-
1
-
-
0003451454
-
-
NEC Research Institute, Technical Report 95-10
-
I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, Secure Spread Spectrum Watermarking for Multimedia", NEC Research Institute, Technical Report 95-10.
-
Secure Spread Spectrum Watermarking for Multimedia
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
2
-
-
0002487426
-
A review of watermarking and the importance of perceptual modeling
-
February
-
I. J. Cox and M. L. Miller, "A review of watermarking and the importance of perceptual modeling", Proceedings of Electronic Imaging'97, February 1997.
-
(1997)
Proceedings of Electronic Imaging'97
-
-
Cox, I.J.1
Miller, M.L.2
-
3
-
-
0032095654
-
Multimedia Data Embedding and Watermarking Technologies
-
M. D. Swanson, M. Kobayashi, and A. H. Tewfik, "Multimedia Data Embedding and Watermarking Technologies", Invited Paper, to appear in the Proceedings of the IEEE, 1998.
-
(1998)
Invited Paper, to appear in the Proceedings of the IEEE
-
-
Swanson, M.D.1
Kobayashi, M.2
Tewfik, A.H.3
-
4
-
-
84957906698
-
Transparent Robust Watermarking for Images and Audio
-
A. H. Tewfik, M. D. Swanson, B. Zhu, K. Hamdy, and L. Boney, "Transparent Robust Watermarking for Images and Audio". IEEE Trans. on Signal Proc., 1996.
-
(1996)
IEEE Trans. on Signal Proc
-
-
Tewfik, A.H.1
Swanson, M.D.2
Zhu, B.3
Hamdy, K.4
Boney, L.5
-
6
-
-
0027684995
-
Signal Compression Based on Models of Human Perception
-
Oct
-
N. Jayant, J. Johnston, and R. Safranek, "Signal Compression Based on Models of Human Perception", Proceedings of the IEEE, Vol. 81, No. 10, Oct 1993.
-
(1993)
Proceedings of the IEEE
, vol.81
, Issue.10
-
-
Jayant, N.1
Johnston, J.2
Safranek, R.3
-
9
-
-
84955564864
-
Modulation and Information Hiding in Images
-
Information Hiding, First International Workshop, edited by Ross J. Anderson. Cambridge, U. K., May 30 June 1,Springer-Verlag, 1996
-
B. O. Comiskey and J. R. Smith, "Modulation and Information Hiding in Images", in: Information Hiding, First International Workshop, edited by Ross J. Anderson. Cambridge, U. K., May 30 June 1, 1996, Proceedings. Lecture Notes in Computer Science, Vol. 1174, Springer-Verlag, 1996.
-
(1996)
Proceedings. Lecture Notes in Computer Science
, vol.1174
-
-
Comiskey, B.O.1
Smith, J.R.2
-
11
-
-
0003302360
-
Public watermarks and resistance to tampering
-
October 1997, CD version of Proceedings
-
I. J. Cox and Jean-Paul M. G. Linnartz, "Public watermarks and resistance to tampering", in Proceedings of the ICIP, October 1997, CD version of Proceedings.
-
Proceedings of the ICIP
-
-
Cox, I.J.1
Jean-Paul Linnartz, M.G.2
-
15
-
-
0000964065
-
Analysis of the sensitivity attack against electronic watermarks in images
-
April, submitted,Portland
-
J. P. Linnartz and M. van Dijk, "Analysis of the sensitivity attack against electronic watermarks in images", in Proceedings of the Workshop on Information Hiding, Portland, April 1997, submitted.
-
(1997)
Proceedings of the Workshop on Information Hiding
-
-
Linnartz, J.P.1
van Dijk, M.2
-
16
-
-
84978940128
-
Can invisible watermarks resolve rightful ownerships?
-
San Jose, CA, USA, Feb. 13 14
-
S. Craver, N. Memon, B.-L. Yeo, and M. Yeung. "Can invisible watermarks resolve rightful ownerships?" Proceedings of the IS&T/SPIE Conference on Storage and Retrieval for Image and Video Databases V, San Jose, CA, USA, Feb. 13 14, 1997, vol. 3022, pp. 310-321.
-
(1997)
Proceedings of the IS&T/SPIE Conference on Storage and Retrieval for Image and Video Databases V
, vol.3022
, pp. 310-321
-
-
Craver, S.1
Memon, N.2
Yeo, B.-L.3
Yeung, M.4
-
17
-
-
84957906705
-
-
M. G. Kuhn and F. A. P. Petitcolas, StirMark. Available at http: //www. cl. cam. ac. uk/~fapp2/ watermarking/stirmark/, Security Group, Computer Laboratory, University of Cambridge, UK (E-mail: {mgk25, fapp2}@cl. cam. ac. uk), 1997.
-
(1997)
-
-
Kuhn, M.G.1
Petitcolas, F.A.P.2
StirMark3
-
18
-
-
84957906706
-
-
Unzign. Available at http: //altern. org/watermark/(E-mail: unzign@hotmail. com), 1997.
-
(1997)
-
-
Unzign1
|