Robust audio watermarking using perceptual masking

[1]  M. Yeung,et al.  Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications , 1998, IEEE J. Sel. Areas Commun..

[2]  Ahmed H. Tewfik,et al.  Multiresolution scene-based video watermarking using perceptual models , 1998, IEEE J. Sel. Areas Commun..

[3]  John F. Tilki Encoding a Hidden Digital Signature onto an Audio Signal Using Psychoacoustic Masking , 1998 .

[4]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[5]  Ahmed H. Tewfik,et al.  Multiresolution video watermarking using perceptual models and scene segmentation , 1997, Proceedings of International Conference on Image Processing.

[6]  M. Yeung,et al.  Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.

[7]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[8]  Francis M. Boland,et al.  Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[9]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[10]  Bernd Girod,et al.  Digital watermarking of raw and compressed video , 1996, Other Conferences.

[11]  Ioannis Pitas,et al.  A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[12]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[13]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[14]  P. Noll,et al.  Wideband speech and audio coding , 1993, IEEE Communications Magazine.

[15]  Ronald L. Rivest,et al.  The MD4 Message-Digest Algorithm , 1990, RFC.

[16]  Ronald L. Rivest,et al.  Cryptography , 1990, Handbook of Theoretical Computer Science, Volume A: Algorithms and Complexity.

[17]  Carl A. Gunter,et al.  In handbook of theoretical computer science , 1990 .

[18]  A. Gualtierotti H. L. Van Trees, Detection, Estimation, and Modulation Theory, , 1976 .