Information Hiding Codes and Their Applications to Images and Audio

[1]  G.W. Wornell,et al.  An information-theoretic approach to the design of robust digital watermarking systems , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[2]  Prakash Narayan,et al.  Reliable Communication Under Channel Uncertainty , 1998, IEEE Trans. Inf. Theory.

[3]  Brendan J. Frey,et al.  Factor graphs and the sum-product algorithm , 2001, IEEE Trans. Inf. Theory.

[4]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[5]  Robert M. Gray,et al.  On the asymptotic eigenvalue distribution of Toeplitz matrices , 1972, IEEE Trans. Inf. Theory.

[6]  Anil K. Jain Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.

[7]  Claude E. Shannon,et al.  The Mathematical Theory of Communication , 1950 .

[8]  Henrique S. Malvar A modulated complex lapped transform and its applications to audio processing , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[9]  Ingrid Daubechies,et al.  Ten Lectures on Wavelets , 1992 .

[10]  Kannan Ramchandran,et al.  Capacity issues in digital image watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[11]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[12]  Michael W. Marcellin,et al.  Comparison of different methods of classification in subband coding of images , 1997, IEEE Trans. Image Process..

[13]  J.A. O'Sullivan,et al.  Information theoretic analysis of steganography , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[14]  Michael T. Orchard,et al.  Image coding based on mixture modeling of wavelet coefficients and a fast estimation-quantization framework , 1997, Proceedings DCC '97. Data Compression Conference.

[15]  Pierre Moulin,et al.  A framework for evaluating the data-hiding capacity of image sources , 2002, IEEE Trans. Image Process..

[16]  Ton Kalker,et al.  Efficient detection of a spatial spread-spectrum watermark in MPEG video streams , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[17]  Robert M. Gray,et al.  Dithered quantizers , 1993, IEEE Trans. Inf. Theory.

[18]  N. Kingsbury Complex Wavelets for Shift Invariant Analysis and Filtering of Signals , 2001 .

[19]  Seymour Shlien,et al.  The modulated lapped transform, its time-varying forms, and its applications to audio coding standards , 1997, IEEE Trans. Speech Audio Process..

[20]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[21]  Bernd Girod,et al.  Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..

[22]  Lawrence G. Roberts,et al.  Picture coding using pseudo-random noise , 1962, IRE Trans. Inf. Theory.

[23]  Ahmed H. Tewfik,et al.  Object-based transparent video watermarking , 1997, Proceedings of First Signal Processing Society Workshop on Multimedia Signal Processing.

[24]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[25]  Joan L. Mitchell,et al.  JPEG: Still Image Data Compression Standard , 1992 .

[26]  Mauro Barni,et al.  Capacity of the watermark channel: how many bits can be hidden within a digital image? , 1999, Electronic Imaging.

[27]  Ross J. Anderson,et al.  Evaluation of copyright marking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[28]  Martin Vetterli,et al.  Rate-distortion analysis of spike processes , 1999, Proceedings DCC'99 Data Compression Conference (Cat. No. PR00096).

[29]  S. Shamai,et al.  Nested linear/lattice codes for Wyner-Ziv encoding , 1998, 1998 Information Theory Workshop (Cat. No.98EX131).

[30]  Neri Merhav On random coding error exponents of watermarking systems , 2000, IEEE Trans. Inf. Theory.

[31]  Robert J. Safranek,et al.  Signal compression based on models of human perception , 1993, Proc. IEEE.

[32]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[33]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999 .

[34]  Ingemar J. Cox,et al.  Watermarking applications and their properties , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[35]  David G. Luenberger,et al.  Linear and nonlinear programming , 1984 .

[36]  Kannan Ramchandran,et al.  Low-complexity image denoising based on statistical modeling of wavelet coefficients , 1999, IEEE Signal Processing Letters.

[37]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[38]  Antonio Ortega,et al.  Rate-distortion methods for image and video compression , 1998, IEEE Signal Process. Mag..

[39]  Amos Lapidoth,et al.  The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.

[40]  Gregory W. Wornell,et al.  The duality between information embedding and source coding with side information and some applications , 2003, IEEE Trans. Inf. Theory.

[41]  R. Blahut Theory and practice of error control codes , 1983 .

[42]  Henrique S. Malvar,et al.  Signal processing with lapped transforms , 1992 .

[43]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[44]  N. Jayant,et al.  Digital Coding of Waveforms: Principles and Applications to Speech and Video , 1990 .

[45]  U. Grenander,et al.  Toeplitz Forms And Their Applications , 1958 .

[46]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[47]  Ali N. Akansu,et al.  Information theoretic bounds for data hiding in compressed images , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[48]  Gregory W. Wornell,et al.  Preprocessed and postprocessed quantization index modulation methods for digital watermarking , 2000, Electronic Imaging.

[49]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.

[50]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[51]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[52]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[53]  Tamer Basar,et al.  With the Capacity 0.461(bits) and the Optimal Opd Being 'q = , 1998 .

[54]  E. Aiyoshi,et al.  Necessary conditions for min-max problems and algorithms by a relaxation procedure , 1980 .

[55]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[56]  N. J. A. Sloane,et al.  Sphere Packings, Lattices and Groups , 1987, Grundlehren der mathematischen Wissenschaften.

[57]  Ralf Steinmetz,et al.  Robust MPEG video watermarking technologies , 1998, MULTIMEDIA '98.