-
1
-
-
85008047913
-
Protecting Ownership Rights through Digital Watermarking
-
Berghel, H., and L. O’Gorman. “Protecting Ownership Rights through Digital Watermarking.” IEEE Computer Mag. 29 (1996): 101.
-
(1996)
IEEE Computer Mag.
, vol.29
, pp. 101
-
-
Berghel, H.1
O’Gorman, L.2
-
2
-
-
85052475021
-
Capacity of the Watermark Channel: How Many Bits Can Be Hidden within a Digital Image?
-
ed. P. W. Wong and E. J. Delp III. Proc. SPIE 2657, San Jose, CA: SPIE
-
Barni, M., F. Bartolini, A. De Rosa, and A. Piva. “Capacity of the Watermark Channel: How Many Bits Can Be Hidden within a Digital Image?" In Security and Watermarking of Multimedia Contents, ed. P. W. Wong and E. J. Delp III. Proc. SPIE 2657, San Jose, CA: SPIE, 1999.
-
(1999)
Security and Watermarking of Multimedia Contents
-
-
Barni, M.1
Bartolini, F.2
De Rosa, A.3
Piva, A.4
-
3
-
-
0036556071
-
Combinational Image Watermarking in the Spatial and Frequency Domains
-
Shih, F. Y., and S. Y. Wu. “Combinational Image Watermarking in the Spatial and Frequency Domains.” Pattern Recognition 36 (2003): 969.
-
(2003)
Pattern Recognition
, vol.36
, pp. 969
-
-
Shih, F.Y.1
Wu, S.Y.2
-
4
-
-
0030388964
-
Secure Spread Spectrum Watermarking for Images Audio and Video
-
Lausanne, Switzerland: IEEE
-
Cox, I., et al. “Secure Spread Spectrum Watermarking for Images Audio and Video.” In Proc. IEEE Int. Conf. Image Processing. Lausanne, Switzerland: IEEE, 1996.
-
(1996)
Proc. IEEE Int. Conf. Image Processing.
-
-
Cox, I.1
-
5
-
-
0031362116
-
Secure Spread Spectrum Watermarking for Multimedia
-
Cox, I., et al. “Secure Spread Spectrum Watermarking for Multimedia.” IEEE Trans. Image Processing 6 (1997): 1673.
-
(1997)
IEEE Trans. Image Processing
, vol.6
, pp. 1673
-
-
Cox, I.1
-
6
-
-
0034249378
-
A Robust DCT-Based Watermarking for Copyright Protection
-
Lin, S. D., and C.-F. Chen. “A Robust DCT-Based Watermarking for Copyright Protection.” IEEE Trans. Consumer Electronics 46 (2000): 415.
-
(2000)
IEEE Trans. Consumer Electronics
, vol.46
, pp. 415
-
-
Lin, S.D.1
Chen, C.-F.2
-
7
-
-
0032075445
-
Robust Image Watermarking in the Spatial Domain
-
Nikolaidis, N., and I. Pitas. “Robust Image Watermarking in the Spatial Domain.” Signal Processing 66 (1998): 385.
-
(1998)
Signal Processing
, vol.66
, pp. 385
-
-
Nikolaidis, N.1
Pitas, I.2
-
8
-
-
0035605834
-
Compact Storage of Medical Image with Patient Information
-
Acharya, U. R., et al. “Compact Storage of Medical Image with Patient Information.” IEEE Trans. Info. Tech. in Biomedicine 5 (2001): 320.
-
(2001)
IEEE Trans. Info. Tech. in Biomedicine
, vol.5
, pp. 320
-
-
Acharya, U.R.1
-
9
-
-
0002152920
-
Assuring Ownership Rights for Digital Images
-
Germany: Viewveg
-
Caronni, G. “Assuring Ownership Rights for Digital Images.” In Proc. Reliable IT Systems, Germany: Viewveg, 1995.
-
(1995)
Proc. Reliable IT Systems
-
-
Caronni, G.1
-
10
-
-
0036611838
-
Hierarchical Watermarking for Secure Image Authentication with Localization
-
Celik, M. et al. “Hierarchical Watermarking for Secure Image Authentication with Localization.” IEEE Trans. Image Processing 11 (2002): 585.
-
(2002)
IEEE Trans. Image Processing
, vol.11
, pp. 585
-
-
Celik, M.1
-
12
-
-
0008779206
-
A Watermarking Technique for Digital Imagery: Further Studies
-
Las Vegas, NV
-
Wolfgang, R., and E. Delp. “A Watermarking Technique for Digital Imagery: Further Studies.” In Proc. Int. Conf. Imaging Science, Systems and Technology, Las Vegas, NV, 1997.
-
(1997)
Proc. Int. Conf. Imaging Science, Systems and Technology
-
-
Wolfgang, R.1
Delp, E.2
-
13
-
-
0032312612
-
A Public Key Watermark for Image Verification and Authentication
-
Chicago
-
Wong, P. W. “A Public Key Watermark for Image Verification and Authentication.” In Proc. IEEE Int. Conf. Image Processing, Chicago, 1998.
-
(1998)
Proc. IEEE Int. Conf. Image Processing
-
-
Wong, P.W.1
-
14
-
-
0034266804
-
Watermarking Digital Image and Video Data: A State-of-the-Art Overview
-
Langelaar, G., et al. “Watermarking Digital Image and Video Data: A State-of-the-Art Overview.” IEEE Signal Processing 17 (2000): 20.
-
(2000)
IEEE Signal Processing
, vol.17
, pp. 20
-
-
Langelaar, G.1
-
15
-
-
0031362116
-
Secure Spread Spectrum Watermarking for Multimedia
-
Cox, I. J., et al. “Secure Spread Spectrum Watermarking for Multimedia.” IEEE Trans. Image Processing 6 (1997): 1673.
-
(1997)
IEEE Trans. Image Processing
, vol.6
, pp. 1673
-
-
Cox, I.J.1
-
17
-
-
0036488363
-
The First 50 Years of Electronic Watermarking
-
Cox, I., and M. Miller. “The First 50 Years of Electronic Watermarking.” J. Appl. Signal Processing 2 (2002): 126.
-
(2002)
J. Appl. Signal Processing
, vol.2
, pp. 126
-
-
Cox, I.1
Miller, M.2
-
18
-
-
0002029137
-
Spatial Method for Copyright Labeling of Digital Images
-
Neos Marmaras, Greece
-
Bruyndonckx, O., J.-J. Quisquater, and B. Macq. “Spatial Method for Copyright Labeling of Digital Images.” In Proc. IEEE Workshop Nonlinear Signal and Image Processing, Neos Marmaras, Greece, 1995.
-
(1995)
Proc. IEEE Workshop Nonlinear Signal and Image Processing
-
-
Bruyndonckx, O.1
Quisquater, J.-J.2
Macq, B.3
-
20
-
-
0034249378
-
A Robust DCT-Based Watermarking for Copyright Protection
-
Lin, S. D., and C.-F. Chen. “A Robust DCT-Based Watermarking for Copyright Protection.” IEEE Trans. Consumer Electronics 46 (2000): 415.
-
(2000)
IEEE Trans. Consumer Electronics
, vol.46
, pp. 415
-
-
Lin, S.D.1
Chen, C.-F.2
-
23
-
-
0001849187
-
Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools and Some Lessons Learned
-
Dresden, Germany
-
Westfeld, A., and A. Pfitzmann. “Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools and Some Lessons Learned.” In Proc. Int. Workshop Information Hiding, Dresden, Germany, 1999, 61.
-
(1999)
Proc. Int. Workshop Information Hiding
, pp. 61
-
-
Westfeld, A.1
Pfitzmann, A.2
-
24
-
-
0004064292
-
-
Technical Report TR2001-412, Computer Science. Hanover, NH: Dartmouth College
-
Farid, H. Detecting Steganographic Message in Digital Images. Technical Report TR2001-412, Computer Science. Hanover, NH: Dartmouth College, 2001.
-
(2001)
Detecting Steganographic Message in Digital Images.
-
-
Farid, H.1
-
25
-
-
0242497150
-
New Methodology for Breaking Steganographic Techniques for JPEGs
-
Santa Clara, CA: SPIE
-
Fridrich, J., M. Goljan, and D. Hogea. “New Methodology for Breaking Steganographic Techniques for JPEGs.” In Proc. SPIE, Santa Clara, CA: SPIE, 2003.
-
(2003)
Proc. SPIE
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
27
-
-
0032072250
-
A DCT-Domain System for Robust Image Watermarking
-
Barni, M., et al. “A DCT-Domain System for Robust Image Watermarking.” Signal Processing 66 (1998): 357.
-
(1998)
Signal Processing
, vol.66
, pp. 357
-
-
Barni, M.1
-
28
-
-
0032075445
-
Robust Image Watermarking in the Spatial Domain
-
Nikolaidis, N., and I. Pitas. “Robust Image Watermarking in the Spatial Domain.” Signal Processing 66 (1998): 385.
-
(1998)
Signal Processing
, vol.66
, pp. 385
-
-
Nikolaidis, N.1
Pitas, I.2
-
29
-
-
0031362116
-
Secure Spread Spectrum Watermarking for Multimedia
-
Cox, I. J., et al. “Secure Spread Spectrum Watermarking for Multimedia.” IEEE Trans. Image Processing, 6 (1997): 1673.
-
(1997)
IEEE Trans. Image Processing
, vol.6
, pp. 1673
-
-
Cox, I.J.1
-
31
-
-
0034249378
-
A Robust DCT-Based Watermarking for Copyright Protection
-
Lin, S. D., and C.-F. Chen. “A Robust DCT-Based Watermarking for Copyright Protection.” IEEE Trans. Consumer Electronics 46 (2000): 415.
-
(2000)
IEEE Trans. Consumer Electronics
, vol.46
, pp. 415
-
-
Lin, S.D.1
Chen, C.-F.2
-
32
-
-
0042823352
-
Secure Hybrid Robust Watermarking Resistant against Tampering and Copy Attack
-
Deguillaume, F., S. Voloshynovskiy, and T. Pun. “Secure Hybrid Robust Watermarking Resistant against Tampering and Copy Attack.” Signal Processing 83 (2003): 2133.
-
(2003)
Signal Processing
, vol.83
, pp. 2133
-
-
Deguillaume, F.1
Voloshynovskiy, S.2
Pun, T.3
-
33
-
-
0036448095
-
Semifragile Image Authentication Using Generic Wavelet Domain Features and ECC
-
Sun, Q., and S.-F. Chang. “Semifragile Image Authentication Using Generic Wavelet Domain Features and ECC.” In Proc. IEEE Int. Conf. on Image Processing. 2002.
-
(2002)
Proc. IEEE Int. Conf. on Image Processing.
-
-
Sun, Q.1
Chang, S.-F.2
-
34
-
-
0032312612
-
A Public Key Watermark for Image Verification and Authentication
-
Chicago
-
Wong, P. W. “A Public Key Watermark for Image Verification and Authentication.” In Proc. IEEE Int. Conf. Image Processing. Chicago, 1998.
-
(1998)
Proc. IEEE Int. Conf. Image Processing.
-
-
Wong, P.W.1
-
35
-
-
0036611838
-
Hierarchical Watermarking for Secure Image Authentication with Localization
-
Celik, M. U., et al. “Hierarchical Watermarking for Secure Image Authentication with Localization.” IEEE Trans. Image Processing 11 (2002): 585.
-
(2002)
IEEE Trans. Image Processing
, vol.11
, pp. 585
-
-
Celik, M.U.1
-
37
-
-
0003039773
-
Applying Signatures on Digital Images
-
Neos Marmaras, Greece
-
Pitas, I., and T. Kaskalis. “Applying Signatures on Digital Images.” In Proc. IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, Greece, 1995, 460.
-
(1995)
Proc. IEEE Workshop on Nonlinear Signal and Image Processing
, pp. 460
-
-
Pitas, I.1
Kaskalis, T.2
-
38
-
-
0002152920
-
Assuring Ownership Rights for Digital Images
-
Germany: Viewveg
-
Caronni, G. “Assuring Ownership Rights for Digital Images.” In Proc. Reliable IT Systems. Germany: Viewveg, 1995.
-
(1995)
Proc. Reliable IT Systems.
-
-
Caronni, G.1
-
39
-
-
85008047913
-
Protecting Ownership Rights through Digital Watermarking
-
Berghel, H., and L. O’Gorman. “Protecting Ownership Rights through Digital Watermarking.” IEEE Computer Mag. 29 (1996): 101.
-
(1996)
IEEE Computer Mag.
, vol.29
, pp. 101
-
-
Berghel, H.1
O’Gorman, L.2
-
40
-
-
0030388964
-
Secure Spread Spectrum Watermarking for Images Audio and Video
-
Lausanne, Switzerland: IEEE
-
Cox, I., et al. “Secure Spread Spectrum Watermarking for Images Audio and Video.” In Proc. IEEE Int. Conf. Image Processing. Lausanne, Switzerland: IEEE, 1996.
-
(1996)
Proc. IEEE Int. Conf. Image Processing.
-
-
Cox, I.1
-
42
-
-
0031996445
-
Exploring Steganography: Seeing the Unseen
-
Johnson, N., and S. Jajodia, S. “Exploring Steganography: Seeing the Unseen.” IEEE Computer 31 (1998): 26.
-
(1998)
IEEE Computer
, vol.31
, pp. 26
-
-
Johnson, N.1
Jajodia, S.S.2
-
45
-
-
0034249378
-
A Robust DCT-Based Watermarking for Copyright Protection
-
Lin, S. D., and C.-F. Chen. “A Robust DCT-Based Watermarking for Copyright Protection.” IEEE Trans. Consumer Electronics 46 (2000): 415.
-
(2000)
IEEE Trans. Consumer Electronics
, vol.46
, pp. 415
-
-
Lin, S.D.1
Chen, C.-F.2
-
46
-
-
0032072439
-
Forward and Inverse Transformations between Haar Wavelet and Arithmetic Functions
-
Falkowski, B. J. “Forward and Inverse Transformations between Haar Wavelet and Arithmetic Functions.” Electronics Letters 34 (1998): 1084.
-
(1998)
Electronics Letters
, vol.34
, pp. 1084
-
-
Falkowski, B.J.1
-
47
-
-
0026743540
-
Multiresolution Analysis, Haar Bases, and Self-Similar Tilings of Rn
-
Grochenig, K., and W. R. Madych. “Multiresolution Analysis, Haar Bases, and Self-Similar Tilings of Rn.” IEEE Trans. Information Theory 38 (1992): 556.
-
(1992)
IEEE Trans. Information Theory
, vol.38
, pp. 556
-
-
Grochenig, K.1
Madych, W.R.2
-
50
-
-
1842528982
-
A Chaos-Based Robust Wavelet-Domain Watermarking Algorithm
-
Zhao, D., G. Chen, and W. Liu. “A Chaos-Based Robust Wavelet-Domain Watermarking Algorithm.” Chaos, Solitons and Fractals 22 (2004): 47.
-
(2004)
Chaos, Solitons and Fractals
, vol.22
, pp. 47
-
-
Zhao, D.1
Chen, G.2
Liu, W.3
-
51
-
-
0035400742
-
Use of Chaotic Dynamical Systems in Cryptography
-
Schmitz, R. “Use of Chaotic Dynamical Systems in Cryptography.” J. Franklin Institute 338 (2001): 429.
-
(2001)
J. Franklin Institute
, vol.338
, pp. 429
-
-
Schmitz, R.1
-
54
-
-
0030173121
-
A New, Fast, and Efficient Image Code Based on Set Partitioning in Hierarchical Trees
-
Said, A., and W. A. Pearlman. “A New, Fast, and Efficient Image Code Based on Set Partitioning in Hierarchical Trees.” IEEE Trans. Circuits and Systems for Video Technology 6 (1996): 243.
-
(1996)
IEEE Trans. Circuits and Systems for Video Technology
, vol.6
, pp. 243
-
-
Said, A.1
Pearlman, W.A.2
-
55
-
-
0027798110
-
Embedded Image Coding Using Zerotrees of Wavelet Coefficients
-
Shapiro, J. “Embedded Image Coding Using Zerotrees of Wavelet Coefficients.” IEEE Trans. Signal Processing 41 (1993): 3445.
-
(1993)
IEEE Trans. Signal Processing
, vol.41
, pp. 3445
-
-
Shapiro, J.1
-
56
-
-
0035391983
-
Digital Watermarking: Algorithms and Applications
-
Podilchuk, C. I., and E. J. Delp. “Digital Watermarking: Algorithms and Applications.” IEEE Signal Processing Mag. 18 (2001): 33.
-
(2001)
IEEE Signal Processing Mag.
, vol.18
, pp. 33
-
-
Podilchuk, C.I.1
Delp, E.J.2
-
59
-
-
0036556071
-
Combinational Image Watermarking in the Spatial and Frequency Domains
-
Shih, F. Y., and S. Y. Wu. “Combinational Image Watermarking in the Spatial and Frequency Domains.” Pattern Recognition 36 (2003): 969.
-
(2003)
Pattern Recognition
, vol.36
, pp. 969
-
-
Shih, F.Y.1
Wu, S.Y.2
-
60
-
-
0032312612
-
A Public Key Watermark for Image Verification and Authentication
-
Chicago
-
Wong, P. W. “A Public Key Watermark for Image Verification and Authentication.” In Proc. IEEE Int. Conf. Image Processing. Chicago, 1998.
-
(1998)
Proc. IEEE Int. Conf. Image Processing.
-
-
Wong, P.W.1
-
62
-
-
8844285192
-
Spatial Synchronization Using Watermark Key Structure
-
San Jose, CA: SPIE
-
Lin, E., and E. Delp, “Spatial Synchronization Using Watermark Key Structure.” In Proc. SPIE Conf. Security, Steganography, and Watermarking of Multimedia Contents. San Jose, CA: SPIE, 2004.
-
(2004)
Proc. SPIE Conf. Security, Steganography, and Watermarking of Multimedia Contents.
-
-
Lin, E.1
Delp, E.2
-
63
-
-
0742321328
-
Spatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication
-
Mukherjee, D., S. Maitra, and S. Acton. “Spatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication.” IEEE Trans. on Multimedia 6 (2004): 1.
-
(2004)
IEEE Trans. on Multimedia
, vol.6
, pp. 1
-
-
Mukherjee, D.1
Maitra, S.2
Acton, S.3
-
64
-
-
0034249378
-
A Robust DCT-Based Watermarking for Copyright Protection
-
Lin, S. D., and C.-F. Chen. “A Robust DCT-Based Watermarking for Copyright Protection.” IEEE Trans. Consumer Electronics 46 (2000): 415-.
-
(2000)
IEEE Trans. Consumer Electronics
, vol.46
, pp. 415
-
-
Lin, S.D.1
Chen, C.-F.2
-
66
-
-
0001553281
-
A Secure, Robust Watermark for Multimedia
-
Cambridge, UK
-
Cox, J., et al. “A Secure, Robust Watermark for Multimedia.” In Proc. First Int. Workshop Information Hiding. Cambridge, UK, 1996, 185.
-
(1996)
Proc. First Int. Workshop Information Hiding.
, pp. 185
-
-
Cox, J.1
-
67
-
-
0021412027
-
Vector Quantization
-
Gray, R. M. “Vector Quantization.” IEEE ASSP Mag. 1 (1984): 4.
-
(1984)
IEEE ASSP Mag.
, vol.1
, pp. 4
-
-
Gray, R.M.1
-
68
-
-
0033907535
-
Digital Image Watermarking Technique Based on Vector Quantization
-
Lu, Z., and S. Sun. “Digital Image Watermarking Technique Based on Vector Quantization.” IEEE Electronics Letters 36 (2000): 303.
-
(2000)
IEEE Electronics Letters
, vol.36
, pp. 303
-
-
Lu, Z.1
Sun, S.2
-
69
-
-
0032312612
-
A Public Key Watermark for Image Verification and Authentication
-
Chicago
-
Wong, P. W. “A Public Key Watermark for Image Verification and Authentication.” In Proc. IEEE Int. Conf. Image Processing. Chicago, 1998.
-
(1998)
Proc. IEEE Int. Conf. Image Processing.
-
-
Wong, P.W.1
-
70
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
Rivest, R., A. Shamir, and L. Adleman. “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.” Communications of the ACM 21 (1978): 120.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
71
-
-
0003602325
-
-
RFC 1321. Cambridge, MA: MIT Laboratory for Computer Science/RSA Data Security
-
Rivest, R. L. The MD5 Message Digest Algorithm. RFC 1321. Cambridge, MA: MIT Laboratory for Computer Science/RSA Data Security 1992.
-
(1992)
The MD5 Message Digest Algorithm.
-
-
Rivest, R.L.1
-
72
-
-
0033872149
-
Counterfeiting Attacks on Oblivious Block-Wise Independent Invisible Watermarking Schemes
-
Holliman, M., and N. Memon. Counterfeiting Attacks on Oblivious Block-Wise Independent Invisible Watermarking Schemes. IEEE Trans. Image Processing 9 (2000): 432.
-
(2000)
IEEE Trans. Image Processing
, vol.9
, pp. 432
-
-
Holliman, M.1
Memon, N.2
-
73
-
-
0036611838
-
Hierarchical Watermarking for Secure Image Authentication with Localization
-
Celik, M., et al. “Hierarchical Watermarking for Secure Image Authentication with Localization.” IEEE Trans. Image Processing 11 (2002): 585.
-
(2002)
IEEE Trans. Image Processing
, vol.11
, pp. 585
-
-
Celik, M.1
-
74
-
-
85052442424
-
Copyright Protection for Cultureware Preservation in Digital Repositories
-
Yokohama, Japan
-
Coetzee, L., and J. Eksteen. “Copyright Protection for Cultureware Preservation in Digital Repositories.” In Proc. 10th Annual Internet Society Conference. Yokohama, Japan, 2000.
-
(2000)
Proc. 10th Annual Internet Society Conference.
-
-
Coetzee, L.1
Eksteen, J.2
-
76
-
-
0031362116
-
Secure Spread Spectrum Watermarking for Multimedia
-
Cox, I. J., et al. “Secure Spread Spectrum Watermarking for Multimedia.” IEEE Trans. Image Processing 6 (1997): 1673.
-
(1997)
IEEE Trans. Image Processing
, vol.6
, pp. 1673
-
-
Cox, I.J.1
-
77
-
-
60349127871
-
Digital Watermarking
-
Cox, I. J., et al. “Digital Watermarking.” J. Electronic Imaging 11 (2002): 414.
-
(2002)
J. Electronic Imaging
, vol.11
, pp. 414
-
-
Cox, I.J.1
-
79
-
-
0035485860
-
Diversity and Attack Characterization for Improved Robust Watermarking
-
Kundur, D., and D. Hatzinakos. “Diversity and Attack Characterization for Improved Robust Watermarking.” IEEE Trans. Signal Processing 29 (2001): 2383.
-
(2001)
IEEE Trans. Signal Processing
, vol.29
, pp. 2383
-
-
Kundur, D.1
Hatzinakos, D.2
-
82
-
-
0031365813
-
Rotation, Translation and Scale Invariant Digital Image Watermarking
-
O’Ruanaidh, J., and T. Pun. Rotation, Translation and Scale Invariant Digital Image Watermarking.” In Proc. Int. Conf. Image Processing. 1997, 536.
-
(1997)
Proc. Int. Conf. Image Processing.
, pp. 536
-
-
O’Ruanaidh, J.1
Pun, T.2
-
85
-
-
0033872149
-
Counterfeiting Attacks for Block-Wise Independent Watermarking Techniques
-
Holliman, M., and N. Memon. “Counterfeiting Attacks for Block-Wise Independent Watermarking Techniques.” IEEE Trans. Image Processing 9 (2000): 432.
-
(2000)
IEEE Trans. Image Processing
, vol.9
, pp. 432
-
-
Holliman, M.1
Memon, N.2
-
86
-
-
0002329325
-
Template-Based Recovery of Fourier-Based Watermarks Using Log-Polar and Log-Log Maps
-
Florence, Italy
-
Pereira, S., et al. “Template-Based Recovery of Fourier-Based Watermarks Using Log-Polar and Log-Log Maps.” In Proc. IEEE Int. Conf. Multimedia Computing and Systems. Florence, Italy, 1999.
-
(1999)
Proc. IEEE Int. Conf. Multimedia Computing and Systems.
-
-
Pereira, S.1
-
87
-
-
0000964065
-
Analysis of the Sensitivity Attack against Electronic Watermarks in Images
-
Portland, OR
-
Linnartz, J., and M. Dijk, M. “Analysis of the Sensitivity Attack against Electronic Watermarks in Images.” In Proc. Intl. Workshop on Information Hiding. Portland, OR, 1998.
-
(1998)
Proc. Intl. Workshop on Information Hiding.
-
-
Linnartz, J.1
Dijk, M.M.2
-
88
-
-
0042823352
-
Secure Hybrid Robust Watermarking Resistant against Tampering and Copy Attack
-
Deguillaume, F., et al. “Secure Hybrid Robust Watermarking Resistant against Tampering and Copy Attack.” Signal Processing 83 (2003): 2133.
-
(2003)
Signal Processing
, vol.83
, pp. 2133
-
-
Deguillaume, F.1
-
90
-
-
85032751954
-
Watermarking Schemes Evaluation
-
Petitcolas, F. “Watermarking Schemes Evaluation.” IEEE Signal Processing 17 (2000): 58.
-
(2000)
IEEE Signal Processing
, vol.17
, pp. 58
-
-
Petitcolas, F.1
-
91
-
-
0035369792
-
Attack Modelling: Towards a Second Generation Benchmark
-
Voloshynovskiy, S., et al. “Attack Modelling: Towards a Second Generation Benchmark.” Signal Processing 81 (2001): 1177.
-
(2001)
Signal Processing
, vol.81
, pp. 1177
-
-
Voloshynovskiy, S.1
-
92
-
-
0003197599
-
Second Generation Benchmarking and Application Oriented Evaluation
-
Pittsburgh, PA
-
Pereira, S., et al. “Second Generation Benchmarking and Application Oriented Evaluation.” In Proc. Information Hiding Workshop III. Pittsburgh, PA, 2001.
-
(2001)
Proc. Information Hiding Workshop III.
-
-
Pereira, S.1
-
93
-
-
0035159385
-
A Benchmarking Protocol for Watermarking Methods
-
Thessaloniki, Greece
-
Solachidis, V., et al. “A Benchmarking Protocol for Watermarking Methods.” In Proc. IEEE Int. Conf. on Image Processing. Thessaloniki, Greece, 2001.
-
(2001)
Proc. IEEE Int. Conf. on Image Processing.
-
-
Solachidis, V.1
-
96
-
-
0002152920
-
Assuring Ownership Rights for Digital Images
-
Germany: Viewveg
-
Caronni, G. “Assuring Ownership Rights for Digital Images.” In Proc. Reliable IT Systems. Germany: Viewveg, 1995.
-
(1995)
Proc. Reliable IT Systems.
-
-
Caronni, G.1
-
98
-
-
0030388964
-
Secure Spread Spectrum Watermarking for Images, Audio, and Video
-
Lausanne, Switzerland: IEEE
-
Cox, I., et al. “Secure Spread Spectrum Watermarking for Images, Audio, and Video.” In Proc. IEEE Int. Conf. Image Processing. Lausanne, Switzerland: IEEE, 1996.
-
(1996)
Proc. IEEE Int. Conf. Image Processing.
-
-
Cox, I.1
-
99
-
-
0031362116
-
Secure Spread Spectrum Watermarking for Multimedia
-
Cox, I., et al. “Secure Spread Spectrum Watermarking for Multimedia.” IEEE Trans. Image Processing 6 (1997): 1673.
-
(1997)
IEEE Trans. Image Processing
, vol.6
, pp. 1673
-
-
Cox, I.1
-
100
-
-
0035294752
-
Image Watermarking: An Evolution to Content Based Approaches
-
Bas, P., J.-M. Chassery, and B. Macq. “Image Watermarking: An Evolution to Content Based Approaches.” Pattern Recognition 35 (2002): 545.
-
(2002)
Pattern Recognition
, vol.35
, pp. 545
-
-
Bas, P.1
Chassery, J.-M.2
Macq, B.3
-
102
-
-
0034249378
-
A Robust DCT-Based Watermarking for Copyright Protection
-
Lin, S. D., and C.-F. Chen. “A Robust DCT-Based Watermarking for Copyright Protection.” IEEE Trans. Consumer Electronics 46 (2000): 415-.
-
(2000)
IEEE Trans. Consumer Electronics
, vol.46
, pp. 415
-
-
Lin, S.D.1
Chen, C.-F.2
-
103
-
-
0036556071
-
Combinational Image Watermarking in the Spatial and Frequency Domains
-
Shih, F. Y., and S. Y. Wu. “Combinational Image Watermarking in the Spatial and Frequency Domains.” Pattern Recognition 36 (2003): 969.
-
(2003)
Pattern Recognition
, vol.36
, pp. 969
-
-
Shih, F.Y.1
Wu, S.Y.2
-
104
-
-
0034140111
-
Joint Wavelet and Spatial Transformation for Digital Watermarking
-
Tsai, M. J., K. Y. Yu, and Y. Z. Chen. “Joint Wavelet and Spatial Transformation for Digital Watermarking.” IEEE Trans. Consumer Electronics 46 (2000): 241.
-
(2000)
IEEE Trans. Consumer Electronics
, vol.46
, pp. 241
-
-
Tsai, M.J.1
Yu, K.Y.2
Chen, Y.Z.3
-
105
-
-
77956566515
-
A Robust Video Watermarking Technique for Compression and Transcoding Processing
-
Lausanne: Switzerland
-
Lancini, R., F. Mapelli, and S. Tubaro. “A Robust Video Watermarking Technique for Compression and Transcoding Processing.” In Proc. IEEE Int. Conf. Multimedia and Expo. Lausanne: Switzerland, 2002.
-
(2002)
Proc. IEEE Int. Conf. Multimedia and Expo.
-
-
Lancini, R.1
Mapelli, F.2
Tubaro, S.3
-
107
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
Rivest, R., A. Shamir, and L. Adleman. “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.” Communications of the ACM 21 (1978): 120.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
108
-
-
0034249378
-
A Robust DCT-Based Watermarking for Copyright Protection
-
Lin, S. D., and C.-F. Chen. “A Robust DCT-Based Watermarking for Copyright Protection.” IEEE Trans. Consumer Electronics 46 (2000): 415-.
-
(2000)
IEEE Trans. Consumer Electronics
, vol.46
, pp. 415
-
-
Lin, S.D.1
Chen, C.-F.2
-
112
-
-
0031997283
-
Minimal Fuzzy Memberships and Rules Using Hierarchical Genetic Algorithms
-
Tang, K.-S., et al. “Minimal Fuzzy Memberships and Rules Using Hierarchical Genetic Algorithms.” IEEE Trans. Industrial Electronics 45 (1998): 162.
-
(1998)
IEEE Trans. Industrial Electronics
, vol.45
, pp. 162
-
-
Tang, K.-S.1
-
114
-
-
84948707475
-
Digital Watermarking for ROI Medical Images by Using Compressed Signature Image
-
Kona, HI
-
Wakatani, A. “Digital Watermarking for ROI Medical Images by Using Compressed Signature Image.” In Proc. Int. Conf. on System Sciences. Kona, HI, 2002.
-
(2002)
Proc. Int. Conf. on System Sciences.
-
-
Wakatani, A.1
-
115
-
-
0031150291
-
Medical Image Compression with Lossless Regions of Interest
-
Strom, J., and P. C. Cosman. “Medical Image Compression with Lossless Regions of Interest.” Signal Processing 59 (1997): 155.
-
(1997)
Signal Processing
, vol.59
, pp. 155
-
-
Strom, J.1
Cosman, P.C.2
-
116
-
-
0030173121
-
A New, Fast, and Efficient Image Codec Based on Set Partitioning in Hierarchical Trees
-
Said, A., and W. A. Pearlmana. “A New, Fast, and Efficient Image Codec Based on Set Partitioning in Hierarchical Trees.” IEEE Trans. Circuits and System for Video Technology 6 (1997): 243.
-
(1997)
IEEE Trans. Circuits and System for Video Technology
, vol.6
, pp. 243
-
-
Said, A.1
Pearlmana, W.A.2
-
117
-
-
0027798110
-
Embedded Image Coding Using Zerotrees of Wavelet Coefficients
-
Shapiro, J. “Embedded Image Coding Using Zerotrees of Wavelet Coefficients.” IEEE Trans. Signal Processing 41 (1993): 3445.
-
(1993)
IEEE Trans. Signal Processing
, vol.41
, pp. 3445
-
-
Shapiro, J.1
-
118
-
-
0035605834
-
Compact Storage of Medical Image with Patient Information
-
Acharya, U. R., et al. “Compact Storage of Medical Image with Patient Information.” IEEE Trans. Info. Tech. in Biomedicine 5 (2001): 320.
-
(2001)
IEEE Trans. Info. Tech. in Biomedicine
, vol.5
, pp. 320
-
-
Acharya, U.R.1
-
119
-
-
0031362116
-
Secure Spread Spectrum Watermarking for Multimedia
-
Cox, I., et al. “Secure Spread Spectrum Watermarking for Multimedia.” IEEE Trans. Image Processing 6 (1997): 1673.
-
(1997)
IEEE Trans. Image Processing
, vol.6
, pp. 1673
-
-
Cox, I.1
-
120
-
-
0032312612
-
A Public Key Watermark for Image Verification and Authentication
-
Chicago
-
Wong, P. W. “A Public Key Watermark for Image Verification and Authentication.” In Proc. IEEE Int. Conf. Image Processing. Chicago, 1998.
-
(1998)
Proc. IEEE Int. Conf. Image Processing.
-
-
Wong, P.W.1
-
121
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
Rivest, R., A. Shamir, and L. Adleman. “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.” Communications of the ACM 21 (1978): 120.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
123
-
-
0036611838
-
Hierarchical Watermarking for Secure Image Authentication with Localization
-
Celik, M. U., et al. “Hierarchical Watermarking for Secure Image Authentication with Localization.” IEEE Trans. Image Processing 11 (2002): 585.
-
(2002)
IEEE Trans. Image Processing
, vol.11
, pp. 585
-
-
Celik, M.U.1
-
124
-
-
0038391442
-
Mean Quantization Based Image Watermarking
-
Chen, L.-H., and J.-J. Lin. “Mean Quantization Based Image Watermarking.” Image Vision Computing 21 (2003): 717.
-
(2003)
Image Vision Computing
, vol.21
, pp. 717
-
-
Chen, L.-H.1
Lin, J.-J.2
-
127
-
-
0024479011
-
Threshold Decomposition of Grayscale Morphology into Binary Morphology
-
Shih, F. Y. and O. R. Mitchell. “Threshold Decomposition of Grayscale Morphology into Binary Morphology, IEEE Trans. Pattern Anal. Mach. Intell. 11 (1989): 31.
-
(1989)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.11
, pp. 31
-
-
Shih, F.Y.1
Mitchell, O.R.2
-
128
-
-
85008047913
-
Protecting Ownership Rights through Digital Watermarking
-
Berghel, H., and L. O’Gorman. “Protecting Ownership Rights through Digital Watermarking.” IEEE Computer Mag. 29 (1996): 101.
-
(1996)
IEEE Computer Mag.
, vol.29
, pp. 101
-
-
Berghel, H.1
O’Gorman, L.2
-
131
-
-
0032075445
-
Robust Image Watermarking in the Spatial Domain
-
Nikolaidis, N., and I. Pitas. “Robust Image Watermarking in the Spatial Domain.” Signal Processing 66 (1998): 385.
-
(1998)
Signal Processing
, vol.66
, pp. 385
-
-
Nikolaidis, N.1
Pitas, I.2
-
132
-
-
0036611838
-
Hierarchical Watermarking for Secure Image Authentication with Localization
-
Celik, M. et al. “Hierarchical Watermarking for Secure Image Authentication with Localization.” IEEE Trans. Image Processing 11 (2002): 585.
-
(2002)
IEEE Trans. Image Processing
, vol.11
, pp. 585
-
-
Celik, M.1
-
133
-
-
0030386584
-
Applications of Toral Automorphisms in Image Watermarking
-
Lausanne, Switzerland: IEEE
-
Voyatzis, G., and I. Pitas. “Applications of Toral Automorphisms in Image Watermarking.” In Proc. IEEE Int. Conf. on Image Processing. Lausanne, Switzerland: IEEE, 1996.
-
(1996)
Proc. IEEE Int. Conf. on Image Processing.
-
-
Voyatzis, G.1
Pitas, I.2
-
134
-
-
0742321328
-
Spatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication
-
Mukherjee, D., S. Maitra, and S. Acton. “Spatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication.” IEEE Trans. on Multimedia 6 (2004): 1.
-
(2004)
IEEE Trans. on Multimedia
, vol.6
, pp. 1
-
-
Mukherjee, D.1
Maitra, S.2
Acton, S.3
-
135
-
-
0032312612
-
A Public Key Watermark for Image Verification and Authentication
-
Chicago
-
Wong, P. W. “A Public Key Watermark for Image Verification and Authentication.” In Proc. IEEE Int. Conf. Image Processing. Chicago, 1998.
-
(1998)
Proc. IEEE Int. Conf. Image Processing.
-
-
Wong, P.W.1
-
136
-
-
0031362116
-
Secure Spread Spectrum Watermarking for Multimedia
-
Cox, I., et al. “Secure Spread Spectrum Watermarking for Multimedia.” IEEE Trans. Image Processing 6 (1997): 1673.
-
(1997)
IEEE Trans. Image Processing
, vol.6
, pp. 1673
-
-
Cox, I.1
-
137
-
-
1842528982
-
A Chaos-Based Robust Wavelet-Domain Watermarking Algorithm
-
Zhao, D., G. Chen, and W. Liu. “A Chaos-Based Robust Wavelet-Domain Watermarking Algorithm.” Chaos, Solitons and Fractals 22 (2004): 47.
-
(2004)
Chaos, Solitons and Fractals
, vol.22
, pp. 47
-
-
Zhao, D.1
Chen, G.2
Liu, W.3
-
138
-
-
2942568431
-
Applying Informed Coding and Embedding to Design a Robust High-Capacity Watermark
-
Miller, M. L., G. J. Doerr, and I. J. Cox. “Applying Informed Coding and Embedding to Design a Robust High-Capacity Watermark.” IEEE Trans. Image Processing 13 (2004): 792.
-
(2004)
IEEE Trans. Image Processing
, vol.13
, pp. 792
-
-
Miller, M.L.1
Doerr, G.J.2
Cox, I.J.3
-
139
-
-
12344332735
-
An Adjusted-Purpose Digital Watermarking Technique
-
Wu, Y. T., and Shih, F. Y. “An Adjusted-Purpose Digital Watermarking Technique.” Pattern Recognition 37 (2004): 2349.
-
(2004)
Pattern Recognition
, vol.37
, pp. 2349
-
-
Wu, Y.T.1
Shih, F.Y.2
-
140
-
-
10444270831
-
Enhancement of Image Watermark Retrieval Based on Genetic Algorithm
-
Shih, F. Y., and Y. Wu. “Enhancement of Image Watermark Retrieval Based on Genetic Algorithm.” J. Visual Communication and Image Representation 16 (2005): 115.
-
(2005)
J. Visual Communication and Image Representation
, vol.16
, pp. 115
-
-
Shih, F.Y.1
Wu, Y.2
-
141
-
-
0034249378
-
A Robust DCT-Based Watermarking for Copyright Protection
-
Lin, S. D., and C.-F. Chen. “A Robust DCT-Based Watermarking for Copyright Protection.” IEEE Trans. Consumer Electronics 46 (2000): 415-.
-
(2000)
IEEE Trans. Consumer Electronics
, vol.46
, pp. 415
-
-
Lin, S.D.1
Chen, C.-F.2
-
142
-
-
31744433507
-
Genetic Algorithm Based Methodology for Breaking the Steganalytic Systems
-
Wu, Y. T., and F. Y. Shih. “Genetic Algorithm Based Methodology for Breaking the Steganalytic Systems.” IEEE Trans. Systems, Man, and Cybernetics, part B, 36 (2006): 24.
-
(2006)
IEEE Trans. Systems, Man, and Cybernetics
, vol.36
, pp. 24
-
-
Wu, Y.T.1
Shih, F.Y.2
-
143
-
-
0036556071
-
Combinational Image Watermarking in the Spatial and Frequency Domains
-
Shih, F. Y., and S. Y. Wu. “Combinational Image Watermarking in the Spatial and Frequency Domains.” Pattern Recognition 36 (2003): 969.
-
(2003)
Pattern Recognition
, vol.36
, pp. 969
-
-
Shih, F.Y.1
Wu, S.Y.2
-
149
-
-
33744728031
-
Steganalysis for Markov Cover Data with Applications to Images
-
Sullivan, K., et al. “Steganalysis for Markov Cover Data with Applications to Images.” IEEE Trans. Information Forensics and Security 1 (2006): 275.
-
(2006)
IEEE Trans. Information Forensics and Security
, vol.1
, pp. 275
-
-
Sullivan, K.1
-
150
-
-
0031996445
-
Exploring Steganography: Seeing the Unseen
-
Johnson, N., and S. Jajodia, S. “Exploring Steganography: Seeing the Unseen.” IEEE Computer 31, (1998): 26.
-
(1998)
IEEE Computer
, vol.31
, pp. 26
-
-
Johnson, N.1
Jajodia, S.S.2
-
152
-
-
33645680830
-
Benchmarking Steganographic and Steganalysis Techniques
-
San Jose, CA
-
Kharrazi, M., H. T. Sencar, and N. D. Memon. “Benchmarking Steganographic and Steganalysis Techniques.” In Proc. Intl. Conf. Security, Steganography, and Watermarking of Multimedia Contents. San Jose, CA, 2005.
-
(2005)
Proc. Intl. Conf. Security, Steganography, and Watermarking of Multimedia Contents.
-
-
Kharrazi, M.1
Sencar, H.T.2
Memon, N.D.3
-
153
-
-
31744433507
-
Genetic Algorithm Based Methodology for Breaking the Steganalytic Systems
-
Wu, Y. T., and F. Y. Shih. “Genetic Algorithm Based Methodology for Breaking the Steganalytic Systems.” IEEE Trans. Systems, Man, and Cybernetics, part B, 36 (2006): 24.
-
(2006)
IEEE Trans. Systems, Man, and Cybernetics
, vol.36
, pp. 24
-
-
Wu, Y.T.1
Shih, F.Y.2
-
154
-
-
85052468080
-
-
Shareware application, Available online at
-
Brown, A. S-Tools for Windows. Shareware application, 1994. Available online at ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools4.zip.
-
(1994)
S-Tools for Windows.
-
-
Brown, A.1
-
155
-
-
85052455887
-
-
v0.90B, public domain. Available online at
-
Wolf, B. StegoDos-Black Wolf’s Picture Encoder v0.90B, public domain. Available online at ftp://ftp.csua.berkeley.edu/pub/cypherpunks/steganography/stegodos.zip.
-
StegoDos-Black Wolf’s Picture Encoder
-
-
Wolf, B.1
-
156
-
-
85052457624
-
-
Jsteg Shell 2.0. Application. Available online at
-
Korejwa, J. Jsteg Shell 2.0. Application. Available online at http://www.tiac.net/users/korejwa/steg.htm.
-
-
-
Korejwa, J.1
-
157
-
-
0001849187
-
Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools and Some Lessons Learned
-
Dresden, Germany
-
Westfeld, A., and A. Pfitzmann. “Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools and Some Lessons Learned.” In Proc. Int. Workshop Information Hiding. Dresden, Germany, 1999, 61.
-
(1999)
Proc. Int. Workshop Information Hiding.
, vol.61
-
-
Westfeld, A.1
Pfitzmann, A.2
-
159
-
-
0242497150
-
New Methodology for Breaking Steganographic Techniques for JPEGs
-
Santa Clara, CA: SPIE
-
Fridrich, J., M. Goljan, and D. Hogea. “New Methodology for Breaking Steganographic Techniques for JPEGs.” In Proc. SPIE, Santa Clara, CA: SPIE, 2003.
-
(2003)
Proc. SPIE
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
160
-
-
0004064292
-
-
Technical Report TR2001-412, Computer Science. Hanover, NH: Dartmouth College
-
Farid, H. Detecting Steganographic Message in Digital Images. Technical Report TR2001-412, Computer Science. Hanover, NH: Dartmouth College, 2001.
-
(2001)
Detecting Steganographic Message in Digital Images.
-
-
Farid, H.1
-
161
-
-
0011994605
-
-
Technical Report 01-11. Ann Arbor, MI: Center for Information Technology Integration, University of Michigan
-
Provos, N. and P. Honeyman. Detecting Steganographic Content on the Internet. Technical Report 01-11. Ann Arbor, MI: Center for Information Technology Integration, University of Michigan, 2001.
-
(2001)
Detecting Steganographic Content on the Internet.
-
-
Provos, N.1
Honeyman, P.2
-
162
-
-
1442360452
-
Quantitative Steganalysis of Digital Images: Estimating the Secret Message Length
-
Fridrich, J., et al. “Quantitative Steganalysis of Digital Images: Estimating the Secret Message Length.” Multimedia Systems 9 (2003): 288.
-
(2003)
Multimedia Systems
, vol.9
, pp. 288
-
-
Fridrich, J.1
-
164
-
-
33845525292
-
Blind Steganography Detection Using a Computational Immune System: A Work in Progress
-
Jackson, J. T., et al. “Blind Steganography Detection Using a Computational Immune System: A Work in Progress.” Int. J. Digital Evidence (2003).
-
(2003)
Int. J. Digital Evidence
-
-
Jackson, J.T.1
-
165
-
-
0034787093
-
Reliable Detection of LSB Steganography in Color and Grayscale Images
-
Ottawa, Ontario
-
Fridrich, J., M. Goljan, and R. Du. “Reliable Detection of LSB Steganography in Color and Grayscale Images.” In Proc. ACM Workshop Multimedia Security, Ottawa, Ontario, 2001.
-
(2001)
Proc. ACM Workshop Multimedia Security
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
169
-
-
0002701935
-
Secure Steganographic Methods for Palette Images
-
Dresden, Germany
-
Fridrich, J., and R. Du. “Secure Steganographic Methods for Palette Images.” In Proc. Information Hiding Workshop. Dresden, Germany, 1999.
-
(1999)
Proc. Information Hiding Workshop.
-
-
Fridrich, J.1
Du, R.2
-
172
-
-
33847675252
-
An Overview of Steganography for the Computer Forensics Examiner
-
Kessler, G. C. “An Overview of Steganography for the Computer Forensics Examiner.” Forensic Science Communications 6 (2004): 1.
-
(2004)
Forensic Science Communications
, vol.6
, pp. 1
-
-
Kessler, G.C.1
-
173
-
-
21944435694
-
Reliability of Objective Picture Quality Measures
-
Grgic, S., M. Grgic, and M. Mrak. “Reliability of Objective Picture Quality Measures.” J. Electrical Engineering 55 (2004): 3.
-
(2004)
J. Electrical Engineering
, vol.55
, pp. 3
-
-
Grgic, S.1
Grgic, M.2
Mrak, M.3
-
174
-
-
0022084120
-
A Visual Model Weighted Cosine Transform for Image Compression and Quality Assessment
-
Nill, N. B. “A Visual Model Weighted Cosine Transform for Image Compression and Quality Assessment.” IEEE Trans. Communication 33 (1985): 551.
-
(1985)
IEEE Trans. Communication
, vol.33
, pp. 551
-
-
Nill, N.B.1
-
177
-
-
27144489164
-
A Tutorial on Support Vector Machines for Pattern Recognition
-
Burges, C. “A Tutorial on Support Vector Machines for Pattern Recognition.” IEEE Trans. Data Mining and Knowledge Discovery 2 (1998): 121.
-
(1998)
IEEE Trans. Data Mining and Knowledge Discovery
, vol.2
, pp. 121
-
-
Burges, C.1
-
179
-
-
0038647814
-
Hierarchical Classification and Feature Reduction for Fast Face Detection with Support Vector Machines
-
Heisele, B., et al. “Hierarchical Classification and Feature Reduction for Fast Face Detection with Support Vector Machines.” Pattern Recognition 36 (2003): 2007.
-
(2003)
Pattern Recognition
, vol.36
, pp. 2007
-
-
Heisele, B.1
-
180
-
-
13644261756
-
Improved Feature Reduction in Input and Feature Spaces
-
Shih, F. Y., and S. Cheng. “Improved Feature Reduction in Input and Feature Spaces.” Pattern Recognition 38 (2005): 651.
-
(2005)
Pattern Recognition
, vol.38
, pp. 651
-
-
Shih, F.Y.1
Cheng, S.2
-
181
-
-
0007696417
-
Less Is More: Active Learning with Support Vector Machines
-
Stanford, CA: Stanford University
-
Schohn, G., and D. Cohn. “Less Is More: Active Learning with Support Vector Machines.” In Proc. Int. Conf. Machine Learning. Stanford, CA: Stanford University, 2000.
-
(2000)
Proc. Int. Conf. Machine Learning.
-
-
Schohn, G.1
Cohn, D.2
-
189
-
-
0036505670
-
A Comparison of Methods for Multiclass Support Vector Machines
-
Hsu, C. W., and C. J. Lin. “A Comparison of Methods for Multiclass Support Vector Machines.” IEEE Trans. Neural Networks 13 (2002): 415.
-
(2002)
IEEE Trans. Neural Networks
, vol.13
, pp. 415
-
-
Hsu, C.W.1
Lin, C.J.2
-
192
-
-
0005105932
-
High Capacity Despite Better Steganalysis (F5-A Steganographic Algorithm)
-
New York
-
Westfeld, A. “High Capacity Despite Better Steganalysis (F5-A Steganographic Algorithm).” In Proc. Int. Workshop Information Hiding. New York, 2001.
-
(2001)
Proc. Int. Workshop Information Hiding.
-
-
Westfeld, A.1
-
193
-
-
85084160704
-
Defending against Statistical Steganalysis
-
Washington, DC
-
Provos, N. “Defending against Statistical Steganalysis.” In Proc. USENIX Security Symposium. Washington, DC, 2001.
-
(2001)
Proc. USENIX Security Symposium.
-
-
Provos, N.1
-
194
-
-
0347390531
-
Steganalysis of JPEG Images: Breaking the F5 Algorithm
-
Noordwijkerhout, Netherlands
-
Fridrich, J., M. Goljan, and D. Hogea. “Steganalysis of JPEG Images: Breaking the F5 Algorithm.” In Proc. Int. Workshop Information Hiding. Noordwijkerhout, Netherlands, 2002, 310.
-
(2002)
Proc. Int. Workshop Information Hiding.
, pp. 310
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
195
-
-
0242581862
-
A Novel Approach for Increasing Security and Data Embedding Capacity in Images for Data Hiding Applications
-
Las Vegas, NV
-
Alturki, F., and Mersereau, R. “A Novel Approach for Increasing Security and Data Embedding Capacity in Images for Data Hiding Applications.” In Proc. Int. Conf. Information Technology: Coding and Computing. Las Vegas, NV, 2001.
-
(2001)
Proc. Int. Conf. Information Technology: Coding and Computing.
-
-
Alturki, F.1
Mersereau, R.2
-
196
-
-
4544225634
-
A DCT-Based Image Steganographic Method Resisting Statistical Attacks
-
Montreal, Quebec
-
Chu, R., et al. “A DCT-Based Image Steganographic Method Resisting Statistical Attacks.” In Intl. Conf. Acoustics, Speech, and Signal Processing. Montreal, Quebec, 2004.
-
(2004)
Intl. Conf. Acoustics, Speech, and Signal Processing.
-
-
Chu, R.1
-
198
-
-
10444270831
-
Enhancement of Image Watermark Retrieval Based on Genetic Algorithm
-
Shih, F. Y. and Y.-T. Wu. “Enhancement of Image Watermark Retrieval Based on Genetic Algorithm.” J. Visual Commu. and Image Repr., 16 (2005): 115.
-
(2005)
J. Visual Commu. and Image Repr.
, vol.16
, pp. 115
-
-
Shih, F.Y.1
Wu, Y.-T.2
-
199
-
-
0001849187
-
Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools and Some Lessons Learned
-
Dresden, Germany
-
Westfeld, A., and A. Pfitzmann. “Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools and Some Lessons Learned.” In Proc. Int. Workshop Information Hiding. Dresden, Germany, 1999, 61.
-
(1999)
Proc. Int. Workshop Information Hiding.
, vol.61
-
-
Westfeld, A.1
Pfitzmann, A.2
-
201
-
-
0036530067
-
Statistical Analysis of Image Quality Measures
-
Avcibas, I., and Sankur, B. “Statistical Analysis of Image Quality Measures.” J. Electron. Imag. 11 (2002): 206.
-
(2002)
J. Electron. Imag.
, vol.11
, pp. 206
-
-
Avcibas, I.1
Sankur, B.2
-
203
-
-
0242497150
-
New Methodology for Breaking Steganographic Techniques for JPEGs
-
Santa Clara, CA: SPIE
-
Fridrich, J., M. Goljan, and D. Hogea. “New Methodology for Breaking Steganographic Techniques for JPEGs.” In Proc. SPIE, Santa Clara, CA: SPIE, 2003.
-
(2003)
Proc. SPIE
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
204
-
-
85052459393
-
-
PictureMarc, Embed Watermark, v 1.00.45, Digimarc Corporation
-
PictureMarc, Embed Watermark, v 1.00.45, Digimarc Corporation.
-
-
-
-
205
-
-
0031362116
-
Secure Spread Spectrum Watermarking for Multimedia
-
Cox, I., et al. “Secure Spread Spectrum Watermarking for Multimedia.” IEEE Trans. Image Processing 6 (1997): 1673.
-
(1997)
IEEE Trans. Image Processing
, vol.6
, pp. 1673
-
-
Cox, I.1
-
206
-
-
85052468080
-
-
Shareware application, 1994. Available online at
-
Brown, A. S-Tools for Windows. Shareware application, 1994. Available online at ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools4.zip.
-
S-Tools for Windows.
-
-
Brown, A.1
-
207
-
-
0036556071
-
Combinational Image Watermarking in the Spatial and Frequency Domains
-
Shih, F. Y., and S. Y. Wu. “Combinational Image Watermarking in the Spatial and Frequency Domains.” Pattern Recognition 36 (2003): 969.
-
(2003)
Pattern Recognition
, vol.36
, pp. 969
-
-
Shih, F.Y.1
Wu, S.Y.2
|