-
1
-
-
85032752384
-
Digital watermarking for DVD video copy protection
-
M. Maes, T. Kalker, J.-P. Linnartz, J. Talstra, F. Depovere, and J. Haitsma, "Digital watermarking for DVD video copy protection," IEEE Signal Processing Magazine 17(5), pp. 47 -57, 2000.
-
(2000)
IEEE Signal Processing Magazine
, vol.17
, Issue.5
, pp. 47-57
-
-
Maes, M.1
Kalker, T.2
Linnartz, J.-P.3
Talstra, J.4
Depovere, F.5
Haitsma, J.6
-
2
-
-
0029765001
-
Copyright protection of images using robust digital signatures
-
May
-
N. Nikolaidis and I. Pitas, "Copyright protection of images using robust digital signatures," in Proc. ICASSP-96 IEEE International Conference on Acoustics, Speech, and Signal Processing, 4, pp. 2168 -2171, May 1996.
-
(1996)
Proc. ICASSP-96 IEEE International Conference on Acoustics, Speech, and Signal Processing
, vol.4
, pp. 2168-2171
-
-
Nikolaidis, N.1
Pitas, I.2
-
5
-
-
0037999044
-
Authentication of LZ-77 compressed data
-
(Melbourne, FL), March
-
M. Atallah and S. Lonardi, "Authentication of LZ-77 compressed data," in Proceedings of the ACM Symposium on Applied Computing (SAC'03), pp. 282-287, (Melbourne, FL), March 2003.
-
(2003)
Proceedings of the ACM Symposium on Applied Computing (SAC'03)
, pp. 282-287
-
-
Atallah, M.1
Lonardi, S.2
-
6
-
-
0033871878
-
On random coding error exponents of watermarking systems
-
N. Merhav, "On random coding error exponents of watermarking systems," IEEE Transactions on Information Theory 46, pp. 420-430, 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, pp. 420-430
-
-
Merhav, N.1
-
9
-
-
0035333687
-
Quantization index modulation: A class of probably good methods for digital watermarking and information embedding
-
B. Chen and G. W. Wornell, "Quantization index modulation: A class of probably good methods for digital watermarking and information embedding," IEEE Trans. on Information Theory 47(4), pp. 1423-1443, 2001.
-
(2001)
IEEE Trans. on Information Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
10
-
-
0037737759
-
Scalar costa scheme for information embedding
-
J. Egeers, R. Bäuml, R. Tzschoppe, and B. Girod, "Scalar costa scheme for information embedding," IEEE Transactions on Signal Processing 51, pp. 1003 -1019, 2003.
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, pp. 1003-1019
-
-
Egeers, J.1
Bäuml, R.2
Tzschoppe, R.3
Girod, B.4
-
11
-
-
0032073388
-
Performance analysis of a 2-d multipulse amplitude modulation scheme for data hiding and watermarking of still images
-
J. Hernandez, F. Perez-Gonzalez, J. Rodriguez, and G. Nieto, "Performance analysis of a 2-d multipulse amplitude modulation scheme for data hiding and watermarking of still images," IEEE Journal on Selected Areas in Communications 16(4), pp. 510-524, 1998.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 510-524
-
-
Hernandez, J.1
Perez-Gonzalez, F.2
Rodriguez, J.3
Nieto, G.4
-
12
-
-
0033319098
-
Self-noise suppression schemes for blind image steganography
-
M. Ramkumar and A. Akansu, "Self-noise suppression schemes for blind image steganography," in Proc. SPIE International Workshop on Voice, Video and Data Communication, Multimedia Applications'99, 3845, 1999.
-
(1999)
Proc. SPIE International Workshop on Voice, Video and Data Communication, Multimedia Applications'99
, vol.3845
-
-
Ramkumar, M.1
Akansu, A.2
-
13
-
-
84947937393
-
A secure, robust watermark for multimedia
-
I. Cox, J. Kilian, T. Leighton, and T. Shamoon, "A secure, robust watermark for multimedia," in Proc. of 1st international Information Hiding Workshop, pp. 185-206, 1996.
-
(1996)
Proc. of 1st International Information Hiding Workshop
, pp. 185-206
-
-
Cox, I.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
15
-
-
0035797467
-
Improved hiding data in images by optimal moderately-significant-bit replacement
-
C.-K. Chan and L. Cheng, "Improved hiding data in images by optimal moderately-significant-bit replacement," Electronics Letters 37(16), pp. 1017 -1018, 2001.
-
(2001)
Electronics Letters
, vol.37
, Issue.16
, pp. 1017-1018
-
-
Chan, C.-K.1
Cheng, L.2
-
16
-
-
0038104797
-
Blind pattern matching attack on watermarking systems
-
D. Kirovski and F. Petitcolas, "Blind pattern matching attack on watermarking systems," IEEE Transactions on Signal Processing 51(4), pp. 1045 -1053, 2003.
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, Issue.4
, pp. 1045-1053
-
-
Kirovski, D.1
Petitcolas, F.2
-
17
-
-
0033690185
-
A source and channel-coding framework for vector-based data hiding in video
-
D. Mukherjee, J. Chae, S. Mitra, and B. S. Manjunath, "A source and channel-coding framework for vector-based data hiding in video," IEEE Transition on Circuits and Systems for Video Technology 10(4), pp. 630 -645, 2000.
-
(2000)
IEEE Transition on Circuits and Systems for Video Technology
, vol.10
, Issue.4
, pp. 630-645
-
-
Mukherjee, D.1
Chae, J.2
Mitra, S.3
Manjunath, B.S.4
-
18
-
-
0031997555
-
DCT-based watermarking for video
-
C.-T. Hsu and J.-L. Wu, "DCT-based watermarking for video," Consumer Electronics, IEEE Transactions on 44(1), pp. 206-216, 1998.
-
(1998)
Consumer Electronics, IEEE Transactions on
, vol.44
, Issue.1
, pp. 206-216
-
-
Hsu, C.-T.1
Wu, J.-L.2
-
19
-
-
0020752342
-
Writing on dirty paper
-
M. Costa, "Writing on dirty paper," IEEE Trans. Inform. Theory IT-29, pp. 439-441, 1983.
-
(1983)
IEEE Trans. Inform. Theory
, vol.IT-29
, pp. 439-441
-
-
Costa, M.1
-
20
-
-
0000957054
-
On the duality between data hiding and distributed source coding
-
J. Chou, S. Pradhan, L. Ghaoui, and K. Ramchandran, "On the duality between data hiding and distributed source coding," in Proc. of 33rd Annual Asilomar conference on Signals, Systems, and Computers, 1999.
-
(1999)
Proc. of 33rd Annual Asilomar Conference on Signals, Systems, and Computers
-
-
Chou, J.1
Pradhan, S.2
Ghaoui, L.3
Ramchandran, K.4
-
22
-
-
0038188753
-
Performance analysis of existing and new methods for data hiding with known-host information in additive channels
-
F. Perez-Gonzalez, F. Balado, and J. Martin, "Performance analysis of existing and new methods for data hiding with known-host information in additive channels," IEEE Transactions on Signal Processing 51(4), pp. 960 -980, 2003.
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, Issue.4
, pp. 960-980
-
-
Perez-Gonzalez, F.1
Balado, F.2
Martin, J.3
-
23
-
-
8844267824
-
-
ECE Department, New Jersey Institute of Technology, Newark, NJ 07102
-
H. Sencar, M. Ramkumar, and A. Akansu, "An overview of scalar quantization based information hiding methods (technical report)." ECE Department, New Jersey Institute of Technology, Newark, NJ 07102, 2003.
-
(2003)
An Overview of Scalar Quantization Based Information Hiding Methods (Technical Report).
-
-
Sencar, H.1
Ramkumar, M.2
Akansu, A.3
-
26
-
-
0018918171
-
An algorithm for vector quantizer design
-
COM-28
-
Y. Linde, A. Buzo, and R. Gray, "An algorithm for vector quantizer design," IEEE Transaction on Communication COM-28, pp. 84-95, 1980.
-
(1980)
IEEE Transaction on Communication
, pp. 84-95
-
-
Linde, Y.1
Buzo, A.2
Gray, R.3
|