-
1
-
-
84882201128
-
-
http://www.usatoday.com/tech/news/2001-02-05-binladen.htm.
-
-
-
-
2
-
-
84882122427
-
-
http://www.vernace.com.
-
-
-
-
3
-
-
84882177180
-
-
http://www.aacsla.com.
-
-
-
-
4
-
-
84882088630
-
-
http://www.tektronix.com/Measurement/App_Notes/25_14225/eng/25W_14225_2.pdf.
-
-
-
-
5
-
-
84882057668
-
-
Personal communication.
-
Personal communication.
-
-
-
-
6
-
-
84882109175
-
-
http://www.research.att.com/njas/lattices/.
-
-
-
-
7
-
-
84882188760
-
-
http://forum.doom9.org/showthread.php?t=119871.
-
-
-
-
8
-
-
84882142290
-
-
http://www.wired.com/wired/archive/3.05/eword.html?pg=7.
-
-
-
-
10
-
-
84882211842
-
Epson introduces revolutionary image authentication system for Epson digital cameras
-
Epson introduces revolutionary image authentication system for Epson digital cameras. Business Wire 1999, April 5.
-
(1999)
Business Wire
, vol.April 5
-
-
-
11
-
-
1842491840
-
Inventing the Web
-
Abbate J. Inventing the Web. Proc. of the IEEE 1999, 87(11):1999-2002.
-
(1999)
Proc. of the IEEE
, vol.87
, Issue.11
, pp. 1999-2002
-
-
Abbate, J.1
-
12
-
-
13244278081
-
Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding
-
Abrardo A., Barni M. Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding. IEEE Trans. on signal Processing 2005, 53(2):824-833.
-
(2005)
IEEE Trans. on signal Processing
, vol.53
, Issue.2
, pp. 824-833
-
-
Abrardo, A.1
Barni, M.2
-
13
-
-
33646183263
-
Trellis-coded rational dither modulation for digital watermarking
-
Springer Lecture Notes in Computer Science
-
Abrardo A., Barni M., Perez-Gonzalez F., Mosquera C. Trellis-coded rational dither modulation for digital watermarking. Proceedings of the 4th International Workshop on Digital Watermarking, volume LNCS 3710 2005, 351-360. Springer Lecture Notes in Computer Science.
-
(2005)
Proceedings of the 4th International Workshop on Digital Watermarking, volume LNCS 3710
, pp. 351-360
-
-
Abrardo, A.1
Barni, M.2
Perez-Gonzalez, F.3
Mosquera, C.4
-
14
-
-
85009699718
-
Luminance-model-based DCT quantization for color image compression
-
Ahumada A.J., Peterson H.A. Luminance-model-based DCT quantization for color image compression. Proceedings of the SPIE 1992, 1666:365-374.
-
(1992)
Proceedings of the SPIE
, vol.1666
, pp. 365-374
-
-
Ahumada, A.J.1
Peterson, H.A.2
-
16
-
-
3843102623
-
Reversible watermark using the difference expansion of a generalized integer transform
-
Alattar A.M. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Transactions on Image Processing August 2004, 13(8):1147-1156.
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, Issue.8
, pp. 1147-1156
-
-
Alattar, A.M.1
-
19
-
-
33845635183
-
A set theoretic framework for watermarking and its application to semifragile tamper detection
-
Altun O., Sharma G., Celik U., Bocko F. A set theoretic framework for watermarking and its application to semifragile tamper detection. IEEE Trans. on Information Forensics and Security 2006, 1(4):479-492.
-
(2006)
IEEE Trans. on Information Forensics and Security
, vol.1
, Issue.4
, pp. 479-492
-
-
Altun, O.1
Sharma, G.2
Celik, U.3
Bocko, F.4
-
23
-
-
0032629579
-
Secure delivery of images over open networks
-
7
-
Augot Daniel, Boucqueau Jean-Marc, Delaigle Jean-Francois, Fontaine Caroline, Goray Eddie Secure delivery of images over open networks. Proceedings of the IEEE 1999, 87:1251-1266. 7.
-
(1999)
Proceedings of the IEEE
, vol.87
, pp. 1251-1266
-
-
Augot, D.1
Boucqueau, J.-M.2
Delaigle, J.-F.3
Fontaine, C.4
Goray, E.5
-
24
-
-
33645696636
-
Image steganalysis with binary similarity measures
-
Avcibas I., Kharrazi M., Memon N., Sankur B. Image steganalysis with binary similarity measures. EURASIP Journal on Applied Signal Processing 2005, 17:2749-2757.
-
(2005)
EURASIP Journal on Applied Signal Processing
, vol.17
, pp. 2749-2757
-
-
Avcibas, I.1
Kharrazi, M.2
Memon, N.3
Sankur, B.4
-
25
-
-
0034775171
-
Steganalysis using image quality metrics
-
E. Delp (Ed.)
-
Avcibas I., Memon N.D., Sankur B. Steganalysis using image quality metrics. Proceedings SPIE, Electronic Imaging, Security, and Watermarking of Multimedia Contents III, San Jose, CA, 2001 2001, Volume 4314:523-531. E. Delp (Ed.).
-
(2001)
Proceedings SPIE, Electronic Imaging, Security, and Watermarking of Multimedia Contents III, San Jose, CA, 2001
, vol.4314
, pp. 523-531
-
-
Avcibas, I.1
Memon, N.D.2
Sankur, B.3
-
26
-
-
24144456920
-
Public-key steganography with active attacks
-
Springer-Verlag, Heidelberg, J. Kilian (Ed.)
-
Backes M., Cachin C. Public-key steganography with active attacks. 2nd Theory of Cryptography Conference TCC, volume 3378 of LNCS 2005, 210-226. Springer-Verlag, Heidelberg. J. Kilian (Ed.).
-
(2005)
2nd Theory of Cryptography Conference TCC, volume 3378 of LNCS
, pp. 210-226
-
-
Backes, M.1
Cachin, C.2
-
29
-
-
0032072250
-
A DCT-domain system for robust image watermarking
-
Barni M., Bartolini F., Cappellini V., Piva A. A DCT-domain system for robust image watermarking. Signal Processing 1998, 66(3):357-372.
-
(1998)
Signal Processing
, vol.66
, Issue.3
, pp. 357-372
-
-
Barni, M.1
Bartolini, F.2
Cappellini, V.3
Piva, A.4
-
33
-
-
0038466802
-
Audion quality determination based on perceptual measurement techniques
-
Kluwer Academic Press, M. Kahrs, K. Brandenburg (Eds.)
-
Beerends J.G. Audion quality determination based on perceptual measurement techniques. Applications of Digital Signal Processing to Audio and Acoustics 1998, 1-38. Kluwer Academic Press. M. Kahrs, K. Brandenburg (Eds.).
-
(1998)
Applications of Digital Signal Processing to Audio and Acoustics
, pp. 1-38
-
-
Beerends, J.G.1
-
34
-
-
0033362222
-
The dynamic digital disk
-
Bell Alan E. The dynamic digital disk. IEEE Spectrum 1999, 36(10):28-35.
-
(1999)
IEEE Spectrum
, vol.36
, Issue.10
, pp. 28-35
-
-
Bell, A.E.1
-
35
-
-
0030384775
-
Techniques for data hiding
-
Bender W., Gruhl D., Morimoto N., Lu A. Techniques for data hiding. IBM Systems Journal 1996, 35(3/4):313-336.
-
(1996)
IBM Systems Journal
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
37
-
-
0030257652
-
Near optimum error correcting and decoding turbo-codes
-
Berrou C., Glavieux A. Near optimum error correcting and decoding turbo-codes. IEEE Trans. on Communications 1996, 44(10):1261-1271.
-
(1996)
IEEE Trans. on Communications
, vol.44
, Issue.10
, pp. 1261-1271
-
-
Berrou, C.1
Glavieux, A.2
-
41
-
-
0029250999
-
On modeling of DCT and subband image data for compression
-
Birney K.A., Fischer T.R. On modeling of DCT and subband image data for compression. IEEE Trans. on Image Processing 1995, 4(2):186-193.
-
(1995)
IEEE Trans. on Image Processing
, vol.4
, Issue.2
, pp. 186-193
-
-
Birney, K.A.1
Fischer, T.R.2
-
42
-
-
0032656890
-
Copy protection for DVD video
-
Bloom J.A., Cox I.J., Kalker T., Linnartz J-P., Miller M.L., Traw B. Copy protection for DVD video. Proc. of IEEE 1999, 87(7):1267-1276.
-
(1999)
Proc. of IEEE
, vol.87
, Issue.7
, pp. 1267-1276
-
-
Bloom, J.A.1
Cox, I.J.2
Kalker, T.3
Linnartz, J.-P.4
Miller, M.L.5
Traw, B.6
-
44
-
-
0002161311
-
The frequency analysis of time series for echos: Cepstrum, pseudo-autocovariance, cross-cepstrum, and saphe cracking
-
Bogert B.P., Healy M.J.R., Tukey J.W. The frequency analysis of time series for echos: Cepstrum, pseudo-autocovariance, cross-cepstrum, and saphe cracking. Proc. of the Symp. Time Series Analysis 1963, 209-243.
-
(1963)
Proc. of the Symp. Time Series Analysis
, pp. 209-243
-
-
Bogert, B.P.1
Healy, M.J.R.2
Tukey, J.W.3
-
47
-
-
0032623937
-
Lower bounds for high dimensional nearest neighbor search and related problems
-
Borodin A., Ostrovsky R., Rabani Y. Lower bounds for high dimensional nearest neighbor search and related problems. Proc. 31st ACM STOC 1999, 312-321.
-
(1999)
Proc. 31st ACM STOC
, pp. 312-321
-
-
Borodin, A.1
Ostrovsky, R.2
Rabani, Y.3
-
49
-
-
0028592391
-
Electronic marking and identification techniques to discourage document copying
-
Brassil J., Low S., Maxemchuk N., O'Gorman L. Electronic marking and identification techniques to discourage document copying. Proc. IEEE Infocom'94 1994, volume 3:1278-1287.
-
(1994)
Proc. IEEE Infocom'94
, vol.3
, pp. 1278-1287
-
-
Brassil, J.1
Low, S.2
Maxemchuk, N.3
O'Gorman, L.4
-
50
-
-
0029394108
-
Electronic marking and identification techniques to discourage document copying
-
Brassil J., Low S., Maxemchuk N., O'Gorman L. Electronic marking and identification techniques to discourage document copying. IEEE Journal of Selected Areas in Communication 1995, 13:1495-1504.
-
(1995)
IEEE Journal of Selected Areas in Communication
, vol.13
, pp. 1495-1504
-
-
Brassil, J.1
Low, S.2
Maxemchuk, N.3
O'Gorman, L.4
-
51
-
-
0028592391
-
Electronic marking and identification techniques to discourage document copying
-
Brassil J., Low S., Maxemchuk N.F., O'Gorman L. Electronic marking and identification techniques to discourage document copying. Proceedings, Infocom'94 1994, 1278-1287.
-
(1994)
Proceedings, Infocom'94
, pp. 1278-1287
-
-
Brassil, J.1
Low, S.2
Maxemchuk, N.F.3
O'Gorman, L.4
-
54
-
-
84882115511
-
-
TX-Application of photography to the microscope, Encyclopedia Britannica or the Dictionary of Arts, Sciences, and General Literature, Edinburgh
-
Brewster D. Microscope 1857, volume XIV. TX-Application of photography to the microscope, Encyclopedia Britannica or the Dictionary of Arts, Sciences, and General Literature, Edinburgh. 8th edition.
-
(1857)
Microscope
, vol.XIV
-
-
Brewster, D.1
-
55
-
-
0003693859
-
-
United States Patent, 4,807,031
-
Broughton R.S., Laumeister W.C. Interactive video method and apparatus 1989, United States Patent, 4,807,031.
-
(1989)
Interactive video method and apparatus
-
-
Broughton, R.S.1
Laumeister, W.C.2
-
57
-
-
0026967479
-
A survey of image registration techniques
-
Brown Lisa Gottesfeld A survey of image registration techniques. ACM Computing Surveys 1992, 24(4):325-376.
-
(1992)
ACM Computing Surveys
, vol.24
, Issue.4
, pp. 325-376
-
-
Brown, L.G.1
-
58
-
-
84882165502
-
The most beautiful book of the fifteeth century: Hypnerotomachia poliphili
-
Burke Redmond A. The most beautiful book of the fifteeth century: Hypnerotomachia poliphili. Bulletin of the New York Public Library 1954, 58(9):419-428.
-
(1954)
Bulletin of the New York Public Library
, vol.58
, Issue.9
, pp. 419-428
-
-
Burke, R.A.1
-
59
-
-
0004005665
-
-
Translated by R. H. Kay, MIT Press
-
Buser Pierre, Imbert Michel Audition 1992, Translated by R. H. Kay, MIT Press.
-
(1992)
Audition
-
-
Buser, P.1
Imbert, M.2
-
60
-
-
84957868624
-
An information-theoretic model for steganography
-
Springer-Verlag, New York, D. Aucsmith (Ed.)
-
Cachin C. An information-theoretic model for steganography. Information Hiding, 2nd International Workshop, volume 1525 of LNCS 1998, 306-318. Springer-Verlag, New York. D. Aucsmith (Ed.).
-
(1998)
Information Hiding, 2nd International Workshop, volume 1525 of LNCS
, pp. 306-318
-
-
Cachin, C.1
-
61
-
-
0013970078
-
Orientation selectivity of the human visual system
-
Campbell F.W., Kulikowski J.J. Orientation selectivity of the human visual system. J. Physiol. 1966, 187:437-445.
-
(1966)
J. Physiol.
, vol.187
, pp. 437-445
-
-
Campbell, F.W.1
Kulikowski, J.J.2
-
62
-
-
0013966804
-
The effect of orientation on the visual resolution of gratings
-
Campbell F.W., Kulikowski J.J., Levinson J. The effect of orientation on the visual resolution of gratings. J. Physiol. 1966, 187:427-436.
-
(1966)
J. Physiol.
, vol.187
, pp. 427-436
-
-
Campbell, F.W.1
Kulikowski, J.J.2
Levinson, J.3
-
63
-
-
84882086177
-
Adding INSPEC to your chemical search strategy-let's get physical
-
Carr Carol, O'Neill Patricia E. Adding INSPEC to your chemical search strategy-let's get physical. Database 1995, 18(2):99-102.
-
(1995)
Database
, vol.18
, Issue.2
, pp. 99-102
-
-
Carr, C.1
O'Neill, P.E.2
-
64
-
-
0016974698
-
Position, rotation, and scale invariant optical correlation
-
Casasent D., Psaltis D. Position, rotation, and scale invariant optical correlation. Applied Optics 1976, 15(7):1795-1799.
-
(1976)
Applied Optics
, vol.15
, Issue.7
, pp. 1795-1799
-
-
Casasent, D.1
Psaltis, D.2
-
65
-
-
0017406621
-
New optical transforms for pattern recognition
-
Casasent D., Psaltis D. New optical transforms for pattern recognition. Proc. of the IEEE 1977, 65(1):77-84.
-
(1977)
Proc. of the IEEE
, vol.65
, Issue.1
, pp. 77-84
-
-
Casasent, D.1
Psaltis, D.2
-
68
-
-
13244269881
-
Lossless generalized LSB data embedding
-
Celik M.U., Sharma G., Tekalp A.M., Saber E. Lossless generalized LSB data embedding. IEEE Transactions on Image Processing February 2005, 14(2):253-266.
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.2
, pp. 253-266
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
Saber, E.4
-
69
-
-
0032672872
-
A lower bound on the complexity of approximate nearest neighbor searching on the Hamming cube
-
Chakrabarti A., Chazelle B., Gum B., Lvov A. A lower bound on the complexity of approximate nearest neighbor searching on the Hamming cube. Proc. 31st ACM STOC 1999, 305-311.
-
(1999)
Proc. 31st ACM STOC
, pp. 305-311
-
-
Chakrabarti, A.1
Chazelle, B.2
Gum, B.3
Lvov, A.4
-
70
-
-
33847692468
-
Image steganography and steganalysis: Concepts and practice
-
Springer-Verlag, New York, T. Kalker, Y.M. Ro, I. Cox (Eds.)
-
Chandramouli R., Kharrazi M., Memon N. Image steganography and steganalysis: Concepts and practice. Digital Watermarking, 2nd International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, volume 2939 of LNCS 2004, 35-49. Springer-Verlag, New York. T. Kalker, Y.M. Ro, I. Cox (Eds.).
-
(2004)
Digital Watermarking, 2nd International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, volume 2939 of LNCS
, pp. 35-49
-
-
Chandramouli, R.1
Kharrazi, M.2
Memon, N.3
-
71
-
-
0036031193
-
Adaptive steganography
-
Chandramouli R., Li G., Memon N. Adaptive steganography. Proceedings SPIE, Electronic Imaging, Security Steganography, and Watermarking of Multimedia Contents IV 2002, 69-78.
-
(2002)
Proceedings SPIE, Electronic Imaging, Security Steganography, and Watermarking of Multimedia Contents IV
, pp. 69-78
-
-
Chandramouli, R.1
Li, G.2
Memon, N.3
-
74
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 1981, 24(2):84-88.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
75
-
-
0034291478
-
Digital audio broadcasting in the FM band by means of contiguous band insertion and precanceling techniques
-
Chen B., Sundberg C.-E. Digital audio broadcasting in the FM band by means of contiguous band insertion and precanceling techniques. IEEE Trans. on Communications 2000, 48(10):1634-1637.
-
(2000)
IEEE Trans. on Communications
, vol.48
, Issue.10
, pp. 1634-1637
-
-
Chen, B.1
Sundberg, C.-E.2
-
76
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
Chen B., Wornell G. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 2001, 47(4):1423-1443.
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.2
-
79
-
-
0033703674
-
Preprocessed and postprocessed quantization index modulation methods for digital watermarking
-
Chen B., Wornell G.W. Preprocessed and postprocessed quantization index modulation methods for digital watermarking. Security and Watermarking of Multimedia Contents II 2000, volume SPIE-3971:48-59.
-
(2000)
Security and Watermarking of Multimedia Contents II
, vol.SPIE-3971
, pp. 48-59
-
-
Chen, B.1
Wornell, G.W.2
-
80
-
-
0034513695
-
Blind digital watermarking for images and videos and performance analysis
-
Cheng Q., Huang T.S. Blind digital watermarking for images and videos and performance analysis. IEEE Int. Conf. on Multimedia and Expo 2000, volume 1:389-392.
-
(2000)
IEEE Int. Conf. on Multimedia and Expo
, vol.1
, pp. 389-392
-
-
Cheng, Q.1
Huang, T.S.2
-
82
-
-
0033308186
-
On the duality between distributed source coding and data hiding
-
Chou Jim, Pradhan S.Sandeep, Ramchandran Kannan On the duality between distributed source coding and data hiding. Thirty-third Asilomar Conference on Signals, Systems, and Computers 1999, 2:1503-1507.
-
(1999)
Thirty-third Asilomar Conference on Signals, Systems, and Computers
, vol.2
, pp. 1503-1507
-
-
Chou, J.1
Pradhan, S.S.2
Ramchandran, K.3
-
83
-
-
34548281101
-
Distortion-free robust watermarking: A case study
-
E. Delp (Ed.)
-
Coltuc D., Chassery J.-M. Distortion-free robust watermarking: A case study. Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX January 2007, volume 6505. E. Delp (Ed.).
-
(2007)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX
, vol.6505
-
-
Coltuc, D.1
Chassery, J.-M.2
-
85
-
-
0033601660
-
Fragile imperceptible digital watermark with privacy control
-
Coppersmith D., Mintzer F., Tresser C., Wu C.W., Yeung M.M. Fragile imperceptible digital watermark with privacy control. Security and Watermarking of Multimedia Contents 1999, volume SPIE-3657:79-84.
-
(1999)
Security and Watermarking of Multimedia Contents
, vol.SPIE-3657
, pp. 79-84
-
-
Coppersmith, D.1
Mintzer, F.2
Tresser, C.3
Wu, C.W.4
Yeung, M.M.5
-
86
-
-
84882229423
-
-
Corel Stock Photo Library 3, Corel Corporation, Ontario, Canada.
-
Corel Stock Photo Library 3, Corel Corporation, Ontario, Canada.
-
-
-
-
95
-
-
0032625842
-
Watermarking as communications with side information
-
Cox I.J., Miller M.L., McKellips A. Watermarking as communications with side information. Proc. IEEE 1999, 87(7):1127-1141.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1127-1141
-
-
Cox, I.J.1
Miller, M.L.2
McKellips, A.3
-
96
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox I.J., Kilian J., Leighton F.T., Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE Trans. on Image Processing 1997, 6(12):1673-1687.
-
(1997)
IEEE Trans. on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
99
-
-
14244254664
-
On public-key steganography in the presence of an active warden
-
IBM
-
Craver S. On public-key steganography in the presence of an active warden. Technical Report RC 20931 1997, IBM.
-
(1997)
Technical Report RC 20931
-
-
Craver, S.1
-
100
-
-
84957887122
-
On public-key steganography in the presence of an active warden
-
Craver S. On public-key steganography in the presence of an active warden. Proceedings 2nd Information Hiding Workshop 1998, 355-368.
-
(1998)
Proceedings 2nd Information Hiding Workshop
, pp. 355-368
-
-
Craver, S.1
-
101
-
-
0004166728
-
Can invisible watermarks solve rightful ownerships?
-
IBM CyberJournal, IBM Research
-
Craver S., Memon N., Yeo B.-L., Yeung M.M. Can invisible watermarks solve rightful ownerships?. IBM Technical Report RC 20509 July 1996, IBM CyberJournal, IBM Research. http://www.research.ibm.
-
(1996)
IBM Technical Report RC 20509
-
-
Craver, S.1
Memon, N.2
Yeo, B.-L.3
Yeung, M.M.4
-
102
-
-
0032074580
-
Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications
-
Craver S., Memon N., Yeo B.-L., Yeung M.M. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications. IEEE Journal of Selected Areas in Communication 1998, 16(4):573-586.
-
(1998)
IEEE Journal of Selected Areas in Communication
, vol.16
, Issue.4
, pp. 573-586
-
-
Craver, S.1
Memon, N.2
Yeo, B.-L.3
Yeung, M.M.4
-
104
-
-
4744365298
-
Detection of hiding in the least significant bit
-
Dabeer O., Sullivan K., Madhow U., Chandrasekaran S., Manjunath B.S. Detection of hiding in the least significant bit. IEEE Transactions on Signal Processing 2004, 52:3046-3058.
-
(2004)
IEEE Transactions on Signal Processing
, vol.52
, pp. 3046-3058
-
-
Dabeer, O.1
Sullivan, K.2
Madhow, U.3
Chandrasekaran, S.4
Manjunath, B.S.5
-
105
-
-
0003162539
-
The Visible Difference Dredictor: An algorithm for the assessment of image fidelity
-
chapter 14, MIT Press, A.B. Watson (Ed.)
-
Daly Scott The Visible Difference Dredictor: An algorithm for the assessment of image fidelity. Digital Images and Human Vision 1993, 179-206. chapter 14, MIT Press. A.B. Watson (Ed.).
-
(1993)
Digital Images and Human Vision
, pp. 179-206
-
-
Daly, S.1
-
107
-
-
0035417459
-
Engineering considerations in commercial watermarking
-
Decker Steve Engineering considerations in commercial watermarking. IEEE Communications Magazine 2001, 39(8):128-133.
-
(2001)
IEEE Communications Magazine
, vol.39
, Issue.8
, pp. 128-133
-
-
Decker, S.1
-
109
-
-
0034441174
-
Generalized 2D cyclic patterns for secret watermark generation
-
Delannay D., Macq B. Generalized 2D cyclic patterns for secret watermark generation. IEEE Int. Conf. on Image Processing 2000, volume 2:77-79.
-
(2000)
IEEE Int. Conf. on Image Processing
, vol.2
, pp. 77-79
-
-
Delannay, D.1
Macq, B.2
-
110
-
-
0033325534
-
The VIVA project: Digital watermarking for broadcast monitoring
-
Depovere G., Kalker T., Haitsma J., Maes M., de Strycker L., Termont P., Vandewege J., Langell A., Alm C., Norman P., O'Reilly B., Howes G., Vaanholt H., Hinizen R., Donnelly P., Hudson A. The VIVA project: Digital watermarking for broadcast monitoring. IEEE Int. Conf. on Image Processing 1999, 2:202-205.
-
(1999)
IEEE Int. Conf. on Image Processing
, vol.2
, pp. 202-205
-
-
Depovere, G.1
Kalker, T.2
Haitsma, J.3
Maes, M.4
de Strycker, L.5
Termont, P.6
Vandewege, J.7
Langell, A.8
Alm, C.9
Norman, P.10
O'Reilly, B.11
Howes, G.12
Vaanholt, H.13
Hinizen, R.14
Donnelly, P.15
Hudson, A.16
-
111
-
-
0032317876
-
Improved watermark detection using filtering before correlation
-
volume 1, Chicago
-
Depovere Geert, Kalker Ton, Linnartz Jean-Paul Improved watermark detection using filtering before correlation. IEEE Int. Conf. on Image Processing October 1998, 430-434. volume 1, Chicago.
-
(1998)
IEEE Int. Conf. on Image Processing
, pp. 430-434
-
-
Depovere, G.1
Kalker, T.2
Linnartz, J.-P.3
-
113
-
-
0033705373
-
A new approach for transformation invariant image and video watermarking in the spatial domain: SSP self-spanning patterns
-
Dittmann Jana, Fiebig Thomas, Steinmetz Ralf A new approach for transformation invariant image and video watermarking in the spatial domain: SSP self-spanning patterns. Security and Watermarking of Multimedia Contents II 2000, SPIE-3971:176-185.
-
(2000)
Security and Watermarking of Multimedia Contents II
, vol.SPIE-3971
, pp. 176-185
-
-
Dittmann, J.1
Fiebig, T.2
Steinmetz, R.3
-
115
-
-
0022909412
-
The phase vocoder: A tutorial
-
Dolson M. The phase vocoder: A tutorial. Comput. Music J. 1986, 10:14-27.
-
(1986)
Comput. Music J.
, vol.10
, pp. 14-27
-
-
Dolson, M.1
-
119
-
-
0001173821
-
Concatenated codes and their multilevel generalizations
-
chapter 23, Elsevier Science, Amsterdam, V.S. Pless, W.C. Huffman, R.A. Brualdi (Eds.)
-
Dumer I. Concatenated codes and their multilevel generalizations. Handbook of Coding Theory: Volume II 1998, 1911-1988. chapter 23, Elsevier Science, Amsterdam. V.S. Pless, W.C. Huffman, R.A. Brualdi (Eds.).
-
(1998)
Handbook of Coding Theory: Volume II
, pp. 1911-1988
-
-
Dumer, I.1
-
121
-
-
78149235674
-
On steganalysis of random LSB embedding in continuous-tone images
-
Dumitrescu S., Wu X., Memon N. On steganalysis of random LSB embedding in continuous-tone images. Proceedings ICIP 2002, 324-339.
-
(2002)
Proceedings ICIP
, pp. 324-339
-
-
Dumitrescu, S.1
Wu, X.2
Memon, N.3
-
122
-
-
35248901820
-
Detection of LSB steganography via sample pair analysis
-
Springer-Verlag, New York, F.A.P. Petitcolas (Ed.)
-
Dumitrescu S., Wu X., Wang Z. Detection of LSB steganography via sample pair analysis. Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, volume 2578 of LNCS 2003, 355-372. Springer-Verlag, New York. F.A.P. Petitcolas (Ed.).
-
(2003)
Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, volume 2578 of LNCS
, pp. 355-372
-
-
Dumitrescu, S.1
Wu, X.2
Wang, Z.3
-
123
-
-
0036029074
-
A communications approach to steganography
-
Eggers J., Buml R., Girod B. A communications approach to steganography. Proceedings SPIE, Electronic Imaging, Security, and Watermarking of Multimedia Contents IV 2002, volume 4675:26-37.
-
(2002)
Proceedings SPIE, Electronic Imaging, Security, and Watermarking of Multimedia Contents IV
, vol.4675
, pp. 26-37
-
-
Eggers, J.1
Buml, R.2
Girod, B.3
-
125
-
-
0037737759
-
Scalar costa scheme for information embedding
-
Eggers Joachim J., Buml Robert, Tzschoppe Roman, Girod Bernd Scalar costa scheme for information embedding. IEEE Transactions on Signal Processing April 2003, 51(4):1003-1019.
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, Issue.4
, pp. 1003-1019
-
-
Eggers, J.J.1
Buml, R.2
Tzschoppe, R.3
Girod, B.4
-
127
-
-
0035250758
-
Quantization effects on digital watermarks
-
Eggers Joachim J., Girod Bernd Quantization effects on digital watermarks. Signal Processing 2001, 81(3).
-
(2001)
Signal Processing
, vol.81
, Issue.3
-
-
Eggers, J.J.1
Girod, B.2
-
128
-
-
0003296294
-
Public key watermarking by eigenvectors of linear transforms
-
Eggers Joachim J., Su Jonathan K., Girod Bernd Public key watermarking by eigenvectors of linear transforms. EUSIPCO Sept. 2000.
-
(2000)
EUSIPCO
-
-
Eggers, J.J.1
Su, J.K.2
Girod, B.3
-
131
-
-
84957886834
-
Steganalysis and game equilibria
-
Springer-Verlag, New York, D. Aucsmith (Ed.)
-
Ettinger J.M. Steganalysis and game equilibria. Information Hiding, 2nd International Workshop, IH 1998, Portland, Oregon, April 1998, volume 1525 of LNCS 1998, 319-328. Springer-Verlag, New York. D. Aucsmith (Ed.).
-
(1998)
Information Hiding, 2nd International Workshop, IH 1998, Portland, Oregon, April 1998, volume 1525 of LNCS
, pp. 319-328
-
-
Ettinger, J.M.1
-
132
-
-
35248846436
-
Detecting hidden messages using higher-order statistics and support vector machines
-
Springer-Verlag, New York, F.A.P. Petitcolas (Ed.)
-
Farid H., Siwei L. Detecting hidden messages using higher-order statistics and support vector machines. Information Hiding, 5th International Workshop, IW 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, volume 2578 of LNCS 2002, 340-354. Springer-Verlag, New York. F.A.P. Petitcolas (Ed.).
-
(2002)
Information Hiding, 5th International Workshop, IW 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, volume 2578 of LNCS
, pp. 340-354
-
-
Farid, H.1
Siwei, L.2
-
133
-
-
0032691628
-
An odd-DFT based approach to time-scale expansion of audio signals
-
Ferreira Anibal J.S. An odd-DFT based approach to time-scale expansion of audio signals. IEEE Trans. Speech and Audio Proc. 1999, 7(4):441-453.
-
(1999)
IEEE Trans. Speech and Audio Proc.
, vol.7
, Issue.4
, pp. 441-453
-
-
Ferreira, A.J.S.1
-
134
-
-
0023492118
-
Relations between the statistics of natural images and the response properties of cortical cells
-
Field David J. Relations between the statistics of natural images and the response properties of cortical cells. J. Opt. Soc. Am. A 1987, 4(12):2379-2394.
-
(1987)
J. Opt. Soc. Am. A
, vol.4
, Issue.12
, pp. 2379-2394
-
-
Field, D.J.1
-
135
-
-
0035305446
-
On the automated recognition of seriously distorted musical recordings
-
Fragoulis D., Rousopoulos G., Panagopoulos T., Alexiou C., Papaodysseus C. On the automated recognition of seriously distorted musical recordings. IEEE Trans. on Signal Processing 2001, 49(4):898-908.
-
(2001)
IEEE Trans. on Signal Processing
, vol.49
, Issue.4
, pp. 898-908
-
-
Fragoulis, D.1
Rousopoulos, G.2
Panagopoulos, T.3
Alexiou, C.4
Papaodysseus, C.5
-
136
-
-
35248889376
-
Steganography preserving statistical properties
-
Springer-Verlag, New York, F.A.P. Petitcolas (Ed.)
-
Franz E. Steganography preserving statistical properties. Information Hiding, 5th International Workshop, volume 2578 of LNCS 2002, 278-294. Springer-Verlag, New York. F.A.P. Petitcolas (Ed.).
-
(2002)
Information Hiding, 5th International Workshop, volume 2578 of LNCS
, pp. 278-294
-
-
Franz, E.1
-
137
-
-
35048835739
-
Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
-
Springer-Verlag, New York, J. Fridrich (Ed.)
-
Fridrich J. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. Information Hiding, 6th International Workshop, IW 2004, Toronto, Canada, May 23-25, 2004, volume 3200 of LNCS 2005, 67-81. Springer-Verlag, New York. J. Fridrich (Ed.).
-
(2005)
Information Hiding, 6th International Workshop, IW 2004, Toronto, Canada, May 23-25, 2004, volume 3200 of LNCS
, pp. 67-81
-
-
Fridrich, J.1
-
139
-
-
8844243986
-
On estimation of secret message length in LSB steganography in spatial domain
-
Fridrich J., Goljan M. On estimation of secret message length in LSB steganography in spatial domain. Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, January 19-22, 2004 2004, volume 5306:23-34.
-
(2004)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, January 19-22, 2004
, vol.5306
, pp. 23-34
-
-
Fridrich, J.1
Goljan, M.2
-
141
-
-
0035472155
-
Detecting LSB steganography in color and grayscale images
-
O-D
-
Fridrich J., Goljan M., Du R. Detecting LSB steganography in color and grayscale images. IEEE Multimedia, Special Issue on Security October-December 2001, 8(4):22-28.
-
(2001)
IEEE Multimedia, Special Issue on Security
, vol.8
, Issue.4
, pp. 22-28
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
142
-
-
0034787093
-
Reliabile detection of LSB steganography in grayscale and color images
-
J. Dittmann, K. Nahrstedt, P. Wohlmacher (Eds.)
-
Fridrich J., Goljan M., Du R. Reliabile detection of LSB steganography in grayscale and color images. Proceedings of the ACM, Special Session on Multimedia Security and Watermarking 2001, 27-30. J. Dittmann, K. Nahrstedt, P. Wohlmacher (Eds.).
-
(2001)
Proceedings of the ACM, Special Session on Multimedia Security and Watermarking
, pp. 27-30
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
143
-
-
0035766166
-
Steganalysis based on JPEG compatibility
-
A.G. Tescher (Ed.)
-
Fridrich J., Goljan M., Du R. Steganalysis based on JPEG compatibility. Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia Systems and Applications IV, Denver, CO, August 20-24, 2001 2001, volume 4518:275-280. A.G. Tescher (Ed.).
-
(2001)
Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia Systems and Applications IV, Denver, CO, August 20-24, 2001
, vol.4518
, pp. 275-280
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
144
-
-
35248884299
-
Steganalysis of JPEG images: Breaking the F5 algorithm
-
Springer, New York
-
Fridrich J., Goljan M., Hogea D. Steganalysis of JPEG images: Breaking the F5 algorithm. 5th International Workshop on Information Hiding, Noordwijkerhout, The Netherlands, October 7-9, 2002, volume 2578 of LNCS 2002, 310-323. Springer, New York.
-
(2002)
5th International Workshop on Information Hiding, Noordwijkerhout, The Netherlands, October 7-9, 2002, volume 2578 of LNCS
, pp. 310-323
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
145
-
-
1442360452
-
Quantitative steganalysis of digital images: Estimating the secret message length
-
Fridrich J., Goljan M., Hogea D., Soukal D. Quantitative steganalysis of digital images: Estimating the secret message length. ACM Multimedia Systems Journal, Special Issue on Multimedia Security 2003, 9(3):288-302.
-
(2003)
ACM Multimedia Systems Journal, Special Issue on Multimedia Security
, vol.9
, Issue.3
, pp. 288-302
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
Soukal, D.4
-
146
-
-
0242665592
-
Higher-order statistical steganalysis of palette images
-
Fridrich J., Goljan M., Soukal D. Higher-order statistical steganalysis of palette images. Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V 2003, 178-190.
-
(2003)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V
, pp. 178-190
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
147
-
-
14844321910
-
Perturbed quantization steganography using wet paper codes
-
ACM Press, New York, J. Dittman, J. Fridrich (Eds.)
-
Fridrich J., Goljan M., Soukal D. Perturbed quantization steganography using wet paper codes. Proceedings ACM Multimedia and Security Workshop 2004, 4-15. ACM Press, New York. J. Dittman, J. Fridrich (Eds.).
-
(2004)
Proceedings ACM Multimedia and Security Workshop
, pp. 4-15
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
150
-
-
33746615578
-
Efficient wet paper codes
-
LNCS, Springer, Berlin, M. Barni (Ed.)
-
Fridrich J., Goljan M., Soukal D. Efficient wet paper codes. Proceedings, Information Hiding, 7th International Workshop, IH 2005 2006, LNCS, Springer, Berlin. M. Barni (Ed.).
-
(2006)
Proceedings, Information Hiding, 7th International Workshop, IH 2005
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
151
-
-
22044455110
-
Forensic steganalysis: Determining the stego key in spatial domain steganography
-
Fridrich J., Goljan M., Soukal D., Holotyak T. Forensic steganalysis: Determining the stego key in spatial domain steganography. Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, January 17-20, 2005 2005, volume 5681:631-642.
-
(2005)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, January 17-20, 2005
, vol.5681
, pp. 631-642
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
Holotyak, T.4
-
154
-
-
0027697301
-
The trustworthy camera: Restoring credibility to the photographic image
-
Friedman G.L. The trustworthy camera: Restoring credibility to the photographic image. IEEE Trans on Consumer Electronics 1993, 39(4):905-910.
-
(1993)
IEEE Trans on Consumer Electronics
, vol.39
, Issue.4
, pp. 905-910
-
-
Friedman, G.L.1
-
160
-
-
0242665921
-
Digital watermarking of audio signals using a psychoacoustic auditory model and spread spectrum theory
-
Garcia R.A. Digital watermarking of audio signals using a psychoacoustic auditory model and spread spectrum theory. Proc. 107th AES Convertion 1999.
-
(1999)
Proc. 107th AES Convertion
-
-
Garcia, R.A.1
-
162
-
-
0001935107
-
What's wrong with mean-squared error?
-
MIT Press, A.B. Watson (Ed.)
-
Girod Bernd What's wrong with mean-squared error?. Digital Images and Human Vision, chapter 15 1993, 207-220. MIT Press. A.B. Watson (Ed.).
-
(1993)
Digital Images and Human Vision, chapter 15
, pp. 207-220
-
-
Girod, B.1
-
164
-
-
0003225765
-
Safeguarding digital library contents and users: Digital images of treasured antiquities
-
Gladney H.M., Mintzer F.C., Schiattarella F. Safeguarding digital library contents and users: Digital images of treasured antiquities. D-Lib Magazine 1997.
-
(1997)
D-Lib Magazine
-
-
Gladney, H.M.1
Mintzer, F.C.2
Schiattarella, F.3
-
166
-
-
33645676686
-
New blind steganalysis and its implications
-
E. Delp, P.W. Wong (Eds.)
-
Goljan M., Fridrich J., Holotyak T. New blind steganalysis and its implications. Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII 2006, volume 6072:1-13. E. Delp, P.W. Wong (Eds.).
-
(2006)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII
, vol.6072
, pp. 1-13
-
-
Goljan, M.1
Fridrich, J.2
Holotyak, T.3
-
171
-
-
0017368502
-
A nonlinear model for the spatial characteristics of the human visual system
-
Hall C.F., Hall E.L. A nonlinear model for the spatial characteristics of the human visual system. IEEE Trans. Systems Man and Cybernetics 1977, 7(3):161-170.
-
(1977)
IEEE Trans. Systems Man and Cybernetics
, vol.7
, Issue.3
, pp. 161-170
-
-
Hall, C.F.1
Hall, E.L.2
-
172
-
-
0030647764
-
Time-scale modification of audio signals with combined harmonic and wavelet representations
-
Hamdy Khaled N., Tewfik Ahmed H., Chen Ting, Takagi Satoshi Time-scale modification of audio signals with combined harmonic and wavelet representations. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing 1997, 1:439-442.
-
(1997)
IEEE Int. Conf. on Acoustics, Speech, and Signal Processing
, vol.1
, pp. 439-442
-
-
Hamdy, K.N.1
Tewfik, A.H.2
Chen, T.3
Takagi, S.4
-
173
-
-
0004073653
-
-
Elsevier
-
Hanjalic A., Langelaar G.C., van Roosmalen P.M.B., Biemond J., Lagendijk R.L. Image and Video Databases: Restoration, Watermarking and Retrieval 2000, Elsevier.
-
(2000)
Image and Video Databases: Restoration, Watermarking and Retrieval
-
-
Hanjalic, A.1
Langelaar, G.C.2
van Roosmalen, P.M.B.3
Biemond, J.4
Lagendijk, R.L.5
-
174
-
-
0242576328
-
Steganalysis of additive noise modelable information hiding
-
E. Delp, P.W. Wong (Eds.)
-
Harmsen J.J., Pearlman W.A. Steganalysis of additive noise modelable information hiding. Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, Santa Clara, CA, January 21-24, 2003 2003, volume 5020:131-142. E. Delp, P.W. Wong (Eds.).
-
(2003)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, Santa Clara, CA, January 21-24, 2003
, vol.5020
, pp. 131-142
-
-
Harmsen, J.J.1
Pearlman, W.A.2
-
176
-
-
0017851927
-
On the use of windows for harmonic analysis with the Discrete Fourier Transform
-
Harris Fredric J. On the use of windows for harmonic analysis with the Discrete Fourier Transform. Proc. IEEE 1978, 66(1):51-83.
-
(1978)
Proc. IEEE
, vol.66
, Issue.1
, pp. 51-83
-
-
Harris, F.J.1
-
177
-
-
0032121339
-
Digital watermarking of MPEG-4 facial animation parameters
-
Hartung F., Eisert P., Girod B. Digital watermarking of MPEG-4 facial animation parameters. Comput. and Graphics 1998, 22(4):425-435.
-
(1998)
Comput. and Graphics
, vol.22
, Issue.4
, pp. 425-435
-
-
Hartung, F.1
Eisert, P.2
Girod, B.3
-
178
-
-
0032072064
-
Watermarking of uncompressed and compressed video
-
Hartung F., Girod B. Watermarking of uncompressed and compressed video. Signal Processing 1998, 66(3):283-301.
-
(1998)
Signal Processing
, vol.66
, Issue.3
, pp. 283-301
-
-
Hartung, F.1
Girod, B.2
-
180
-
-
0032634857
-
Multimedia watermarking techniques
-
Hartung Frank, Kutter Martin Multimedia watermarking techniques. Proc. IEEE. 1999, 87(7):1079-1107.
-
(1999)
Proc. IEEE.
, vol.87
, Issue.7
, pp. 1079-1107
-
-
Hartung, F.1
Kutter, M.2
-
185
-
-
0008668352
-
Identification of sound and like signals
-
Hembrooke Emil Frank Identification of sound and like signals. United States Patent 1961, 104.
-
(1961)
United States Patent
, pp. 104
-
-
Hembrooke, E.F.1
-
187
-
-
0344551172
-
Safety and security increase for air traffic management through unnoticeable watermark aircraft identification tag transmitted with the VHF voice communication
-
4E2
-
Hering H., Hagmüller M., Kubin G. Safety and security increase for air traffic management through unnoticeable watermark aircraft identification tag transmitted with the VHF voice communication. Proceedings of the 22nd Digital Avionics Systems Conference 2003, 1-10. 4E2.
-
(2003)
Proceedings of the 22nd Digital Avionics Systems Conference
, pp. 1-10
-
-
Hering, H.1
Hagmüller, M.2
Kubin, G.3
-
188
-
-
0032073388
-
Performance analysis of a 2D multipulse amplitude modulation scheme for data biding and watermarking still images
-
Hernandez J.J., Perez-Gonzalez E., Rodriguez J.M., Nieto G. Performance analysis of a 2D multipulse amplitude modulation scheme for data biding and watermarking still images. IEEE Journal of Selected Areas in Communication 1998, 16(4):510-524.
-
(1998)
IEEE Journal of Selected Areas in Communication
, vol.16
, Issue.4
, pp. 510-524
-
-
Hernandez, J.J.1
Perez-Gonzalez, E.2
Rodriguez, J.M.3
Nieto, G.4
-
189
-
-
0033882559
-
DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure
-
Hernandez J.R., Amado M., Perez-Gonzalez E. DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Transactions on Image Processing 2000, 9(1):55-68.
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, Issue.1
, pp. 55-68
-
-
Hernandez, J.R.1
Amado, M.2
Perez-Gonzalez, E.3
-
191
-
-
0032688251
-
Statistical analysis of watermarking schemes for copyright protection of images
-
Hernandez J.R., Perez-Gonzalez E. Statistical analysis of watermarking schemes for copyright protection of images. Proceedings of the IEEE 1999, 87(7):1142-1166.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1142-1166
-
-
Hernandez, J.R.1
Perez-Gonzalez, E.2
-
192
-
-
0003617369
-
-
Translated by Aubrey de Sélincourt, Penguin Books, London
-
Herodotus The Histories 1996, Translated by Aubrey de Sélincourt, Penguin Books, London.
-
(1996)
The Histories
-
-
Herodotus1
-
193
-
-
33645695370
-
A graph-theoretic approach to steganography
-
Salzburg. Austria, J. Dittmann (Ed.), S 19-21
-
Hetzl S., Mutzel P. A graph-theoretic approach to steganography. Communications and Multimedia Security 9th IFIP TC-6 TC-11 International Conference, CMS 2005 September 19-21, 2005, volume 3677:119-128. Salzburg. Austria. J. Dittmann (Ed.).
-
(2005)
Communications and Multimedia Security 9th IFIP TC-6 TC-11 International Conference, CMS 2005
, vol.3677
, pp. 119-128
-
-
Hetzl, S.1
Mutzel, P.2
-
195
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
Holliman Matthew, Memon Nasir Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. on Image Processing 2000, 9(3):432-441.
-
(2000)
IEEE Trans. on Image Processing
, vol.9
, Issue.3
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
-
200
-
-
0003966349
-
-
U.S. Patent Application, Docket No. 77102/E-D
-
Honsinger C.W., Jones P., Rabbani M., Stoffel J.C. Lossless recovery of an original image containing embedded data 1999, U.S. Patent Application, Docket No. 77102/E-D.
-
(1999)
Lossless recovery of an original image containing embedded data
-
-
Honsinger, C.W.1
Jones, P.2
Rabbani, M.3
Stoffel, J.C.4
-
201
-
-
84937438364
-
Provably secure steganography
-
volume 2442 of LNCS, Springer, M. Yung (Ed.)
-
Hopper N.J., Langford J., von Ahn L. Provably secure steganography. Advances in Cryptology: CRYPTO 2002 2002, 77-92. volume 2442 of LNCS, Springer. M. Yung (Ed.).
-
(2002)
Advances in Cryptology: CRYPTO 2002
, pp. 77-92
-
-
Hopper, N.J.1
Langford, J.2
von Ahn, L.3
-
203
-
-
0020203161
-
Rotation-invariant digital pattern recognition using circular harmonic expansion
-
Hsu Y.N., Arsenault H.H., April G. Rotation-invariant digital pattern recognition using circular harmonic expansion. Applied Optics 1982, 21:4012-4015.
-
(1982)
Applied Optics
, vol.21
, pp. 4012-4015
-
-
Hsu, Y.N.1
Arsenault, H.H.2
April, G.3
-
206
-
-
0004792394
-
Grouping for recognition
-
MIT
-
Jacobs D.W. Grouping for recognition. Al Memo 1177 1989, MIT.
-
(1989)
Al Memo 1177
-
-
Jacobs, D.W.1
-
207
-
-
0003817229
-
-
volume Monograph PM83, SPIE Press-The International Society for Optical Engineering
-
Janesick J.R. Scientific Charge-Coupled Devices January 2001, volume Monograph PM83, SPIE Press-The International Society for Optical Engineering.
-
(2001)
Scientific Charge-Coupled Devices
-
-
Janesick, J.R.1
-
208
-
-
0027684995
-
Signal compression based on models of human perception
-
Jayant N., Johnston J., Safranek R. Signal compression based on models of human perception. Proc IEEE 1993, 81(10).
-
(1993)
Proc IEEE
, vol.81
, Issue.10
-
-
Jayant, N.1
Johnston, J.2
Safranek, R.3
-
211
-
-
84904224992
-
Steganalysis of images created using current steganography software
-
volume 1525 of LNCS, Springer-Verlag, Berlin, D. Aucsmith (Ed.)
-
Johnson N.F., Jajodia S. Steganalysis of images created using current steganography software. Information Hidings, 2nd International Workshop, Portland, OR, April 1998 1998, 273-289. volume 1525 of LNCS, Springer-Verlag, Berlin. D. Aucsmith (Ed.).
-
(1998)
Information Hidings, 2nd International Workshop, Portland, OR, April 1998
, pp. 273-289
-
-
Johnson, N.F.1
Jajodia, S.2
-
212
-
-
0031996445
-
Steganography: Seeing the unseen
-
Johnson N.F., Jajodia S. Steganography: Seeing the unseen. IEEE Computer February 1998, 26-34.
-
(1998)
IEEE Computer
, pp. 26-34
-
-
Johnson, N.F.1
Jajodia, S.2
-
213
-
-
0003821623
-
Information technology-coding of moving pictures and associated audio for digital storage media at up to about 1.5 Mbits/s-part 3: Audio
-
JTCI/SC29/WG11 MPEG, ISO/IEC
-
JTCI/SC29/WG11 MPEG Information technology-coding of moving pictures and associated audio for digital storage media at up to about 1.5 Mbits/s-part 3: Audio. Technical Report IS11172-3 1992, ISO/IEC.
-
(1992)
Technical Report IS11172-3
-
-
-
215
-
-
0031635593
-
Robust IP watermarking methodologies for physical design
-
Kang A.B., Mantik S., Markov I.L., Potkonjak M., Tucker P., Wang Huijuan, Wolfe G. Robust IP watermarking methodologies for physical design. Proceedings 35th Design and Automation Conference 1998, 782-787.
-
(1998)
Proceedings 35th Design and Automation Conference
, pp. 782-787
-
-
Kang, A.B.1
Mantik, S.2
Markov, I.L.3
Potkonjak, M.4
Tucker, P.5
Wang, H.6
Wolfe, G.7
-
218
-
-
0242660379
-
Capacity bounds and code constructions for resersible data-hiding
-
E. Delp (Ed.)
-
Kalker T., Willems F.M. Capacity bounds and code constructions for resersible data-hiding. Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V January 2003, volume 5020:604-611. E. Delp (Ed.).
-
(2003)
Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V
, vol.5020
, pp. 604-611
-
-
Kalker, T.1
Willems, F.M.2
-
220
-
-
14844321260
-
A hierarchical protocol for increasing the stealthiness of steganographic methods
-
Karahan M., Topkara U., Atallah M., Taskiran C., Lin E., Delp E. A hierarchical protocol for increasing the stealthiness of steganographic methods. Proceedings ACM Multimedia and Security Workshop 2004, 16-24.
-
(2004)
Proceedings ACM Multimedia and Security Workshop
, pp. 16-24
-
-
Karahan, M.1
Topkara, U.2
Atallah, M.3
Taskiran, C.4
Lin, E.5
Delp, E.6
-
222
-
-
0036030621
-
On defining security in steganographic systems
-
Katzenbeisser S., Petitcolas E.A.P. On defining security in steganographic systems. Proceedings SPIE, Electronic Imaging Security, Steganography and Watermarking of Multimedia Contents IV, San Jose, CA, January 21-24, 2002 2002, volume 4675:50-56.
-
(2002)
Proceedings SPIE, Electronic Imaging Security, Steganography and Watermarking of Multimedia Contents IV, San Jose, CA, January 21-24, 2002
, vol.4675
, pp. 50-56
-
-
Katzenbeisser, S.1
Petitcolas, E.A.P.2
-
223
-
-
72949134521
-
Visual responses to time dependent stimuli. I. Amplitude sensitivity measurements
-
Kelly D.H. Visual responses to time dependent stimuli. I. Amplitude sensitivity measurements. J. Opt. Soc. Am. A. 1961, 51:422-429.
-
(1961)
J. Opt. Soc. Am. A.
, vol.51
, pp. 422-429
-
-
Kelly, D.H.1
-
224
-
-
8844280060
-
Quantitative evaluation of pairs and RS steganalysis
-
E.J. Delp, P.W. Wong (Eds.)
-
Ker A. Quantitative evaluation of pairs and RS steganalysis. Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, January 19-22, 2004 2004, volume 5306:83-97. E.J. Delp, P.W. Wong (Eds.).
-
(2004)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, January 19-22, 2004
, vol.5306
, pp. 83-97
-
-
Ker, A.1
-
225
-
-
33645663780
-
A general framework for structural analysis of LSB replacement
-
Springer-Verlag, Berlin, M. Barni (Ed.)
-
Ker A. A general framework for structural analysis of LSB replacement. Proceedings 7th Information Hiding Workshop, Barcelona. Spain. June 6-8, 2005, volume 3727, Lecture Notes in Computer Science 2005, 276-311. Springer-Verlag, Berlin. M. Barni (Ed.).
-
(2005)
Proceedings 7th Information Hiding Workshop, Barcelona. Spain. June 6-8, 2005, volume 3727, Lecture Notes in Computer Science
, pp. 276-311
-
-
Ker, A.1
-
226
-
-
35048891531
-
Improved detection of LSB steganography in grayscale images
-
volume 3200 of LNCS, Springer-Verlag, Berlin, J. Fridrich (Ed.)
-
Ker A. Improved detection of LSB steganography in grayscale images. Preproceedings, Information Hiding, 6th International Workshop, IIH 2004, Toronto Canada, May 23-25, 2004 2005, 97-115. volume 3200 of LNCS, Springer-Verlag, Berlin. J. Fridrich (Ed.).
-
(2005)
Preproceedings, Information Hiding, 6th International Workshop, IIH 2004, Toronto Canada, May 23-25, 2004
, pp. 97-115
-
-
Ker, A.1
-
227
-
-
21844456066
-
Resampling and the detection of LSB matching in color bitmaps
-
E. Delp (Ed.)
-
Ker A. Resampling and the detection of LSB matching in color bitmaps. Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedias Contents VII, San Jose, CA, January 16-20, 2005 2005, volume 5681:1-15. E. Delp (Ed.).
-
(2005)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedias Contents VII, San Jose, CA, January 16-20, 2005
, vol.5681
, pp. 1-15
-
-
Ker, A.1
-
228
-
-
85088739345
-
Optimally weighted least-squares steganalysis
-
E. Delp (Ed.)
-
Ker A. Optimally weighted least-squares steganalysis. Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX 2007, volume 6502:06. E. Delp (Ed.).
-
(2007)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX
, vol.6502
, pp. 06
-
-
Ker, A.1
-
229
-
-
33645678198
-
A two-factor error model for quantitative steganalysis
-
E. Delp (Ed.)
-
Ker A., Boehme R. A two-factor error model for quantitative steganalysis. Proceedings SPIE, Electronic Imaging, Security Steganography, and Watermarking of Multimedia Contents VIII 2006, volume 6072:06. E. Delp (Ed.).
-
(2006)
Proceedings SPIE, Electronic Imaging, Security Steganography, and Watermarking of Multimedia Contents VIII
, vol.6072
, pp. 06
-
-
Ker, A.1
Boehme, R.2
-
230
-
-
20444404178
-
Steganalysis of LSB matching in grayscale images
-
Ker A.D. Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters June 2005, 12(6):441-444.
-
(2005)
IEEE Signal Processing Letters
, vol.12
, Issue.6
, pp. 441-444
-
-
Ker, A.D.1
-
234
-
-
33746658042
-
Efficient steganography with provable security gurantees
-
Springer-Verlag, Berlin, M. Barni (Ed.)
-
Kiayias A., Raekow Y., Russell A. Efficient steganography with provable security gurantees. Proceedings, Information Hiding, 7th International Workshop, IH Barcelona, Spain, June 6-8, 2005, volume 3727 of LNCS 2005, 118-130. Springer-Verlag, Berlin. M. Barni (Ed.).
-
(2005)
Proceedings, Information Hiding, 7th International Workshop, IH Barcelona, Spain, June 6-8, 2005, volume 3727 of LNCS
, pp. 118-130
-
-
Kiayias, A.1
Raekow, Y.2
Russell, A.3
-
235
-
-
0013404163
-
Dirty Iinen, dark secrets
-
Kilburn David Dirty Iinen, dark secrets. Adweek 1997.
-
(1997)
Adweek
-
-
Kilburn, D.1
-
236
-
-
0003434530
-
Resistance of watermarked documents to collusional attacks
-
NEC Research Institute
-
Kilian J., Leighton F.T., Matheson L.R., Shamoon T., Tarjan R.E. Resistance of watermarked documents to collusional attacks. Technical Report Tr 97-167 1997, NEC Research Institute.
-
(1997)
Technical Report Tr 97-167
-
-
Kilian, J.1
Leighton, F.T.2
Matheson, L.R.3
Shamoon, T.4
Tarjan, R.E.5
-
239
-
-
0025431866
-
A proposal on digital watermark in document image communication and its application to realizing a signature
-
Komatsu N., Tominaga H. A proposal on digital watermark in document image communication and its application to realizing a signature. Electronics and Communications in Japan 1990, 73(5):208-218.
-
(1990)
Electronics and Communications in Japan
, vol.73
, Issue.5
, pp. 208-218
-
-
Komatsu, N.1
Tominaga, H.2
-
242
-
-
0032648596
-
Digital watermarking for telltale tamper proofing and authentication
-
Kundur D., Hatzinakos D. Digital watermarking for telltale tamper proofing and authentication. Proc. of the IEEE 1999, 87(7).
-
(1999)
Proc. of the IEEE
, vol.87
, Issue.7
-
-
Kundur, D.1
Hatzinakos, D.2
-
246
-
-
12444305842
-
Introduction to watermarking techniques
-
chapter 5, Artech House, S. Katzenbeisser, F.A.P. Petitcolas (Eds.)
-
Kutter M., Hartung F. Introduction to watermarking techniques. Information Hiding: Techniques for Sieganography and Digital Watermarking 2000, 97-120. chapter 5, Artech House. S. Katzenbeisser, F.A.P. Petitcolas (Eds.).
-
(2000)
Information Hiding: Techniques for Sieganography and Digital Watermarking
, pp. 97-120
-
-
Kutter, M.1
Hartung, F.2
-
250
-
-
0032666816
-
Improved phase vocoder time-scale modification of audio
-
Laroche Jean, Dolson Mark Improved phase vocoder time-scale modification of audio. IEEE Trans. Speech and Audio Proc. 1999, 7(3):323-332.
-
(1999)
IEEE Trans. Speech and Audio Proc.
, vol.7
, Issue.3
, pp. 323-332
-
-
Laroche, J.1
Dolson, M.2
-
252
-
-
0032656237
-
Authentication and correction of digital watermarking images
-
Lee Jaejin, Won Chee Sun Authentication and correction of digital watermarking images. Electronic Letters 1999, 35(11).
-
(1999)
Electronic Letters
, vol.35
, Issue.11
-
-
Lee, J.1
Won, C.S.2
-
253
-
-
0034513815
-
Image integrity and correction using parities of error control coding
-
Lee Jaejin, Won Chee Sun Image integrity and correction using parities of error control coding. IEEE Int. Conf. on Multimedia and Expo. 2000 2000, volume 3.
-
(2000)
IEEE Int. Conf. on Multimedia and Expo. 2000
, vol.3
-
-
Lee, J.1
Won, C.S.2
-
254
-
-
35048886777
-
EM estimation of scale factor for quantization based audio watermarking
-
Int. Proc 2nd Workshop on Digital Watermarking
-
Lee K., Kim D., Kim T., Moon K. EM estimation of scale factor for quantization based audio watermarking. LCNS 2939 2003, 316-327.
-
(2003)
LCNS 2939
, pp. 316-327
-
-
Lee, K.1
Kim, D.2
Kim, T.3
Moon, K.4
-
255
-
-
38849120767
-
Category attack for LSB embedding of JPEG images
-
Springer-Verlag
-
Lee K., Westfeld A., Lee S. Category attack for LSB embedding of JPEG images. Proceedings of the International Workshop on Digital Watermarking, LNCS 2006, volume 4283:35-38. Springer-Verlag.
-
(2006)
Proceedings of the International Workshop on Digital Watermarking, LNCS
, vol.4283
, pp. 35-38
-
-
Lee, K.1
Westfeld, A.2
Lee, S.3
-
257
-
-
33646756576
-
Using perceptual models to improve fidelity and provide invariance to valumetric scaling for quantization index modulation watermarking
-
Li Q., Cox I.J. Using perceptual models to improve fidelity and provide invariance to valumetric scaling for quantization index modulation watermarking. IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP) 2005, volume 2:1-4.
-
(2005)
IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP)
, vol.2
, pp. 1-4
-
-
Li, Q.1
Cox, I.J.2
-
262
-
-
0033688818
-
Rotation, scale and translation resilient public watermarking for images
-
Lin C.-Y., Wu M., Bloom J.A., Cox I.J., Miller M.L., Lui Y.M. Rotation, scale and translation resilient public watermarking for images. Security and Watermarking of Multimedia Contents, Proc. SPIE-3971 2000, 90-98.
-
(2000)
Security and Watermarking of Multimedia Contents, Proc. SPIE-3971
, pp. 90-98
-
-
Lin, C.-Y.1
Wu, M.2
Bloom, J.A.3
Cox, I.J.4
Miller, M.L.5
Lui, Y.M.6
-
265
-
-
38249003129
-
Towards absolute invariants of images under translation, rotation, and dilation
-
Lin F., Brandt R.D. Towards absolute invariants of images under translation, rotation, and dilation. Pattern Recognition Letters 1993, 14(5):369-379.
-
(1993)
Pattern Recognition Letters
, vol.14
, Issue.5
, pp. 369-379
-
-
Lin, F.1
Brandt, R.D.2
-
266
-
-
0038046046
-
Fingerprinting Digital Document
-
Linköping University
-
Lindkvist T. Fingerprinting Digital Document. Ph.D. thesis 1999, Linköping University.
-
(1999)
Ph.D. thesis
-
-
Lindkvist, T.1
-
268
-
-
34249687366
-
Modelling the false-alarm and missed detection rate for electronic watermarks
-
Springer, D. Aucsmith (Ed.)
-
Linnartz J.P.M.G., Kalker A.C.C., Depovere G.F. Modelling the false-alarm and missed detection rate for electronic watermarks. Workshop on Information Hiding, Portland, OR, volume 1525 of Lecture Notes in Computer Science 1998, 15-17. Springer. D. Aucsmith (Ed.).
-
(1998)
Workshop on Information Hiding, Portland, OR, volume 1525 of Lecture Notes in Computer Science
, pp. 15-17
-
-
Linnartz, J.P.M.G.1
Kalker, A.C.C.2
Depovere, G.F.3
-
269
-
-
0000964065
-
Analysis of the sensitivity attack against electronic watermarks in images
-
Linnartz J.P.M.G., Dijk Marten van Analysis of the sensitivity attack against electronic watermarks in images. Workshop on Information Hiding 1998, 15-17.
-
(1998)
Workshop on Information Hiding
, pp. 15-17
-
-
Linnartz, J.P.M.G.1
Dijk, M.V.2
-
270
-
-
84882109702
-
Random Codes for Digital Fingerprinting
-
Linköping University
-
Löfvenberg J. Random Codes for Digital Fingerprinting. Ph.D. thesis 1999, Linköping University.
-
(1999)
Ph.D. thesis
-
-
Löfvenberg, J.1
-
272
-
-
84947906380
-
Cocktail watermarking on images
-
A. Pfitzmann (Ed.)
-
Lu Chun-Shien, Liao Hong-Yuan Mark, Huang Shih-Kun, Sze Chwen-Jye Cocktail watermarking on images. Third Int. Workshop on Information Hiding, volume 1768 of Lecture Notes in Computer Science 1999, 333-347. A. Pfitzmann (Ed.).
-
(1999)
Third Int. Workshop on Information Hiding, volume 1768 of Lecture Notes in Computer Science
, pp. 333-347
-
-
Lu, C.-S.1
Liao, H.Y.M.2
Huang, S.-K.3
Sze, C.-J.4
-
273
-
-
35048859775
-
An improved sample pairs method for detection of LSB embedding
-
Springer-Verlag, Berlin, J. Fridrich (Ed.)
-
Lu P., Luo X., Tang Q., Shen L. An improved sample pairs method for detection of LSB embedding. Information Hiding, 6th International Workshop, volume 3200 of LNCS 2004, 116-127. Springer-Verlag, Berlin. J. Fridrich (Ed.).
-
(2004)
Information Hiding, 6th International Workshop, volume 3200 of LNCS
, pp. 116-127
-
-
Lu, P.1
Luo, X.2
Tang, Q.3
Shen, L.4
-
274
-
-
0002434611
-
The use of psychophysical data and models in the analysis of display system performance
-
MIT Press, A.B. Watson (Ed.)
-
Lubin J. The use of psychophysical data and models in the analysis of display system performance. Digital Images and Human Vision 1993, 163-178. MIT Press. A.B. Watson (Ed.).
-
(1993)
Digital Images and Human Vision
, pp. 163-178
-
-
Lubin, J.1
-
277
-
-
33746066591
-
Syntax and semantics-preserving application-layer protocol steganography
-
J. Fridrich (Ed.)
-
Lucena N.B., Chapin S.J., Pease J., Yadollahpour P. Syntax and semantics-preserving application-layer protocol steganography. Information Hiding. 6th International Workshop, Toronto, Canada, May 23-25, 2004, volume 3200 of LNCS 2004, 164-179. J. Fridrich (Ed.).
-
(2004)
Information Hiding. 6th International Workshop, Toronto, Canada, May 23-25, 2004, volume 3200 of LNCS
, pp. 164-179
-
-
Lucena, N.B.1
Chapin, S.J.2
Pease, J.3
Yadollahpour, P.4
-
279
-
-
84936892450
-
Cryptology for digital TV broadcasting
-
Macq B.M., Quisquater J.-J. Cryptology for digital TV broadcasting. Proc. of the IEEE 1995, 83(6):944-957.
-
(1995)
Proc. of the IEEE
, vol.83
, Issue.6
, pp. 944-957
-
-
Macq, B.M.1
Quisquater, J.-J.2
-
280
-
-
0017218087
-
Pseudo-random sequences and arrays
-
MacWilliams E.J., Sloane Neil J.A. Pseudo-random sequences and arrays. Proc. of the IEEE 1976, 64(12):1715-1729.
-
(1976)
Proc. of the IEEE
, vol.64
, Issue.12
, pp. 1715-1729
-
-
MacWilliams, E.J.1
Sloane, N.J.A.2
-
282
-
-
0016079335
-
The effects of a visual fidelity criterion on the encoding of images
-
Mannos J.L., Sakrison J.J. The effects of a visual fidelity criterion on the encoding of images. IEEE Trans. Inform. Theory 1974, IT-4:525-536.
-
(1974)
IEEE Trans. Inform. Theory
, vol.IT-4
, pp. 525-536
-
-
Mannos, J.L.1
Sakrison, J.J.2
-
283
-
-
84882143372
-
Markey and George Antheil. Secret communication system
-
United States Patent
-
Kiesler Hedy Markey and George Antheil. Secret communication system. Technical Report 2,292,387 1942, United States Patent.
-
(1942)
Technical Report 2,292,387
-
-
Kiesler, H.1
-
286
-
-
0032319685
-
Embedding visible video watermarks in the compressed domain
-
Meng J., Chang S.-F. Embedding visible video watermarks in the compressed domain. IEEE Int. Conf. on Image Processing 1998, volume 1:474-477.
-
(1998)
IEEE Int. Conf. on Image Processing
, vol.1
, pp. 474-477
-
-
Meng, J.1
Chang, S.-F.2
-
287
-
-
0342647438
-
Low-complexity image denoising based on statistical modeling of wavelet coefficients
-
Mihcak M.K., Kozintsev I., Ramchandran K., Moulin P. Low-complexity image denoising based on statistical modeling of wavelet coefficients. IEEE Signal Processing Letters December 1999, 6(12):300-303.
-
(1999)
IEEE Signal Processing Letters
, vol.6
, Issue.12
, pp. 300-303
-
-
Mihcak, M.K.1
Kozintsev, I.2
Ramchandran, K.3
Moulin, P.4
-
291
-
-
2942568431
-
Applying informed coding and informed embedding to design a robust high capacity watermark
-
Miller M.L., Doerr G., Cox I.J. Applying informed coding and informed embedding to design a robust high capacity watermark. IEEE Trans. on Image Processing 2004, 13(6).
-
(2004)
IEEE Trans. on Image Processing
, vol.13
, Issue.6
-
-
Miller, M.L.1
Doerr, G.2
Cox, I.J.3
-
294
-
-
0013316594
-
Safeguarding digital library contents and users: Digital watermarking
-
Mintzer E., Lotspiech J., Morimoto N. Safeguarding digital library contents and users: Digital watermarking. D-Lib Magazine 1997, http://www.dlib.org/dlib/december97/ibm/12lotspiech.html#FM2.
-
(1997)
D-Lib Magazine
-
-
Mintzer, E.1
Lotspiech, J.2
Morimoto, N.3
-
296
-
-
84882094151
-
-
United States Patent, 3,919,479
-
Moon Warren D., Weiner Richard J., Hansen Robert A., Linde Robert N. Broadeast signal identification system 1975, United States Patent, 3,919,479.
-
(1975)
Broadeast signal identification system
-
-
Moon, W.D.1
Weiner, R.J.2
Hansen, R.A.3
Linde, R.N.4
-
299
-
-
28944435491
-
Data-hiding
-
Moulin P., Koctter R. Data-hiding. Proc. IEEE 2005, 93(12):2083-2127.
-
(2005)
Proc. IEEE
, vol.93
, Issue.12
, pp. 2083-2127
-
-
Moulin, P.1
Koctter, R.2
-
301
-
-
0003803072
-
Information-theoretic analysis of information hiding
-
available from
-
Moulin P., O'Sullivan J.A. Information-theoretic analysis of information hiding. Preprint 1999, available from. http://www.ifp.uiuc.edu/moulin/Papers.
-
(1999)
Preprint
-
-
Moulin, P.1
O'Sullivan, J.A.2
-
302
-
-
4544256760
-
"Optimal" spare-QIM codes zero-rate blind watermarking
-
Moulin P., Côtetr A.K. "Optimal" spare-QIM codes zero-rate blind watermarking. Proceedings of CASSP 2004, volume 3:73-76.
-
(2004)
Proceedings of CASSP
, vol.3
, pp. 73-76
-
-
Moulin, P.1
Côtetr, A.K.2
-
303
-
-
0037353686
-
Information-theoretic analysis of information hiding
-
Moulin P., O'Sullivan J.A. Information-theoretic analysis of information hiding. IEEE Trans. Inform. Theory March 2003, 49(3):563-593.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, Issue.3
, pp. 563-593
-
-
Moulin, P.1
O'Sullivan, J.A.2
-
305
-
-
0027681636
-
Distribution shape of two-dimensional DCT coefficients of natural images
-
Müller F. Distribution shape of two-dimensional DCT coefficients of natural images. Electronics Letters 1993, 29(22):1935-1936.
-
(1993)
Electronics Letters
, vol.29
, Issue.22
, pp. 1935-1936
-
-
Müller, F.1
-
306
-
-
0029220876
-
Visual learning and recognition of 3D objects from appearance
-
Murase H., Nayar S. Visual learning and recognition of 3D objects from appearance. Int. J. Computer Vision 1995, 14(1):5-25.
-
(1995)
Int. J. Computer Vision
, vol.14
, Issue.1
, pp. 5-25
-
-
Murase, H.1
Nayar, S.2
-
307
-
-
0141945483
-
A collusion-secure fingerprinting code reduced by Chinese remaindering and its random-error resilience
-
Muratani H. A collusion-secure fingerprinting code reduced by Chinese remaindering and its random-error resilience. Proceedings of Int. Workshop on Information Hiding '01 2001.
-
(2001)
Proceedings of Int. Workshop on Information Hiding '01
-
-
Muratani, H.1
-
310
-
-
33645157142
-
Reversible data hiding
-
Ni Z., Shi Y.Q., Ansari N., Su W. Reversible data hiding. IEEE Transactions on Circuits Systems and Video Technology March 2006, 16(3):354-362.
-
(2006)
IEEE Transactions on Circuits Systems and Video Technology
, vol.16
, Issue.3
, pp. 354-362
-
-
Ni, Z.1
Shi, Y.Q.2
Ansari, N.3
Su, W.4
-
312
-
-
0032069705
-
Watermarking three-dimensional polygonal models through geometric and topological modifications
-
Ohbochi R., Masuda H., Aono M. Watermarking three-dimensional polygonal models through geometric and topological modifications. IEEE Journal of Selected Areas in Communication 1998, 16(4):551-560.
-
(1998)
IEEE Journal of Selected Areas in Communication
, vol.16
, Issue.4
, pp. 551-560
-
-
Ohbochi, R.1
Masuda, H.2
Aono, M.3
-
314
-
-
8844224074
-
Adaptive quantization watermarking
-
San Jose, CA
-
Oostveen J.C., Kalker A.A.C., Staring M. Adaptive quantization watermarking. Proc. of SPIE: Security, Steganography, and Watermarking of Multimedia Contents VI January 2004, 37-39. San Jose, CA.
-
(2004)
Proc. of SPIE: Security, Steganography, and Watermarking of Multimedia Contents VI
, pp. 37-39
-
-
Oostveen, J.C.1
Kalker, A.A.C.2
Staring, M.3
-
317
-
-
0032074148
-
Rotation, scale and translation invariant spread spectrum digital image watermarking
-
óRuanaidh J.J.K., Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Processing 1998, 66(3):303-317.
-
(1998)
Signal Processing
, vol.66
, Issue.3
, pp. 303-317
-
-
óRuanaidh, J.J.K.1
Pun, T.2
-
318
-
-
0034172308
-
Perceptual coding of digital audio
-
Ted Painter and Andreas Spanias
-
Ted Painter and Andreas Spanias Perceptual coding of digital audio. Proc. IEEE 2000, 88(4):451-513.
-
(2000)
Proc. IEEE
, vol.88
, Issue.4
, pp. 451-513
-
-
-
319
-
-
0031632191
-
Simultaneous broadcasting of analog FM and digital audio signals by means of precanceling techniques
-
Papadopoulos H.C., Sundberg C.-E.W. Simultaneous broadcasting of analog FM and digital audio signals by means of precanceling techniques. IEEE Int. Conf. on Communications, ICC'98 1998, 728-732.
-
(1998)
IEEE Int. Conf. on Communications, ICC'98
, pp. 728-732
-
-
Papadopoulos, H.C.1
Sundberg, C.-E.W.2
-
321
-
-
4644220761
-
Why the dvd hack was a cinch
-
Patrizio A. Why the dvd hack was a cinch. Wired November 1999.
-
(1999)
Wired
-
-
Patrizio, A.1
-
324
-
-
0033726714
-
Robust template matching for affine resistant image watermarks
-
Pereira S., Pun T. Robust template matching for affine resistant image watermarks. IEEE Transactions on Image Processing 2000, 9(6):1123-1129.
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, Issue.6
, pp. 1123-1129
-
-
Pereira, S.1
Pun, T.2
-
325
-
-
0032678983
-
Template based recovery of Fourier-based watermarks using log-polar and log-log maps
-
Percira S., óRuanaidh J.J.K., Deguillaume E., Csurka G., Pun T. Template based recovery of Fourier-based watermarks using log-polar and log-log maps. IEEE International Conference on Multimedia Computing and Systems 1999, Volume 1:870-874.
-
(1999)
IEEE International Conference on Multimedia Computing and Systems
, vol.1
, pp. 870-874
-
-
Percira, S.1
óRuanaidh, J.J.K.2
Deguillaume, E.3
Csurka, G.4
Pun, T.5
-
330
-
-
33645660635
-
Multiclass blind steganalyasis for JPEG images
-
E. Delp, P.W. Wong (Eds.)
-
Pevnỳ T., Fridrich J. Multiclass blind steganalyasis for JPEG images. Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006, 1-13. E. Delp, P.W. Wong (Eds.).
-
(2006)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII,
, pp. 1-13
-
-
Pevnỳ, T.1
Fridrich, J.2
-
331
-
-
34548232251
-
Merging Markov and DCT features for multi-class JPEG steganalysis
-
E.J. Delp, P.W. Wong (Eds.)
-
Pevnỳ T., Fridrich J. Merging Markov and DCT features for multi-class JPEG steganalysis. Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX January 2007, 03. E.J. Delp, P.W. Wong (Eds.).
-
(2007)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX
, pp. 03
-
-
Pevnỳ, T.1
Fridrich, J.2
-
333
-
-
0025229049
-
Trellis-c0ded multidimensional phase modulation
-
Pietrobon S., Deng R., Lafanechere A., Ungerboeck G., Costello D. Trellis-c0ded multidimensional phase modulation. IEEE Transactions on Information Theory 1990, 36:6389.
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, pp. 6389
-
-
Pietrobon, S.1
Deng, R.2
Lafanechere, A.3
Ungerboeck, G.4
Costello, D.5
-
334
-
-
84882200131
-
-
Playboy Enterprises International, Inc.
-
Playboy magazine November 1972, Playboy Enterprises International, Inc.,.
-
(1972)
Playboy magazine
-
-
-
337
-
-
33744649659
-
-
United States Patent 5,319,735
-
Preuss R.D., Roukos S.E., Huggins A.W.E., Gish H., Bergamo M.A., Peterson P.M., Derr A.G. Embedded signalling 1994, United States Patent 5,319,735.
-
(1994)
Embedded signalling
-
-
Preuss, R.D.1
Roukos, S.E.2
Huggins, A.W.E.3
Gish, H.4
Bergamo, M.A.5
Peterson, P.M.6
Derr, A.G.7
-
343
-
-
0004127894
-
Data Hiding in Multimedia: Theory and Applications
-
New Jersey Institute of Technology
-
Ramkumar M. Data Hiding in Multimedia: Theory and Applications. Ph.D. thesis 1999, New Jersey Institute of Technology.
-
(1999)
Ph.D. thesis
-
-
Ramkumar, M.1
-
344
-
-
84882069508
-
Knocking off the knockoff
-
N 17
-
Reidy Chris Knocking off the knockoff. The Boston Globe November 17, 2000, D1.
-
(2000)
The Boston Globe
-
-
Reidy, C.1
-
345
-
-
0020766544
-
Distribution of the two-dimensional DCT coefficients for images
-
Reininger R.C., Gibson J.D. Distribution of the two-dimensional DCT coefficients for images. IEEE Trans. on Comm. 1983, 31(6):835-839.
-
(1983)
IEEE Trans. on Comm.
, vol.31
, Issue.6
, pp. 835-839
-
-
Reininger, R.C.1
Gibson, J.D.2
-
350
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptsystems
-
Rivest R.L., Shamir A., Adleman L.M. A method for obtaining digital signatures and public-key cryptsystems. Communications of the ACM 1978, 21(2):120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
354
-
-
0001187198
-
Statistics of natural images: Scaling in the woods
-
Ruderman D.L., Bialek W. Statistics of natural images: Scaling in the woods. Physics Review Letters 1994, 73:814-817.
-
(1994)
Physics Review Letters
, vol.73
, pp. 814-817
-
-
Ruderman, D.L.1
Bialek, W.2
-
356
-
-
84882057483
-
-
Screen Actors Guild 1999, http://www.sag.org/pressreleases/prla990826spotchecks.html.
-
(1999)
Screen Actors Guild
-
-
-
357
-
-
35048819204
-
Model-based steganography
-
Springer-Verlag, New York, T. Kalker, I.J. Cox, Y.M. Ro (Eds.)
-
Sallee P. Model-based steganography. Digital Watermarking, 2nd International Workshop, IWDW 2003, Seoul, Korea, October 20-20, 2003. volume 2939 of LNCS 2004, 154-167. Springer-Verlag, New York. T. Kalker, I.J. Cox, Y.M. Ro (Eds.).
-
(2004)
Digital Watermarking, 2nd International Workshop, IWDW 2003, Seoul, Korea, October 20-20, 2003. volume 2939 of LNCS
, pp. 154-167
-
-
Sallee, P.1
-
358
-
-
0019021287
-
Cross-correlation properties of pseudo-random and related sequences
-
Sarwate D.V., Pursley M.-B. Cross-correlation properties of pseudo-random and related sequences. Proc. of the IEEE 1980, 688(5):593-619.
-
(1980)
Proc. of the IEEE
, vol.688
, Issue.5
, pp. 593-619
-
-
Sarwate, D.V.1
Pursley, M.-B.2
-
360
-
-
0033346132
-
Optimum watermark detection for color images
-
Sayrol E., Vidal J., Cabanillas S., Santamaria S. Optimum watermark detection for color images. IEEE Int. Conf. on Image Processing 1999, volume 2:231-235.
-
(1999)
IEEE Int. Conf. on Image Processing
, vol.2
, pp. 231-235
-
-
Sayrol, E.1
Vidal, J.2
Cabanillas, S.3
Santamaria, S.4
-
361
-
-
0030409375
-
A robust content based digital signature for image authentication
-
Schneider M., Chang S.-F. A robust content based digital signature for image authentication. IEEE Int. Conf. on Image Processing 1996, volume 3:227-230.
-
(1996)
IEEE Int. Conf. on Image Processing
, vol.3
, pp. 227-230
-
-
Schneider, M.1
Chang, S.-F.2
-
363
-
-
78650273796
-
Dither signals and their effect on quantization noise
-
Schuchman Leonard Dither signals and their effect on quantization noise. IEEE Trans. Comm. Tech. 1964, 12:162-165.
-
(1964)
IEEE Trans. Comm. Tech.
, vol.12
, pp. 162-165
-
-
Schuchman, L.1
-
365
-
-
84890522850
-
Communications theory of secrecy systems
-
Shannon C.E. Communications theory of secrecy systems. Bell Systems Technical Journal October 1949, 28(4):656-715.
-
(1949)
Bell Systems Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
367
-
-
84947277755
-
An implementation of key-based digital signal steganography
-
Springer-Verlag, New York, I.S. Moskowitz (Ed.)
-
Sharp T. An implementation of key-based digital signal steganography. Information Hiding, 4th International Workshop, IHW 2001. Pittsburgh, PA, April 25-27, 2001, volume 2137 of LNCS 2001, 13-26. Springer-Verlag, New York. I.S. Moskowitz (Ed.).
-
(2001)
Information Hiding, 4th International Workshop, IHW 2001. Pittsburgh, PA, April 25-27, 2001, volume 2137 of LNCS
, pp. 13-26
-
-
Sharp, T.1
-
368
-
-
0022725396
-
Experiments on pattern recognition using invariant Fourier-Mellin descriptors
-
Sheng Y., Arsenault H.H. Experiments on pattern recognition using invariant Fourier-Mellin descriptors. J. Opt. Soc. Am. A 1986, 3:771-776.
-
(1986)
J. Opt. Soc. Am. A
, vol.3
, pp. 771-776
-
-
Sheng, Y.1
Arsenault, H.H.2
-
369
-
-
0022728266
-
Circular-Fourier-Radial-Mellin transform descriptors for pattern recognition
-
Sheng Y., Duvernoy J. Circular-Fourier-Radial-Mellin transform descriptors for pattern recognition. J. Opt. Soc. Am. A 1986, 3:885-888.
-
(1986)
J. Opt. Soc. Am. A
, vol.3
, pp. 885-888
-
-
Sheng, Y.1
Duvernoy, J.2
-
370
-
-
34548236879
-
A Markov process based approach to effective attacking JPEG steganography
-
Springer-Verlag, New York, N. Johnson, J. Camenisch (Eds.)
-
Shi Y.Q., Chen C., Chen W. A Markov process based approach to effective attacking JPEG steganography. Information Hiding, 8th International Workshop, volume 4437 of Lecture Notes in Computer Science 2006, Springer-Verlag, New York. N. Johnson, J. Camenisch (Eds.).
-
(2006)
Information Hiding, 8th International Workshop, volume 4437 of Lecture Notes in Computer Science
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
-
371
-
-
33750408721
-
Amplitude scale estimation for quantization-based water marking
-
Shterev I.D., Legendijk R.L. Amplitude scale estimation for quantization-based water marking. IEEE Trans. on Signal Processing 2006, 54(11):4146-4155.
-
(2006)
IEEE Trans. on Signal Processing
, vol.54
, Issue.11
, pp. 4146-4155
-
-
Shterev, I.D.1
Legendijk, R.L.2
-
375
-
-
0001217738
-
The prisoner's problem and the subliminal channel
-
Plenum Press, D. Chaum (Ed.)
-
Simmons Gustavus J. The prisoner's problem and the subliminal channel. Advances in Cryptology-CRYPTO 83 1983, 51-67. Plenum Press. D. Chaum (Ed.).
-
(1983)
Advances in Cryptology-CRYPTO 83
, pp. 51-67
-
-
Simmons, G.J.1
-
378
-
-
0003815918
-
-
Oxford University Press, J. Simpson, E. Weiner (Eds.)
-
Oxford English Dictionary 2000, Oxford University Press. J. Simpson, E. Weiner (Eds.).
-
(2000)
Oxford English Dictionary
-
-
-
379
-
-
0004076237
-
Studies in Computational Geometry Motivated by Mesh Generation
-
Princeton University
-
Smith W.D. Studies in Computational Geometry Motivated by Mesh Generation. Ph.D. thesis 1988, Princeton University.
-
(1988)
Ph.D. thesis
-
-
Smith, W.D.1
-
382
-
-
21844461602
-
Maximum likelihood estimation of secret message length embedded using PMK steganography in spatial domain
-
Soukal D., Fridrich J., Goljan M. Maximum likelihood estimation of secret message length embedded using PMK steganography in spatial domain. Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII. San Jose, CA, January 16-20, 2005 2005, volume 5681:595-606.
-
(2005)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII. San Jose, CA, January 16-20, 2005
, vol.5681
, pp. 595-606
-
-
Soukal, D.1
Fridrich, J.2
Goljan, M.3
-
384
-
-
8844231006
-
A high-capacity invertible data-hiding algorithm using a generalized reversible integer transform
-
E. Delp (Ed.)
-
Stach J., Alattar A.M. A high-capacity invertible data-hiding algorithm using a generalized reversible integer transform. Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI January 2003, volume 5306:386-396. E. Delp (Ed.).
-
(2003)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI
, vol.5306
, pp. 386-396
-
-
Stach, J.1
Alattar, A.M.2
-
385
-
-
84947921326
-
Robust object watermarking Application to code
-
Stern J.P., Hachez G., Koeune E., Quisquater J.J. Robust object watermarking Application to code. Proceedings of Info Hiding '99, volume 1768, Lecture Notes in Computer Science 1999, 368-378.
-
(1999)
Proceedings of Info Hiding '99, volume 1768, Lecture Notes in Computer Science
, pp. 368-378
-
-
Stern, J.P.1
Hachez, G.2
Koeune, E.3
Quisquater, J.J.4
-
388
-
-
0000157604
-
Image processing in the context of a visual model
-
Stockham T.G. Image processing in the context of a visual model. Proc. IEEE 1972, 60(7):828-841.
-
(1972)
Proc. IEEE
, vol.60
, Issue.7
, pp. 828-841
-
-
Stockham, T.G.1
-
389
-
-
0003538515
-
Analysis of attacks on image watermarks with randomized coefficients
-
NEC Research Institute
-
Stone H.S. Analysis of attacks on image watermarks with randomized coefficients. Technical Report TR 96-045 1996, NEC Research Institute.
-
(1996)
Technical Report TR 96-045
-
-
Stone, H.S.1
-
390
-
-
0032714730
-
Progressive wavelet correlation using Fourier methods
-
Stone H.S. Progressive wavelet correlation using Fourier methods. IEEE Transactions on Signal Processing Jan. 1999, 47(1):97-107.
-
(1999)
IEEE Transactions on Signal Processing
, vol.47
, Issue.1
, pp. 97-107
-
-
Stone, H.S.1
-
393
-
-
0033309035
-
Power-spectrum condition for energy-efficient watermarking
-
Su J.K., Girod B. Power-spectrum condition for energy-efficient watermarking. IEEE Int. Conf. on Image Processing 1999, volume 1:301-305.
-
(1999)
IEEE Int. Conf. on Image Processing
, vol.1
, pp. 301-305
-
-
Su, J.K.1
Girod, B.2
-
394
-
-
33744728031
-
Steganalysis for Markov cover data with applications to images
-
Sullivan K., Madhow U., Manjunath B.S., Chandrasekaran S. Steganalysis for Markov cover data with applications to images. IEEE Transactions on Information Security and Forensics 2006, 1(2):275-287.
-
(2006)
IEEE Transactions on Information Security and Forensics
, vol.1
, Issue.2
, pp. 275-287
-
-
Sullivan, K.1
Madhow, U.2
Manjunath, B.S.3
Chandrasekaran, S.4
-
397
-
-
0032069486
-
Robust audio watermarking using perceptual masking
-
Swanson M.D., Zhu B., Tewfik A.H., Boney L. Robust audio watermarking using perceptual masking. Signal Processing 1998, 66(3):337-355.
-
(1998)
Signal Processing
, vol.66
, Issue.3
, pp. 337-355
-
-
Swanson, M.D.1
Zhu, B.2
Tewfik, A.H.3
Boney, L.4
-
398
-
-
0018468867
-
A signal theoretic method for creating forgery-proof documents for automatic verification
-
J.S. Jackson (Ed.)
-
Szepanski W. A signal theoretic method for creating forgery-proof documents for automatic verification. 1979 Carnaban Conf. on Crime Countermeasures 1979, 101-109. J.S. Jackson (Ed.).
-
(1979)
1979 Carnaban Conf. on Crime Countermeasures
, pp. 101-109
-
-
Szepanski, W.1
-
400
-
-
0025547039
-
-
Tanaka K., Nakamura Y., Matsui K. Military Communications Conference, 1990. MILCOM '90, Conference Record, A New Era. 1990 IEEE 1990, volume 1:216-220.
-
(1990)
Military Communications Conference, 1990. MILCOM '90, Conference Record, A New Era. 1990 IEEE
, vol.1
, pp. 216-220
-
-
Tanaka, K.1
Nakamura, Y.2
Matsui, K.3
-
403
-
-
0000437308
-
Visual discrimination and orientation
-
Taylor M.M. Visual discrimination and orientation. J. Opt. Soc. Am. A. 1963, 53:763-765.
-
(1963)
J. Opt. Soc. Am. A.
, vol.53
, pp. 763-765
-
-
Taylor, M.M.1
-
404
-
-
0034442962
-
Multi-bit image watermarking robust to geometric distortions
-
Tefas A., Pitas I. Multi-bit image watermarking robust to geometric distortions. IEEE Int. Conf. on Image Processing 2000, volume 3:710-713.
-
(2000)
IEEE Int. Conf. on Image Processing
, vol.3
, pp. 710-713
-
-
Tefas, A.1
Pitas, I.2
-
405
-
-
84882233083
-
-
Telecommunications Act of 1996, Implementation of Section 305.
-
Telecommunications Act of 1996, Implementation of Section 305.
-
-
-
-
406
-
-
84882173947
-
-
Telecommunications Act of 1996, United States Public Law 104-104.
-
Telecommunications Act of 1996, United States Public Law 104-104.
-
-
-
-
407
-
-
0018367986
-
Calculating virtual pitch
-
Terhardt E. Calculating virtual pitch. Hearing Research 1979, 1:155-182.
-
(1979)
Hearing Research
, vol.1
, pp. 155-182
-
-
Terhardt, E.1
-
408
-
-
0141862029
-
Wavelet-based reversible date-embedding using a difference expansion
-
Tian J. Wavelet-based reversible date-embedding using a difference expansion. IEEE Transactions on Circuit Systems and Video Technology August 2003, 13(8):890-896.
-
(2003)
IEEE Transactions on Circuit Systems and Video Technology
, vol.13
, Issue.8
, pp. 890-896
-
-
Tian, J.1
-
410
-
-
0038527384
-
Anti-collusion fingerprinting for multimedia
-
Trappe W., Wu M., Wang Z.J., Liu K.J.R. Anti-collusion fingerprinting for multimedia. IEEE Transactions Signal Processing 2003, 51(4):1069-1087.
-
(2003)
IEEE Transactions Signal Processing
, vol.51
, Issue.4
, pp. 1069-1087
-
-
Trappe, W.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
-
412
-
-
0016532801
-
Defect and error correction
-
Translated from Russian
-
Tsybakov B.S. Defect and error correction. Probl. Pered. Inform. July-September 1975, 11:21-30. Translated from Russian.
-
(1975)
Probl. Pered. Inform.
, vol.11
, pp. 21-30
-
-
Tsybakov, B.S.1
-
413
-
-
0242413905
-
Steganographic system based on higher-order statistics
-
E. Delp (Ed.)
-
Tzschoppe R., Buml R., Huber J.B., Kaup A. Steganographic system based on higher-order statistics. Proceedings SPIE, Electronic Imaging. Security, Steganography and Watermarking of Multimedia Contents V, 2003 2003, 156-166. E. Delp (Ed.).
-
(2003)
Proceedings SPIE, Electronic Imaging. Security, Steganography and Watermarking of Multimedia Contents V, 2003
, pp. 156-166
-
-
Tzschoppe, R.1
Buml, R.2
Huber, J.B.3
Kaup, A.4
-
416
-
-
84882107982
-
-
United States Code. Title 17.
-
United States Code. Title 17.
-
-
-
-
417
-
-
0001859723
-
Perceptual quality metric for digitally coded color images
-
van den Branden Lambrecht Christian J., Farrell Joyce E. Perceptual quality metric for digitally coded color images. Proc. EUSIPCO 1996, 1175-1178.
-
(1996)
Proc. EUSIPCO
, pp. 1175-1178
-
-
Van Den Branden Lambrecht, C.J.1
Farrell, J.E.2
-
420
-
-
8844270930
-
Reversible watermarking for images
-
E. Delp (Ed.)
-
van Leest A., van der Veen M., Bruekers F. Reversible watermarking for images. Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI January 2003, 374-385. E. Delp (Ed.).
-
(2003)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI
, pp. 374-385
-
-
van Leest, A.1
van der Veen, M.2
Bruekers, F.3
-
423
-
-
0033601692
-
Algebraic construction of a new class of quasi-orthogonal arrays in steganography
-
van Schyndel R.G., Tirkel A.Z., Svalbe I.D., Hall T.E., Osborne C.F. Algebraic construction of a new class of quasi-orthogonal arrays in steganography. Proc. of SPIE on Security and Watermarking of Multimedia Contents 1999, volume 3657:354-364.
-
(1999)
Proc. of SPIE on Security and Watermarking of Multimedia Contents
, vol.3657
, pp. 354-364
-
-
van Schyndel, R.G.1
Tirkel, A.Z.2
Svalbe, I.D.3
Hall, T.E.4
Osborne, C.F.5
-
425
-
-
0031221119
-
Alignment by maximization of mutual information
-
Viola Paul, Wells William M. Alignment by maximization of mutual information. Int. J. Computer Vision 1997, 24(2):137-154.
-
(1997)
Int. J. Computer Vision
, vol.24
, Issue.2
, pp. 137-154
-
-
Viola, P.1
Wells, W.M.2
-
428
-
-
0038273964
-
Circular interpretation of bijective transformations in lossless watermarking for media asset management
-
Vleeschouwer C.D., Delaigle J.F., Macq B. Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Transactions on Multimedia March 2003, 5(1):97-105.
-
(2003)
IEEE Transactions on Multimedia
, vol.5
, Issue.1
, pp. 97-105
-
-
Vleeschouwer, C.D.1
Delaigle, J.F.2
Macq, B.3
-
430
-
-
33750401431
-
Public-key steganography
-
Springer-Verlag, Heidelberg
-
von Ahn L., Hopper N. Public-key steganography. Advances in Cryptology: Proceedings of FUROCRYPT. Interlaken, Switzerland, May 2-6, volume 3027 of LNCS 2004, 323-341. Springer-Verlag, Heidelberg.
-
(2004)
Advances in Cryptology: Proceedings of FUROCRYPT. Interlaken, Switzerland, May 2-6, volume 3027 of LNCS
, pp. 323-341
-
-
von Ahn, L.1
Hopper, N.2
-
431
-
-
84898965689
-
Scale mixtures of Gaussians and the statistics of natural images
-
MIT Press, S.A. Solla, T.K. Leen, K.R. Müller (Eds.)
-
Wainwright Martin J., Simoncelli Eero P. Scale mixtures of Gaussians and the statistics of natural images. Advances in Neural Information Processing Systems 12 2000, 855-861. MIT Press. S.A. Solla, T.K. Leen, K.R. Müller (Eds.).
-
(2000)
Advances in Neural Information Processing Systems 12
, pp. 855-861
-
-
Wainwright, M.J.1
Simoncelli, E.P.2
-
432
-
-
84882115994
-
-
Personal communication June
-
C. Walker. Personal communication June 2000.
-
(2000)
-
-
Walker, C.1
-
436
-
-
8844234943
-
Steganalysis of block-structured stegotext
-
Wang Y., Moulin P. Steganalysis of block-structured stegotext. Proceedings SPIE, Electronic Imaging, Security Steganography, and Watermarking of Multimedia Content VI, San Jose, CA, January 19-22, 2004 2004, volume 5806:477-488.
-
(2004)
Proceedings SPIE, Electronic Imaging, Security Steganography, and Watermarking of Multimedia Content VI, San Jose, CA, January 19-22, 2004
, vol.5806
, pp. 477-488
-
-
Wang, Y.1
Moulin, P.2
-
437
-
-
0029721990
-
Visual thresholds for wavelet quantization error
-
Watson A.B., Yang G.Y., Solomon J.A., Villasenor J. Visual thresholds for wavelet quantization error. Human Vision and Electronic Imaging 1996, SPIE-2657:381-392.
-
(1996)
Human Vision and Electronic Imaging
, vol.SPIE-2657
, pp. 381-392
-
-
Watson, A.B.1
Yang, G.Y.2
Solomon, J.A.3
Villasenor, J.4
-
440
-
-
84950895792
-
Mimic functions
-
Wayner P. Mimic functions. CRYPTOLOGIA July 1992, 16(3):193-214.
-
(1992)
CRYPTOLOGIA
, vol.16
, Issue.3
, pp. 193-214
-
-
Wayner, P.1
-
441
-
-
84882214071
-
-
Morgan Kaufmann, San Francisco
-
Wayner P. Disappearing Cryptology 2002, Morgan Kaufmann, San Francisco. second edition.
-
(2002)
Disappearing Cryptology
-
-
Wayner, P.1
-
442
-
-
0005105932
-
High capacity despite better steganalysis (F5-a steganographic algorithm)
-
Springer-Verlag, New York, I.S. Moskowitz (Ed.)
-
Westfeld A. High capacity despite better steganalysis (F5-a steganographic algorithm). Information Hiding, 4th International Workshop, volume 2137 of LNCS 2001, 289-302. Springer-Verlag, New York. I.S. Moskowitz (Ed.).
-
(2001)
Information Hiding, 4th International Workshop, volume 2137 of LNCS
, pp. 289-302
-
-
Westfeld, A.1
-
443
-
-
35248881927
-
Detecting low embedding rates
-
Springer-Verlag, Berlin, F.A.P. Petitcolas (Ed.)
-
Westfeld A. Detecting low embedding rates. Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, volume 2578 of LNCS 2002, 324-339. Springer-Verlag, Berlin. F.A.P. Petitcolas (Ed.).
-
(2002)
Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, volume 2578 of LNCS
, pp. 324-339
-
-
Westfeld, A.1
-
444
-
-
84892764719
-
Attacks on steganographic systems
-
Springer-Verlag, New York, A. Pfitzmann (Ed.)
-
Westfeld A., Pfitzmann A. Attacks on steganographic systems. Information Hiding, 3rd International Workshop, IH'99, Dresden, Germany, September 29-October 1, 1999, volume 1768 of LNCS 2000, 61-75. Springer-Verlag, New York. A. Pfitzmann (Ed.).
-
(2000)
Information Hiding, 3rd International Workshop, IH'99, Dresden, Germany, September 29-October 1, 1999, volume 1768 of LNCS
, pp. 61-75
-
-
Westfeld, A.1
Pfitzmann, A.2
-
445
-
-
0001329086
-
Statistical analysis of amplitude-quantized sample-data systems
-
(Jan. 1961 section)
-
Widrow B. Statistical analysis of amplitude-quantized sample-data systems. Trans. AIEE (Applications and Industry) 1960, 79:555-568. (Jan. 1961 section).
-
(1960)
Trans. AIEE (Applications and Industry)
, vol.79
, pp. 555-568
-
-
Widrow, B.1
-
448
-
-
0032664574
-
Perceptual watermarks for digital images and video
-
Wolfgang Raymond B., Podilchuk C.I., Delp E.J. Perceptual watermarks for digital images and video. Proc. of the IEEE 1999, 87(7):1108-1126.
-
(1999)
Proc. of the IEEE
, vol.87
, Issue.7
, pp. 1108-1126
-
-
Wolfgang, R.B.1
Podilchuk, C.I.2
Delp, E.J.3
-
449
-
-
0032312612
-
A public key watermark for image verification and authentication
-
Wong Ping Wah A public key watermark for image verification and authentication. IEEE Int. Conf. on Image Processing 1998, volume 1.
-
(1998)
IEEE Int. Conf. on Image Processing
, vol.1
-
-
Wong, P.W.1
-
450
-
-
0002945204
-
-
Society of Photo-optical Instrumentation Engineers, P.W. Wong, E.J. Delp (Eds.)
-
Security and Watermarking of Multimedia Contents 1999, volume 3657. Society of Photo-optical Instrumentation Engineers. P.W. Wong, E.J. Delp (Eds.).
-
(1999)
Security and Watermarking of Multimedia Contents
, vol.3657
-
-
-
451
-
-
35248870705
-
-
Society of Photo-optical Instrumentation Engineers, P.W. Wong, E.J. Delp (Eds.)
-
Security and Watermarking of Multimedia Contents II 2000, volume 3971. Society of Photo-optical Instrumentation Engineers. P.W. Wong, E.J. Delp (Eds.).
-
(2000)
Security and Watermarking of Multimedia Contents II
, vol.3971
-
-
-
455
-
-
0021850262
-
Rotation-invarint pattern recognition suing optimum feature extraction
-
Wu R., Stark H. Rotation-invarint pattern recognition suing optimum feature extraction. Applied Optics 1985, 24:179-184.
-
(1985)
Applied Optics
, vol.24
, pp. 179-184
-
-
Wu, R.1
Stark, H.2
-
456
-
-
0016882596
-
The rate distortion function for source coding with side information at the decoder
-
Wyner A.D., Ziff J. The rate distortion function for source coding with side information at the decoder. IEEE Trans. Inform. Theory 1976, 22:1-10.
-
(1976)
IEEE Trans. Inform. Theory
, vol.22
, pp. 1-10
-
-
Wyner, A.D.1
Ziff, J.2
-
458
-
-
33645673689
-
Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions
-
Xuan G., Shi Y.Q., Gao J., Zou D., Yang C., Zhang Z., Chai P., Chen C., Chen W. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. Proceedings 7th Information Hiding Workshop 2005.
-
(2005)
Proceedings 7th Information Hiding Workshop
-
-
Xuan, G.1
Shi, Y.Q.2
Gao, J.3
Zou, D.4
Yang, C.5
Zhang, Z.6
Chai, P.7
Chen, C.8
Chen, W.9
-
459
-
-
33845461965
-
Lossless data hiding using histogram shifting method based on integer wavelets
-
Xuan G., Yao Q., Yang C., Gao J., Chai P., Shi Y.Q., Ni Z. Lossless data hiding using histogram shifting method based on integer wavelets. Proc. Int. Workshop on Digital Watermarking November 2006, volume 4283:323-332.
-
(2006)
Proc. Int. Workshop on Digital Watermarking
, vol.4283
, pp. 323-332
-
-
Xuan, G.1
Yao, Q.2
Yang, C.3
Gao, J.4
Chai, P.5
Shi, Y.Q.6
Ni, Z.7
-
463
-
-
0031378592
-
An invisible watermarking technique for image verification
-
Yeung M., Mintzer F. An invisible watermarking technique for image verification. Proc. Int. Conf. Image Processing 1997, volume 1:680-683.
-
(1997)
Proc. Int. Conf. Image Processing
, vol.1
, pp. 680-683
-
-
Yeung, M.1
Mintzer, F.2
-
464
-
-
0034444435
-
Mean quantization blind watermarking for image authentication
-
Yu Gwo-Jong, Lu Chun-Shien, Liao H.Y.M., Sheu Jang-Ping Mean quantization blind watermarking for image authentication. IEEE Int. Conf. on Image Processing 2000, volume 3:706-709.
-
(2000)
IEEE Int. Conf. on Image Processing
, vol.3
, pp. 706-709
-
-
Yu, G.-J.1
Lu, C.-S.2
Liao, H.Y.M.3
Sheu, J.-P.4
-
465
-
-
10044282531
-
On estimation of secret message length in J-steg-like steganography
-
Yu X., Wang Y., Tan T. On estimation of secret message length in J-steg-like steganography. Proceedings, International Conference on Pattern Recognition, Cambridge, UK, August 23-26, 2004 2004, volume 4:673-676.
-
(2004)
Proceedings, International Conference on Pattern Recognition, Cambridge, UK, August 23-26, 2004
, vol.4
, pp. 673-676
-
-
Yu, X.1
Wang, Y.2
Tan, T.3
-
466
-
-
0036611624
-
Nested linear/lattice codes for structured multiterminal binning
-
Zamir R., Shamai S., Erez U. Nested linear/lattice codes for structured multiterminal binning. IEEE Transactions on Information Theory 2002, 48(6):1250-1276.
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.6
, pp. 1250-1276
-
-
Zamir, R.1
Shamai, S.2
Erez, U.3
-
468
-
-
0038675417
-
A fast and effective steganalytic technique against jsteg-like algorithms
-
Zhang T., Ping X. A fast and effective steganalytic technique against jsteg-like algorithms. Proceedings, Symposium on Applied Computing 2003, 307-311.
-
(2003)
Proceedings, Symposium on Applied Computing
, pp. 307-311
-
-
Zhang, T.1
Ping, X.2
-
469
-
-
0041821327
-
A new approach to reliable detection of LSB steganography in natural images
-
Zhang T., Ping X. A new approach to reliable detection of LSB steganography in natural images. Signal Processing 2003, 83(10):2085-2094.
-
(2003)
Signal Processing
, vol.83
, Issue.10
, pp. 2085-2094
-
-
Zhang, T.1
Ping, X.2
|