Information hiding-a survey
暂无分享,去创建一个
Markus G. Kuhn | Ross Anderson | Ross J. Anderson | Fabien A. P. Petitcolas | F. Petitcolas | M. Kuhn
[1] Thierry Pun,et al. Secure Copyright Protection Techniques for Digital Images , 1998, Information Hiding.
[2] Peter Wayner. Disappearing cryptography - being and nothingness on the net , 1996 .
[3] Sijbrand Spannenburg. Optically and machine-detectable copying security elements , 1996, Electronic Imaging.
[4] Dieter Gollmann,et al. Computer Security — ESORICS 98 , 1998, Lecture Notes in Computer Science.
[5] Lawrence O'Gorman,et al. Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.
[6] A. W. M. van den Enden,et al. Discrete Time Signal Processing , 1989 .
[7] A.,et al. The Origins of Spread-Spectrum Communications , 2000 .
[8] Ingemar J. Cox,et al. Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.
[9] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[10] Germano Caronni. Assuring Ownership Rights for Digital Images , 1995, VIS.
[11] Gerhard C. Langelaar,et al. Copy Protection for Multimedia Data based on Labeling Techniques , 1998 .
[12] Ioannis Pitas,et al. Robust image watermarking in the spatial domain , 1998, Signal Process..
[13] D. E. Pearson,et al. Frequency mode LR attack operator for digitally watermarked images , 1998 .
[14] Ross J. Anderson. Stretching the Limits of Steganography , 1996, Information Hiding.
[15] Jian Zhao,et al. Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.
[16] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[17] Christophe De Vleeschouwer,et al. Watermarking algorithm based on a human visual model , 1998, Signal Process..
[18] Maurice Maes,et al. Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks , 1998, Information Hiding.
[19] David Aucsmith,et al. Tamper Resistant Software: An Implementation , 1996, Information Hiding.
[20] Jean-Luc Dugelay,et al. Image watermarking based on the fractal transform: a draft demonstration , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[21] Ralf Steinmetz,et al. Multimedia and Security Workshop at ACM Multimedia , 1998 .
[22] Virgil D. Gligor,et al. A guide to understanding covert channel analysis of trusted systems , 1993 .
[23] Jean-Paul M. G. Linnartz,et al. Public watermarks and resistance to tampering , 1997, Proceedings of International Conference on Image Processing.
[24] D. Schilling. Meteor burst communications : theory and practice , 1993 .
[25] Bin Zhu,et al. Robust data hiding for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.
[26] M. Kutter. Watermaking resisting to translation, rotation, and scaling , 1998 .
[27] John P. Oakley,et al. Storage and Retrieval for Image and Video Databases , 1993 .
[28] Deepa Kundur,et al. A robust digital image watermarking method using wavelet-based fusion , 1997, Proceedings of International Conference on Image Processing.
[29] L Rudolf,et al. Optical Security and Counterfeit Deterrence Techniques III , 1996 .
[30] David Whitehead,et al. How to survive under siege , 1990 .
[31] Robert J. Safranek,et al. Signal compression based on models of human perception , 1993, Proc. IEEE.
[32] Sushil Jajodia,et al. Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.
[33] Charalampos Manifavas,et al. Chameleon - A New Kind of Stream Cipher , 1997, FSE.
[34] Serge Vaudenay,et al. The Newton Channel , 1996, Information Hiding.
[35] Boon-Lock Yeo,et al. Technical trials and legal tribulations , 1998, CACM.
[36] Guy William Willis Stevens,et al. Microphotography: Photography and Photofabrication at Extreme Resolution , 1968 .
[37] Jean-Paul M. G. Linnartz,et al. Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.
[38] Ingemar J. Cox,et al. Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[39] Frank Boland,et al. Watermarking digital images for copyright protection , 1995 .
[40] Richard C. Benson,et al. Technology approaches to currency security , 1998, Electronic Imaging.
[41] D. Kahn. The codebreakers : the story of secret writing , 1968 .
[42] Ennio Ottaviani,et al. Non-invertible statistical wavelet watermarking , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[43] Edward J. Delp,et al. A WATERMARKING TECHNIQUE FOR DIGITAL IMAGERY: FURTHER STUDIES , 2001 .
[44] Deepa Kundur,et al. Digital watermarking using multiresolution wavelet decomposition , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[45] R. A. Willard,et al. ICE (Identification Coding, Embedded) , 1993 .
[46] Ahmed H. Tewfik,et al. Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).
[47] Ting Chen,et al. Time-scale modification of audio signals with combined harmonic and wavelet representations , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[48] Jean-Jacques Quisquater,et al. Cryptology for digital TV broadcasting , 1995, Proc. IEEE.
[49] Awj Werner Oomen,et al. A Variable-Bit-Rate Buried-Data Channel for Compact Disc , 1995 .
[50] Thierry Pun,et al. Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..
[51] Michael G. Strintzis,et al. Robust image watermarking in the subband or discrete cosine transform domain , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[52] Jean-Paul M. G. Linnartz. The "Ticket" Concept for Copy Control Based on Embedded Signalling , 1998, ESORICS.
[53] Scott Craver,et al. On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.
[54] Jim Reeds. Solved: the Ciphers in Book III of Trithemius's Steganographia , 1998, Cryptologia.
[55] Edward J. Delp,et al. Perceptual watermarks for digital images and video : Identification and protection of multimedia information , 1999 .
[56] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[57] Gustavus J. Simmons,et al. Subliminal channels; past and present , 2010, Eur. Trans. Telecommun..
[58] Gustavus J. Simmons,et al. Contemporary Cryptology: The Science of Information Integrity , 1994 .
[59] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[60] R. L. Fountain,et al. The fingerprinted database , 1990, [1990] Proceedings. Sixth International Conference on Data Engineering.
[61] I.J. Cox,et al. Watermarking in the real world: an application to DVD , 1999, Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers (Cat. No.CH37020).
[62] Hannes Federrath,et al. Modeling the Security of Steganographic Systems , 1998, Information Hiding.
[63] Rudolf L. van Renesse. Security design of valuable documents and products , 1996 .
[64] B. Moore. An introduction to the psychology of hearing (5th ed.). , 1989 .
[65] Martin Kutter,et al. Watermarking resistance to translation, rotation, and scaling , 1999, Other Conferences.
[66] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[67] Neil A. Dodgson,et al. Quadratic interpolation for image resampling , 1997, IEEE Trans. Image Process..
[68] Walter Bender,et al. Echo Hiding , 1996, Information Hiding.
[69] J. Wilkins. Mercury or The Secret and Swift Messenger , 1984 .
[70] Ross J. Anderson. Liability and Computer Security: Nine Principles , 1994, ESORICS.
[71] Ingemar J. Cox,et al. A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.
[72] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[73] Dick van Lingen. The new Dutch passport , 1996 .
[74] D. Brewster,et al. On microscopic vision and a new form of microscope , 1860 .
[75] Gustavus J. Simmons,et al. The history of subliminal channels , 1996, IEEE J. Sel. Areas Commun..
[76] Ian M. Lancaster,et al. Progress in counterfeit deterrence: the contribution of information exchange , 1996, Electronic Imaging.
[77] Bernice E. Rogowitz,et al. Human Vision and Electronic Imaging II , 1997 .
[78] Bernard Newman,et al. Secrets of German espionage , 1940 .
[79] E. Owens. Introduction to the Psychology of Hearing , 1977 .
[80] Wenjun Zeng,et al. Digital image watermarking using visual models , 1997, Electronic Imaging.
[81] Jurgis Baltrušaitis,et al. Anamorphoses ou thaumaturgus opticus , 1984 .
[82] van EckWim. Electromagnetic radiation from video display units: an eavesdropping risk? , 1985 .
[83] Mauro Barni,et al. A DCT-domain system for robust image watermarking , 1998, Signal Process..
[84] Bo Rudin,et al. Making Paper: A Look into the History of an Ancient Craft , 1990 .
[85] Ross Anderson,et al. Information hiding terminology , 1996 .
[86] Bernd Girod,et al. Watermarking of uncompressed and compressed video , 1998, Signal Process..
[87] Reginald L. Lagendijk,et al. Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[88] M. Yeung,et al. Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.
[89] Christophe De Vleeschouwer,et al. Low-cost perceptive digital picture watermarking method , 1997, Electronic Imaging.
[90] Edward J. Delp,et al. A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[91] Ingo Stierand,et al. Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best , 1996, Information Hiding.
[92] Ahmed H. Tewfik,et al. Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[93] Edward J. Delp,et al. Perceptual watermarks for digital images and video , 1999, Electronic Imaging.
[94] Edward J. Delp,et al. Perceptual watermarks for digital images and video , 1999 .
[95] Josh Benaloh. Verifiable secret-ballot elections , 1987 .
[96] B. P. Bogert,et al. The quefrency analysis of time series for echoes : cepstrum, pseudo-autocovariance, cross-cepstrum and saphe cracking , 1963 .
[97] Eli Biham. Fast software encryption : 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997 : proceedings , 1997, FSE 1997.
[98] R. Schafer. Echo removal by discrete generalized linear filtering. , 1969 .
[99] Ross J. Anderson. Why cryptosystems fail , 1994, CACM.
[100] Eckhard Koch,et al. Towards Robust and Hidden Image Copyright Labeling , 1995 .
[101] Gaston Tissandier,et al. Les Merveilles de la photographie , 2022 .
[102] Rudolf L. van Renesse,et al. Verifying versus falsifying banknotes , 1998 .
[103] Reginald L. Lagendijk,et al. Robust labeling methods for copy protection of images , 1997, Electronic Imaging.
[104] Ioannis Pitas,et al. A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[105] Jessica J. Fridrich,et al. Comparing robustness of watermarking techniques , 1999, Electronic Imaging.
[106] Fabien A. P. Petitcolas,et al. Fair benchmark for image watermarking systems , 1999, Electronic Imaging.
[107] Joshua R. Smith,et al. Modulation and Information Hiding in Images , 1996, Information Hiding.
[108] Gordon W. Braudaway,et al. Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.
[109] Gustavus J. Simmons,et al. Results concerning the bandwidth of subliminal channels , 1998, IEEE J. Sel. Areas Commun..
[110] J. D. Brongers. Search for effective document security by inventioneering , 1998, Electronic Imaging.
[111] Bernd Girod,et al. Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.
[112] Bernd Girod,et al. Watermarking of MPEG-2 encoded video without decoding and reencoding , 1997, Electronic Imaging.
[113] Friedrich L. Bauer,et al. Decrypted secrets - methods and maxims of cryptology , 1997 .
[114] Wim van Eck,et al. Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..
[115] Walter Bender,et al. Information Hiding to Foil the Casual Counterfeiter , 1998, Information Hiding.
[116] Gordon W. Braudaway,et al. Results of attacks on a claimed robust digital image watermark , 1998, Electronic Imaging.
[117] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[118] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[119] L. B. Milstein,et al. Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.
[120] Markus G. Kuhn,et al. Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations , 1998, Information Hiding.
[121] I. S. Moskowitz,et al. Covert channels-here to stay? , 1994, Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance.