-
1
-
-
0030384775
-
Technique for Data Hiding
-
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Technique for Data Hiding," IBM System Journal, Vol. 35, No. 3, 1996, pp. 313-336.
-
(1996)
IBM System Journal
, vol.35
, Issue.3
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
4
-
-
84961668976
-
A Technique for Copyright Protection of Digital Images Based upon (t, n)-Threshold Scheme
-
C. C. Chang, T. S. Chen, and P. F. Chung, "A Technique for Copyright Protection of Digital Images Based upon (t, n)-Threshold Scheme," to appear in Journal of Computing and Informatica , 2000.
-
(2000)
Journal of Computing and Informatica
-
-
Chang, C.C.1
Chen, T.S.2
Chung, P.F.3
-
5
-
-
84961618837
-
Hiding Multiple Watermarks in An Image
-
on Revision
-
C. C. Chang, and H. C. Wu, "Hiding Multiple Watermarks in An Image," Optical Engineering (on Revision)
-
Optical Engineering
-
-
Chang, C.C.1
Wu, H.C.2
-
6
-
-
0039825610
-
Overlapping Representation of Similar Images Using Linear Quadtrees Codes
-
Tao-Yuang, Taiwan, R.O.C., Aug
-
H. K. C. Chang, P. M. Chen, and L. L. Cheng, 'Overlapping Representation of Similar Images Using Linear Quadtrees Codes," In 8th IPPR Conference on Computer Vision, Graphics and Image Processing, Tao-Yuang, Taiwan, R.O.C., Aug. 1995, pp. 122-129.
-
(1995)
8th IPPR Conference on Computer Vision, Graphics and Image Processing
, pp. 122-129
-
-
Chang, H.K.C.1
Chen, P.M.2
Cheng, L.L.3
-
7
-
-
0032187555
-
A Virtual Image Cryptosystem Based upon Vector Quantization
-
T. S. Chen, C. C. Chang, and M. S. Hwang, "A Virtual Image Cryptosystem Based upon Vector Quantization," IEEE Transactions on Image Processing, Vol. 7, No. 10, 1998, pp. 1485-1488.
-
(1998)
IEEE Transactions on Image Processing
, vol.7
, Issue.10
, pp. 1485-1488
-
-
Chen, T.S.1
Chang, C.C.2
Hwang, M.S.3
-
8
-
-
0031362116
-
Secure Spread Spectrum Watermarking for Multimedia
-
Dec
-
I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Transactions on Image Processing, Vol. 6, No. 12, Dec. 1997, pp. 1073-1687.
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1073-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
9
-
-
0032075477
-
Some General Methods for Tampering with Watermarks
-
May
-
I. J. Cox and J. P. M. G. Linnartz, "Some General Methods for Tampering with Watermarks," IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, May 1998, pp. 587-593.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 587-593
-
-
Cox, I.J.1
Linnartz, J.P.M.G.2
-
10
-
-
0032074580
-
Resolving Owner-ships with Invisible Watermarking Technique: Limitations, Attacks, and Implication
-
S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung, "Resolving Owner-ships with Invisible Watermarking Technique: Limitations, Attacks, and Implication," IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, 1998, pp. 573-586.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 573-586
-
-
Craver, S.1
Memon, N.2
Yeo, B.L.3
Yeung, M.M.4
-
12
-
-
0032785523
-
Hidden Digital Watermarks in Images
-
Jan
-
C. T. Hsu and J. L. Wu, "Hidden Digital Watermarks in Images," IEEE Transactions on Image Processing, Vol. 8, No. 1, Jan. 1999, pp. 58-68.
-
(1999)
IEEE Transactions on Image Processing
, vol.8
, Issue.1
, pp. 58-68
-
-
Hsu, C.T.1
Wu, J.L.2
-
13
-
-
0001001980
-
Digital Watermarking of Color Images Using Amplitude Modulation
-
Apr
-
M. Kutter, F. Jordan, and F. Bossen, "Digital Watermarking of Color Images Using Amplitude Modulation," Journal of Electronic Imaging, Vol. 7, No. 2, Apr. 1998, pp. 326-332.
-
(1998)
Journal of Electronic Imaging
, vol.7
, Issue.2
, pp. 326-332
-
-
Kutter, M.1
Jordan, F.2
Bossen, F.3
-
14
-
-
0031268409
-
Compressed Quadtree Representations for Storing Similar Images
-
T. W. Lin, "Compressed Quadtree Representations for Storing Similar Images," Image and Vision Computing, Vol. 15, 1997, pp. 883-843.
-
(1997)
Image and Vision Computing
, vol.15
, pp. 883-1843
-
-
Lin, T.W.1
-
15
-
-
0032069581
-
Performance Comparison of Two Text Marking Method
-
S. Low and N. Maxemchuk, "Performance Comparison of Two Text Marking Method," IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, 1998, pp. 1017-1024.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 1017-1024
-
-
Low, S.1
Maxemchuk, N.2
-
16
-
-
0032069705
-
Watermarking Three-Dimensional Polygonal Models Through Geometric and Topological Modifications
-
R. Ohbuvhi, H. Masuda, and M. Aono, "Watermarking Three-Dimensional Polygonal Models Through Geometric and Topological Modifications," IEEE Journal on Selected Areas in Communications, Vol. 16, No, 4, 1998, pp. 551-560.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 551-560
-
-
Ohbuvhi, R.1
Masuda, H.2
Aono, M.3
-
17
-
-
0032095654
-
Multimedia Data Embedding and Watermarking Techniques
-
Jun
-
M. D. Swason, M. Kobayashi, and A. H. Tewfik, "Multimedia Data Embedding and Watermarking Techniques," Proceedings of IEEE, Vol. 86, No. 6, Jun. 1998, pp. 1064-1087.
-
(1998)
Proceedings of IEEE
, vol.86
, Issue.6
, pp. 1064-1087
-
-
Swason, M.D.1
Kobayashi, M.2
Tewfik, A.H.3
-
19
-
-
0030387424
-
A Watermark for Digital Image
-
Lausanne, Switzerland, Sept. 16-19
-
R. B. Wolfgang and E. J. Delp, "A Watermark for Digital Image," Proceedings of the 1996 International Conference on Image Processing, Lausanne, Switzerland, Vol. 3, Sept. 16-19, 1996, pp. 219-222.
-
(1996)
Proceedings of the 1996 International Conference on Image Processing
, vol.3
, pp. 219-222
-
-
Wolfgang, R.B.1
Delp, E.J.2
|