Oregon, USA, April, To be published
-
F. Petitcolas, R Anderson, M. Kuhn, "Attacks on Copyright Marking Systems", Proc. Informution Hiding Workshop, Portland, Oregon, USA, April 1998. To be published.
-
(1998)
Proc. Informution Hiding Workshop
-
-
Petitcolas, F.1
Anderson, R.2
Kuhn, M.3
-
16
-
-
85051128355
-
-
[10]
-
A. Piva, M. B d, F. Bartohi, V. Cappelhi, "DCT Based Watermark Recovering Without Resorting to the Uncorrupted Original Im&e", in [10], 1999 pp. 520-523.
-
(1999)
DCT Based Watermark Recovering Without Resorting to the Uncorrupted Original Im&e
, pp. 520-523
-
-
Piva, A.1
Bartohi, M.B.D.F.2
Cappelhi, V.3
-
17
-
-
84898868930
-
-
U.S. Patent, January 20, Held by Digimarc Corporation
-
G.B. Rhoads, "Method and Apparatus Responsive to a Code Signal Conveyed Through a Graphic Image", U.S. Patent 5, 710, 834, January 20, 1998. Held by Digimarc Corporation, http://www.digimarc.com
-
(1998)
Method and Apparatus Responsive to A Code Signal Conveyed Through A Graphic Image
-
-
Rhoads, G.B.1
-
18
-
-
0032095654
-
Multimedia Data-Embedding and Watermarking Technologies
-
June
-
M.D. Swanson, M. Kobayashi, A.H. Tewfii "Multimedia Data-Embedding and Watermarking Technologies", Proc. of the IEEE, vol. 86, no. 6, June, 1998, pp. 1064-1087.
-
(1998)
Proc. of the IEEE
, vol.86
, Issue.6
, pp. 1064-1087
-
-
Swanson, M.D.1
Kobayashi, M.2
Tewfii, A.H.3
-
19
-
-
0030407057
-
Transparent robust image watermarking
-
Piscataway, NJ. IEEE Press
-
M.D. Swanson, B. Zhy A.H. Tewfik, "Transparent robust image watermarking", Proc. IEEE International Confmence on Image Processing (ICIP96), Piscataway, NJ. IEEE Press, vol. III, 1996
-
(1996)
Proc. IEEE International Confmence on Image Processing (ICIP96)
, vol.3
-
-
Swanson, M.D.1
Zhy, B.2
Tewfik, A.H.3
|