Vulnerabilities of Multimedia Protection Schemes

[1]  Mohamed F. Mansour,et al.  Secure detection of public watermarks with fractal decision boundaries , 2002, 2002 11th European Signal Processing Conference.

[2]  Pierre Duhamel,et al.  Unified approach of asymmetric watermarking schemes , 2001, IS&T/SPIE Electronic Imaging.

[3]  Mohamed F. Mansour,et al.  Techniques for data embedding in image using wavelet extrema , 2001, IS&T/SPIE Electronic Imaging.

[4]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[5]  Mohamed F. Mansour,et al.  Robust high capacity data embedding , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[6]  T. Furon,et al.  Robustness of asymmetric watermarking technique , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[7]  Fernando Pérez-González,et al.  DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..

[8]  Gregory W. Wornell,et al.  Dither modulation: a new approach to digital watermarking and information embedding , 1999, Electronic Imaging.

[9]  Jean-Paul M. G. Linnartz,et al.  Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[10]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.

[11]  Ahmed H. Tewfik,et al.  Data hiding for video-in-video , 1997, Proceedings of International Conference on Image Processing.

[12]  Jean-Paul M. G. Linnartz,et al.  Public watermarks and resistance to tampering , 1997, Proceedings of International Conference on Image Processing.