Digital Watermarking and Steganography
暂无分享,去创建一个
Ingemar J. Cox | Ton Kalker | Jeffrey A. Bloom | Matthew L. Miller | Jessica Fridrich | I. Cox | T. Kalker | J. Fridrich | J. Bloom
[1] F. MacWilliams,et al. Pseudo-random sequences and arrays , 1976, Proceedings of the IEEE.
[2] Dogan Kesdogan,et al. Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System , 1998, Information Hiding.
[3] Benoit M. Macq,et al. Robust watermarking based on the warping of predefined triangular patterns , 2000, Electronic Imaging.
[4] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[5] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[6] Ton Kalker,et al. Adaptive quantization watermarking , 2004, IS&T/SPIE Electronic Imaging.
[7] Ahmed H. Tewfik,et al. Robust audio watermarking using perceptual masking , 1998, Signal Process..
[8] Cornelius W. A. M. van Overveld,et al. Digital watermarking by geometric warping , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[9] Jessica J. Fridrich,et al. Efficient Wet Paper Codes , 2005, Information Hiding.
[10] Fabien A. P. Petitcolas,et al. Fair benchmark for image watermarking systems , 1999, Electronic Imaging.
[11] Richard D. Gitlin,et al. Data Communications Principles , 2012 .
[12] C. Fontaine,et al. Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.
[13] Jessica J. Fridrich,et al. New blind steganalysis and its implications , 2006, Electronic Imaging.
[14] Yvo Desmedt,et al. SUBLIMINAL-FREE AUTHENTICATION AND SIGNATURE , 1988 .
[15] Jeffrey A. Bloom,et al. Computing the Probability of False Watermark Detection , 1999, Information Hiding.
[16] Thierry Pun,et al. Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..
[17] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[18] Michael Backes,et al. Public-Key Steganography with Active Attacks , 2005, TCC.
[19] Mark Ettinger,et al. Steganalysis and Game Equilibria , 1998, Information Hiding.
[20] Hideki Noda,et al. Application of QIM with dead zone for histogram preserving JPEG steganography , 2005, IEEE International Conference on Image Processing 2005.
[21] A. E. Bell. The dynamic digital disk , 1999 .
[22] Ingemar J. Cox,et al. Trellis coded modulation to improve dirty paper trellis watermarking , 2007, Electronic Imaging.
[23] Gottfried Ungerboeck,et al. Channel coding with multilevel/phase signals , 1982, IEEE Trans. Inf. Theory.
[24] Deepa Kundur,et al. Blind image deconvolution , 1996, IEEE Signal Process. Mag..
[25] Jean-Paul M. G. Linnartz,et al. Improved watermark detection reliability using filtering before correlation , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[26] Arno J. van Leest,et al. High capacity reversible watermarking for audio , 2003, IS&T/SPIE Electronic Imaging.
[27] B. S. Manjunath,et al. Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration , 2006, 2006 International Conference on Image Processing.
[28] Mohan S. Kankanhalli,et al. A DCT domain visible watermarking technique for images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).
[29] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[30] Andrew B. Watson,et al. DCT quantization matrices visually optimized for individual images , 1993, Electronic Imaging.
[31] Josep Vidal,et al. Optimum watermark detection in color images , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[32] Min Wu,et al. Data hiding in digital binary image , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).
[33] Shih-Kun Huang,et al. Cocktail Watermarking on Images , 1999, Information Hiding.
[34] Ingemar J. Cox,et al. Watermarking as communications with side information , 1999, Proc. IEEE.
[35] Feng Lin,et al. Towards absolute invariants of images under translation, rotation, and dilation , 1993, Pattern Recognit. Lett..
[36] Shen-Ge Wang,et al. Embedding digital watermarks in halftone screens , 2000, Electronic Imaging.
[37] Adnan M. Alattar,et al. Reversible watermark using difference expansion of quads , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[38] Chengyun Yang,et al. Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets , 2006, IWDW.
[39] Ton Kalker,et al. A Highly Robust Audio Fingerprinting System , 2002, ISMIR.
[40] C. Helstrom,et al. Statistical theory of signal detection , 1968 .
[41] Min Wu,et al. Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[42] Carl-Erik W. Sundberg,et al. Digital audio broadcasting in the FM band by means of contiguous band insertion and precanceling techniques , 2000, IEEE Trans. Commun..
[43] Max H. M. Costa,et al. Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.
[44] Teddy Furon,et al. A theoretical study of watermarking security , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[45] L. Schuchman. Dither Signals and Their Effect on Quantization Noise , 1964 .
[46] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[47] Peter Wayner,et al. Mimic Functions , 1992, Cryptologia.
[48] Shih-Fu Chang,et al. Distortion Modeling and Invariant Extraction for Digital Image Print-and-Scan Process , 2000 .
[49] Gordon W. Braudaway,et al. Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.
[50] K A Birney,et al. On the modeling of DCT and subband image data for compression , 1995, IEEE Trans. Image Process..
[51] Jean Laroche,et al. Improved phase vocoder time-scale modification of audio , 1999, IEEE Trans. Speech Audio Process..
[52] Hideyoshi Tominaga,et al. A proposal on digital watermark in document image communication and its application to realizing a signature , 1990 .
[53] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[54] Hiroshi Masuda,et al. Watermarking three-dimensional polygonal models through geometric and topological modifications , 1998, IEEE J. Sel. Areas Commun..
[55] Klara Nahrstedt,et al. Noninvertible watermarking methods for MPEG-encoded audio , 1998, Electronic Imaging.
[56] John D. Villasenor,et al. Visual thresholds for wavelet quantization error , 1996, Electronic Imaging.
[57] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[58] Gary Friedman,et al. The trustworthy digital camera: restoring credibility to the photographic image , 1993 .
[59] Miodrag Potkonjak,et al. Fingerprinting Digital Circuits on Programmable Hardware , 1998, Information Hiding.
[60] Min Wu,et al. Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..
[61] Shih-Fu Chang,et al. Issues and solutions for authenticating MPEG video , 1999, Electronic Imaging.
[62] Mark Dolson,et al. The Phase Vocoder: A Tutorial , 1986 .
[63] Christophe De Vleeschouwer,et al. Watermarking algorithm based on a human visual model , 1998, Signal Process..
[64] Jessica J. Fridrich,et al. Forensic steganalysis: determining the stego key in spatial domain steganography , 2005, IS&T/SPIE Electronic Imaging.
[65] H H Arsenault,et al. Rotation-invariant digital pattern recognition using circular harmonic expansion. , 1982, Applied optics.
[66] Andrew Z. Tirkel,et al. Image and watermark registration , 1998, Signal Process..
[67] Jiri Fridrich,et al. Steganalysis of LSB encoding in color images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).
[68] Jean-Paul M. G. Linnartz,et al. MPEG PTY-Marks: Cheap Detection of Embedded Copyright Data in DVD-Video , 1998, ESORICS.
[69] Bin Zhu,et al. Media compression via data hiding , 1997, Conference Record of the Thirty-First Asilomar Conference on Signals, Systems and Computers (Cat. No.97CB36136).
[70] Aaron D. Wyner,et al. The rate-distortion function for source coding with side information at the decoder , 1976, IEEE Trans. Inf. Theory.
[71] Francis M. Boland,et al. Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[72] C. Britton Rorabaugh. Error Coding Cookbook: Practical C/C++ Routines and Recipes for Error Detection and Correction , 1996 .
[73] Shih-Fu Chang,et al. Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.
[74] Ahmed H. Tewfik,et al. Data hiding for video-in-video , 1997, Proceedings of International Conference on Image Processing.
[75] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[76] Mikhail J. Atallah,et al. A hierarchical protocol for increasing the stealthiness of steganographic methods , 2004, MM&Sec '04.
[77] Abbas El Gamal,et al. On the capacity of computer memory with defects , 1983, IEEE Trans. Inf. Theory.
[78] Alain Glavieux,et al. Reflections on the Prize Paper : "Near optimum error-correcting coding and decoding: turbo codes" , 1998 .
[79] Ingemar J. Cox,et al. Dirty-paper trellis codes for watermarking , 2002, Proceedings. International Conference on Image Processing.
[80] A. Viterbi. CDMA: Principles of Spread Spectrum Communication , 1995 .
[81] Glenn Healey,et al. Radiometric CCD camera calibration and noise estimation , 1994, IEEE Trans. Pattern Anal. Mach. Intell..
[82] Bernd Girod,et al. Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.
[83] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[84] Ahmed H. Tewfik,et al. Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).
[85] Jeffrey B. Lotspiech,et al. Safeguarding Digital Library Contents and Users: Digital Watermarking , 1997, D Lib Mag..
[86] R. D. Gibson. Theory and problems of heat transfer, (schaum's outline series): McGraw-Hill, New York (1978) , 1979 .
[87] Sorina Dumitrescu,et al. LSB steganalysis based on high-order statistics , 2005, MM&Sec '05.
[88] D. Hatzinakos,et al. Semi-blind image restoration based on telltale watermarking , 1998, Conference Record of Thirty-Second Asilomar Conference on Signals, Systems and Computers (Cat. No.98CH36284).
[89] Jessica J. Fridrich,et al. Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..
[90] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[91] J. Chou,et al. On the duality between distributed source coding and data hiding , 1999, Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers (Cat. No.CH37020).
[92] Jessica J. Fridrich,et al. Distortion-Free Data Embedding for Images , 2001, Information Hiding.
[93] Imants D. Svalbe,et al. Key independent watermark detection , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[94] Ingemar J. Cox,et al. Information Transmission and Steganography , 2005, IWDW.
[95] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.
[96] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998 .
[97] Juergen Bierbrauer. Introduction to coding theory , 2005, Discrete mathematics and its applications.
[98] Ingemar J. Cox,et al. Applying informed coding and embedding to design a robust high-capacity watermark , 2004, IEEE Transactions on Image Processing.
[99] William Bialek,et al. Statistics of Natural Images: Scaling in the Woods , 1993, NIPS.
[100] Jr. Thomas G. Stockham,et al. Image processing in the context of a visual model , 1972 .
[101] Robert J. Safranek,et al. Signal compression based on models of human perception , 1993, Proc. IEEE.
[102] Ernest L. Hall,et al. A Nonlinear Model for the Spatial Characteristics of the Human Visual System , 1977, IEEE Transactions on Systems, Man, and Cybernetics.
[103] Sushil Jajodia,et al. Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.
[104] Ting Chen,et al. Time-scale modification of audio signals with combined harmonic and wavelet representations , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[105] Jaap A. Haitsma,et al. Robust Audio Hashing for Content Identification , 2001 .
[106] Gernot Kubin,et al. Speech watermarking for air traffic control , 2004, 2004 12th European Signal Processing Conference.
[107] Gábor Tardos,et al. Optimal probabilistic fingerprint codes , 2003, STOC '03.
[108] Boon-Lock Yeo,et al. Watermarking 3D Objects for Verification , 1999, IEEE Computer Graphics and Applications.
[109] Fernando Pérez-González,et al. Trellis-Coded Rational Dither Modulation for Digital Watermarking , 2005, IWDW.
[110] T. Furon,et al. Robustness of asymmetric watermarking technique , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[111] Joseph A. O'Sullivan,et al. Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.
[112] A. Murat Tekalp,et al. Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.
[113] A. Spanias,et al. Perceptual coding of digital audio , 2000, Proceedings of the IEEE.
[114] Christophe De Vleeschouwer,et al. Circular interpretation of bijective transformations in lossless watermarking for media asset management , 2003, IEEE Trans. Multim..
[115] Bernd Girod,et al. Watermarking of uncompressed and compressed video , 1998, Signal Process..
[116] Tao Zhang,et al. A new approach to reliable detection of LSB steganography in natural images , 2003, Signal Process..
[117] Edward J. Delp,et al. A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[118] Ton Kalker,et al. The VIVA project: digital watermarking for broadcast monitoring , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[119] R.L. Lagendijk,et al. Amplitude Scale Estimation for Quantization-Based Watermarking , 2006, IEEE Transactions on Signal Processing.
[120] Jessica J. Fridrich,et al. Quantitative steganalysis of digital images: estimating the secret message length , 2003, Multimedia Systems.
[121] Norka B. Lucena,et al. Syntax and Semantics-Preserving Application-Layer Protocol Steganography , 2004, Information Hiding.
[122] Ahmed H. Tewfik,et al. Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[123] Mahalingam Ramkumar. Data hiding in multimedia - theory and applications , 1999 .
[124] Ioannis Pitas,et al. Watermarking polygonal lines using Fourier descriptors , 2000, IEEE Computer Graphics and Applications.
[125] Andrew D. Ker. Resampling and the detection of LSB matching in color bitmaps , 2005, IS&T/SPIE Electronic Imaging.
[126] Allan Borodin,et al. Lower bounds for high dimensional nearest neighbor search and related problems , 1999, STOC '99.
[127] Gabriela Csurka,et al. Template based recovery of Fourier-based watermarks using log-polar and log-log maps , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[128] Jean-Luc Dugelay,et al. Possible counter-attacks against random geometric distortions , 2000, Electronic Imaging.
[129] D. M. Green,et al. Signal detection theory and psychophysics , 1966 .
[130] Edward J. Delp,et al. Perceptual watermarks for digital images and video , 1999 .
[131] Ilkka Tuomi. Inventing the Web , 2006 .
[132] H. Arsenault,et al. Experiments on pattern recognition using invariant Fourier-Mellin descriptors. , 1986, Journal of the Optical Society of America. A, Optics and image science.
[133] Kannan Ramchandran,et al. Low-complexity image denoising based on statistical modeling of wavelet coefficients , 1999, IEEE Signal Processing Letters.
[134] Cheng Yang,et al. Music Database Retrieval Based on Spectral Similarity , 2001 .
[135] Toby Sharp,et al. An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.
[136] Ronen Basri,et al. Recognition by Linear Combinations of Models , 1991, IEEE Trans. Pattern Anal. Mach. Intell..
[137] Thierry Pun,et al. Robust template matching for affine resistant image watermarks , 2000, IEEE Trans. Image Process..
[138] John Stach,et al. A high-capacity invertible data-hiding algorithm using a generalized reversible integer transform , 2004, IS&T/SPIE Electronic Imaging.
[139] Eero P. Simoncelli. Statistical models for images: compression, restoration and synthesis , 1997, Conference Record of the Thirty-First Asilomar Conference on Signals, Systems and Computers (Cat. No.97CB36136).
[140] Niels Provos,et al. Detecting Steganographic Content on the Internet , 2002, NDSS.
[141] En-Hui Yang,et al. On Information Embedding When Watermarks and Covertexts Are Correlated , 2006, ISIT.
[142] Jean-François Delaigle,et al. Improving data hiding by using convolutional codes and soft-decision decoding , 2000, Electronic Imaging.
[143] F. Harris. On the use of windows for harmonic analysis with the discrete Fourier transform , 1978, Proceedings of the IEEE.
[144] H.-J. Braun,et al. Advanced weaponry of the Stars , 1997 .
[145] Takeo Kanade,et al. An Iterative Image Registration Technique with an Application to Stereo Vision , 1981, IJCAI.
[146] Bernd Girod,et al. Quantization effects on digital watermarks , 2001, Signal Process..
[147] Fernando Pérez-González,et al. DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..
[148] Ahmed H. Tewfik,et al. Geometric distortion correction through image normalization , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).
[149] Ralf Steinmetz,et al. New approach for transformation-invariant image and video watermarking in the spatial domain: self-spanning patterns (SSP) , 2000, Electronic Imaging.
[150] Andrew D. Ker. Quantitative evaluation of pairs and RS steganalysis , 2004, IS&T/SPIE Electronic Imaging.
[151] Thierry Pun,et al. Secure robust digital watermarking using the lapped orthogonal transform , 1999, Electronic Imaging.
[152] Heidi A. Peterson,et al. Luminance-model-based DCT quantization for color image compression , 1992, Electronic Imaging.
[153] Jaejin Lee,et al. Image integrity and correction using parities of error control coding , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).
[154] William A. Pearlman,et al. Capacity of Steganographic Channels , 2005, IEEE Transactions on Information Theory.
[155] Martin Kutter. Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation , 1999, Information Hiding.
[156] Gregory W. Wornell,et al. Preprocessed and postprocessed quantization index modulation methods for digital watermarking , 2000, Electronic Imaging.
[157] Jean-Jacques Quisquater,et al. Robust Object Watermarking: Application to Code , 1999, Information Hiding.
[158] M. Kutter. Watermaking resisting to translation, rotation, and scaling , 1998 .
[159] B. S. Manjunath,et al. Steganalysis for Markov cover data with applications to images , 2006, IEEE Transactions on Information Forensics and Security.
[160] Anastasios Tefas,et al. Multi-bit image watermarking robust to geometric distortions , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[161] Aníbal J. S. Ferreira. An odd-DFT based approach to time-scale expansion of audio signals , 1999, IEEE Trans. Speech Audio Process..
[162] Guy William Willis Stevens,et al. Microphotography: Photography and Photofabrication at Extreme Resolution , 1968 .
[163] D J Field,et al. Relations between the statistics of natural images and the response properties of cortical cells. , 1987, Journal of the Optical Society of America. A, Optics and image science.
[164] Jean-Paul M. G. Linnartz,et al. Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.
[165] B. S. Manjunath,et al. Detection of hiding in the least significant bit , 2004, IEEE Transactions on Signal Processing.
[166] Gregory A. Kabatiansky,et al. Information hiding by coverings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[167] L. B. Milstein,et al. Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.
[168] S. Decker. Engineering considerations in commercial watermarking , 2001 .
[169] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[170] Andrew D. Ker. Optimally weighted least-squares steganalysis , 2007, Electronic Imaging.
[171] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[172] Tina Lindkvist,et al. Fingerprinting of digital documents , 1999 .
[173] Ingemar J. Cox,et al. Copy protection for DVD video , 1999, Proc. IEEE.
[174] Wenjun Zeng,et al. Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..
[175] Pierre Moulin,et al. New results on steganographic capacity , 2004 .
[176] Hirofumi Muratani. A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience , 2001, Information Hiding.
[177] Helmut Neuschmied,et al. Content-based identification of audio titles on the Internet , 2001, Proceedings First International Conference on WEB Delivering of Music. WEDELMUSIC 2001.
[178] Michael T. Orchard,et al. Geometric properties of watermarking schemes , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[179] Sushil Jajodia,et al. Tracking anonymous peer-to-peer VoIP calls on the internet , 2005, CCS '05.
[180] Bernard Chazelle,et al. A lower bound on the complexity of approximate nearest-neighbor searching on the Hamming cube , 1999, STOC '99.
[181] Joyce E. Farrell,et al. Perceptual quality metric for digitally coded color images , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).
[182] Chengyun Yang,et al. Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions , 2005, Information Hiding.
[183] T. Tan,et al. On estimation of secret message length in JSteg-like steganography , 2004, ICPR 2004.
[184] Ingemar J. Cox,et al. Audio Fingerprinting: Nearest Neighbor Search in High Dimensional Binary Spaces , 2005, J. VLSI Signal Process..
[185] Shih-Fu Chang,et al. Embedding visible video watermarks in the compressed domain , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[186] Adnan M. Alattar,et al. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .
[187] G. Kubin,et al. Safety and security increase for air traffic management through unnoticeable watermark aircraft identification tag transmitted with the VHF voice communication , 2003, Digital Avionics Systems Conference, 2003. DASC '03. The 22nd.
[188] R. Bracewell. The Fourier Transform and Its Applications , 1966 .
[189] Jang-Ping Sheu,et al. Mean quantization blind watermarking for image authentication , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[190] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[191] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[192] Jean-Luc Dugelay,et al. Blind detection of malicious alterations on still images using robust watermarks , 2000 .
[193] D. Casasent,et al. Position, rotation, and scale invariant optical correlation. , 1976, Applied optics.
[194] Lawrence O'Gorman,et al. Electronic Marking and Identification Techniques to Discourage Document Copying , 1995, IEEE J. Sel. Areas Commun..
[195] Bernd Girod,et al. Watermark Detection after Quanization Attacks , 1999, Information Hiding.
[196] Harold S. Stone,et al. Progressive wavelet correlation using Fourier methods , 1999, IEEE Trans. Signal Process..
[197] Khalid Sayood,et al. Introduction to Data Compression , 1996 .
[198] Takehiro Moriya,et al. Digital watermarking schemes based on vector quantization , 1997, 1997 IEEE Workshop on Speech Coding for Telecommunications Proceedings. Back to Basics: Attacking Fundamental Problems in Speech Coding.
[199] Bernd Girod,et al. Power-spectrum condition for energy-efficient watermarking , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[200] Ricardo A. Garcia,et al. Digital Watermarking of Audio Signals Using a Psychoacoustic Auditory Model and Spread Spectrum Theory , 1999 .
[201] Xiangyang Luo,et al. An Improved Sample Pairs Method for Detection of LSB Embedding , 2004, Information Hiding.
[202] J. Le Moigne,et al. Towards a parallel registration of multiple resolution remote sensing data , 1995 .
[203] Julien P. Stern,et al. An Analysis of One of the SDMI Candidates , 2001, Information Hiding.
[204] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[205] Scott J. Daly,et al. Visible differences predictor: an algorithm for the assessment of image fidelity , 1992, Electronic Imaging.
[206] F. Campbell,et al. The effect of orientation on the visual resolution of gratings , 1966, The Journal of physiology.
[207] Jessica J. Fridrich,et al. Perturbed quantization steganography , 2005, Multimedia Systems.
[208] Gustavus J. Simmons,et al. The history of subliminal channels , 1996, IEEE J. Sel. Areas Commun..
[209] Jessica J. Fridrich,et al. On estimation of secret message length in LSB steganography in spatial domain , 2004, IS&T/SPIE Electronic Imaging.
[210] Fernando Pérez-González,et al. Statistical analysis of watermarking schemes for copyright protection of images , 1999, Proc. IEEE.
[211] Miodrag Potkonjak,et al. Robust IP watermarking methodologies for physical design , 1998, Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175).
[212] Maxim Sidorov,et al. Hidden Markov models and steganalysis , 2004, MM&Sec '04.
[213] Ja-Ling Wu,et al. Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..
[214] Ton Kalker,et al. Analysis of watermark detection using SPOMF , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[215] Deepa Kundur,et al. Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.
[216] Rainer Böhme,et al. A two-factor error model for quantitative steganalysis , 2006, Electronic Imaging.
[217] C.-C. Jay Kuo,et al. Robust and efficient digital audio watermarking using audio content analysis , 2000, Electronic Imaging.
[218] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[219] Henk J. A. M. Heijmans,et al. Reversible Data Embedding Based on the Haar Wavelet Decomposition , 2003, DICTA.
[220] F. Muller. Distribution shape of two-dimensional DCT coefficients of natural images , 1993 .
[221] Andrew D. Ker. Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.
[222] Jan Biemond,et al. Image and Video Databases: Restoration, Watermarking and Retrieval , 2000 .
[223] Changsheng Xu,et al. Audio registration and its application in digital watermarking , 2000, Electronic Imaging.
[224] Oliver Benedens,et al. Geometry-Based Watermarking of 3D Models , 1999, IEEE Computer Graphics and Applications.
[225] Bernd Girod,et al. Public key watermarking by eigenvectors of linear transforms , 2000, 2000 10th European Signal Processing Conference.
[226] D. Jacobs. Grouping for Recognition , 1989 .
[227] Nasir D. Memon,et al. On steganalysis of random LSB embedding in continuous-tone images , 2002, Proceedings. International Conference on Image Processing.
[228] Ernst Terhardt,et al. Calculating virtual pitch , 1979, Hearing Research.
[229] Miroslav Goljan,et al. Steganalysis based on JPEG compatibility , 2001, SPIE ITCom.
[230] Ingemar J. Cox,et al. Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.
[231] Henry M. Gladney,et al. Safeguarding Digital Library Contents and Users: Digital Images of Treasured Antiquities , 1997, D Lib Mag..
[232] Paul A. Viola,et al. Alignment by Maximization of Mutual Information , 1997, International Journal of Computer Vision.
[233] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[234] Nicholas Hopper,et al. Public-Key Steganography , 2003, EUROCRYPT.
[235] Shlomo Shamai,et al. Nested linear/Lattice codes for structured multiterminal binning , 2002, IEEE Trans. Inf. Theory.
[236] Kyung-Ae Moon,et al. EM Estimation of Scale Factor for Quantization-Based Audio Watermarking , 2003, IWDW.
[237] Bernd Girod,et al. On the robustness and imperceptibility of digital fingerprints , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[238] Thierry Pun,et al. Effective channel coding for DCT watermarks , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[239] Marten van Dijk,et al. Embedding Information in Grayscale Images , 2001 .
[240] Jeffrey J. Rodríguez,et al. Robust watermarking using robust coefficients , 2000, Electronic Imaging.
[241] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[242] Arno J. van Leest,et al. Reversible watermarking for images , 2004, IS&T/SPIE Electronic Imaging.
[243] Franck Davoine,et al. Geometrical and frequential watermarking scheme using similarities , 1999, Electronic Imaging.
[244] Benoit M. Macq,et al. Generalized 2-D cyclic patterns for secret watermark generation , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[245] Nasir D. Memon,et al. Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.
[246] Sushil K. Bhattacharjee,et al. Towards second generation watermarking schemes , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[247] Pierre Duhamel,et al. An Asymmetric Public Detection Watermarking Technique , 1999, Information Hiding.
[248] Ying Wang,et al. Steganalysis of block-structured stegotext , 2004, IS&T/SPIE Electronic Imaging.
[249] B. Widrow. Statistical analysis of amplitude-quantized sampled-data systems , 1961, Transactions of the American Institute of Electrical Engineers, Part II: Applications and Industry.
[250] Jean-Paul M. G. Linnartz,et al. Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks , 1998, Information Hiding.
[251] D. Kahn. The codebreakers : the story of secret writing , 1968 .
[252] Chris Honsinger. Data Embedding Using Phase Dispersion , 2000, PICS.
[253] Jessica J. Fridrich,et al. Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain , 2005, IS&T/SPIE Electronic Imaging.
[254] Warren D. Smith. Studies in computational geometry motivated by mesh generation , 1989 .
[255] Minerva M. Yeung,et al. Fragile imperceptible digital watermark with privacy control , 1999, Electronic Imaging.
[256] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[257] Steven H. Low,et al. Performance comparison of two text marking methods , 1998, IEEE J. Sel. Areas Commun..
[258] Sushil Jajodia,et al. Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).
[259] Wei Su,et al. Reversible data hiding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[260] N. Wiberg,et al. Random codes for digital fingerprinting , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[261] Ernest Hatch Wilkins. A History of Italian Literature , 1954 .
[262] Sorina Dumitrescu,et al. Detection of LSB Steganography via Sample Pair Analysis , 2002, Information Hiding.
[263] F. Campbell,et al. Orientational selectivity of the human visual system , 1966, The Journal of physiology.
[264] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[265] Ingemar J. Cox,et al. Watermarking Is Not Cryptography , 2006, IWDW.
[266] G.W. Wornell,et al. An information-theoretic approach to the design of robust digital watermarking systems , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).
[267] Lisa M. Brown,et al. A survey of image registration techniques , 1992, CSUR.
[268] Ira S. Moskowitz,et al. An Entropy-Based Framework for Database Inference , 1999, Information Hiding.
[269] J Duvernoy,et al. Circular-Fourier-radial-Mellin transform descriptors for pattern recognition. , 1986, Journal of the Optical Society of America. A, Optics and image science.
[270] Gabriela Csurka,et al. A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking , 1999, Information Hiding.
[271] Jean-Jacques Quisquater,et al. Cryptology for digital TV broadcasting , 1995, Proc. IEEE.
[272] Daniel Augot,et al. Secure delivery of images over open networks , 1999 .
[273] Qiao Li,et al. Using perceptual models to improve fidelity and provide invariance to valumetric scaling for quantization index modulation watermarking , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[274] Nasir D. Memon,et al. Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[275] N. J. A. Sloane,et al. Sphere Packings, Lattices and Groups , 1987, Grundlehren der mathematischen Wissenschaften.
[276] André Kaup,et al. Steganographic system based on higher-order statistics , 2003, IS&T/SPIE Electronic Imaging.
[277] D. Storck,et al. A New Approach to Integrity of Digital Images , 1996, IFIP World Conference on Mobile Communications.
[278] Ping Wah Wong,et al. A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[279] Jessica J. Fridrich,et al. Perturbed quantization steganography with wet paper codes , 2004, MM&Sec '04.
[280] Thierry Pun,et al. A Stochastic Approach to Content Adaptive Digital Image Watermarking , 1999, Information Hiding.
[281] Imants D. Svalbe,et al. Algebraic construction of a new class of quasi-orthogonal arrays for steganography , 1999, Electronic Imaging.
[282] Regunathan Radhakrishnan,et al. Data Masking: A New Approach for Steganography? , 2005, J. VLSI Signal Process..
[283] M. M. Taylor,et al. Visual discrimination and orientation. , 1963, Journal of the Optical Society of America.
[284] Aggelos Kiayias,et al. Efficient Steganography with Provable Security Guarantees , 2005, Information Hiding.
[285] Bernd Girod,et al. Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..
[286] M. Barni,et al. Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding , 2005, IEEE Transactions on Signal Processing.
[287] Bernd Girod,et al. Robustness of a blind image watermarking scheme , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[288] Claude E. Shannon,et al. Channels with Side Information at the Transmitter , 1958, IBM J. Res. Dev..
[289] Nasir D. Memon,et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..
[290] Jean-Paul M. G. Linnartz,et al. Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[291] Ton Kalker,et al. Feature Extraction and a Database Strategy for Video Fingerprinting , 2002, VISUAL.
[292] Sidney C. Port,et al. Probability, Random Variables, and Stochastic Processes—Second Edition (Athanasios Papoulis) , 1986 .
[293] Minerva M. Yeung,et al. An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.
[294] Ton Kalker,et al. Capacity bounds and constructions for reversible data-hiding , 2003, IS&T/SPIE Electronic Imaging.
[295] Scott Craver,et al. On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.
[296] H. C. Papadopoulos,et al. Simultaneous broadcasting of analog FM and digital audio signals by means of precanceling techniques , 1998, ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220).
[297] George Danezis,et al. Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..
[298] Martin J. Wainwright,et al. Scale Mixtures of Gaussians and the Statistics of Natural Images , 1999, NIPS.
[299] Jerry D. Gibson,et al. Distributions of the Two-Dimensional DCT Coefficients for Images , 1983, IEEE Trans. Commun..
[300] Peter M. J. Rongen,et al. Digital image watermarking by salient point modification: practical results , 1999, Electronic Imaging.
[301] D. H. Kelly. Visual response to time-dependent stimuli. I. Amplitude sensitivity measurements. , 1961, Journal of the Optical Society of America.
[302] Jessica J. Fridrich,et al. Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.
[303] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[304] Horst Hering,et al. Digital signatures for the analogue radio , 2005 .
[305] Oscar C. Au,et al. Data hiding for halftone images , 2000, Electronic Imaging.
[306] Fernando Pérez-González,et al. Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images , 1998, IEEE J. Sel. Areas Commun..
[307] Nasir D. Memon,et al. Cover Selection for Steganographic Embedding , 2006, 2006 International Conference on Image Processing.
[308] Robert H. Deng,et al. Trellis-coded multidimensional phase modulation , 1990, IEEE Trans. Inf. Theory.
[309] Eckhard Koch,et al. Towards Robust and Hidden Image Copyright Labeling , 1995 .
[310] Mark F. Bocko,et al. A Set Theoretic Framework for Watermarking and Its Application to Semifragile Tamper Detection , 2006, IEEE Transactions on Information Forensics and Security.
[311] Sushil K. Bhattacharjee,et al. Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[312] Leo Marks. Between Silk and Cyanide: A Codemaker's War, 1941-1945 , 1998 .
[313] Pierre Moulin,et al. An information-theoretic model for image watermarking and data hiding , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[314] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[315] Jürgen Herre,et al. AudioID: Towards Content-Based Identification of Audio Material , 2001 .
[316] D. Casasent,et al. New optical transforms for pattern recognition , 1977, Proceedings of the IEEE.
[317] Ingemar J. Cox,et al. Informed embedding: exploiting image and detector information during watermark insertion , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[318] Jaejin Lee,et al. Authentication and correction of digital watermarking images , 1999 .
[319] David J. Sakrison,et al. The effects of a visual fidelity criterion of the encoding of images , 1974, IEEE Trans. Inf. Theory.
[320] Qiao Li,et al. Rational dither modulation watermarking using a perceptual model , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.
[321] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data (Extended Abstract) , 1995, CRYPTO.
[322] Mauro Barni,et al. A DCT-domain system for robust image watermarking , 1998, Signal Process..
[323] Edward J. Delp,et al. Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.
[324] Peter Eisert,et al. Digital watermarking of MPEG-4 facial animation parameters , 1998, Comput. Graph..
[325] Jiri Fridrich,et al. Images with self-correcting capabilities , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[326] Fernando Pérez-González,et al. Rational dither modulation: a novel data-hiding method robust to value-metric scaling attacks , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..
[327] Andrew B. Watson,et al. Digital images and human vision , 1993 .
[328] Joe Kilian,et al. A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.
[329] Thomas S. Huang,et al. Blind digital watermarking for images and videos and performance analysis , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).
[330] Dinu Coltuc,et al. Distortion-free robust watermarking: a case study , 2007, Electronic Imaging.
[331] Hiroshi Murase,et al. Visual learning and recognition of 3-d objects from appearance , 2005, International Journal of Computer Vision.
[332] Jessica J. Fridrich,et al. Higher-order statistical steganalysis of palette images , 2003, IS&T/SPIE Electronic Imaging.
[333] Constantin Papaodysseus,et al. On the automated recognition of seriously distorted musical recordings , 2001, IEEE Trans. Signal Process..
[334] Ross J. Anderson. Stretching the Limits of Steganography , 1996, Information Hiding.
[335] Tao Zhang,et al. A fast and effective steganalytic technique against JSteg-like algorithms , 2003, SAC '03.
[336] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[337] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[338] Gregory W. Wornell,et al. Digital watermarking and information embedding using dither modulation , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[339] Andrew D. Ker. Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.
[340] Jean-Paul M. G. Linnartz,et al. Public watermarks and resistance to tampering , 1997, Proceedings of International Conference on Image Processing.