Secure spread spectrum watermarking for multimedia
暂无分享,去创建一个
Ingemar J. Cox | Joe Kilian | Frank Thomson Leighton | Talal Shamoon | J. Kilian | F. Leighton | I. Cox | T. Shamoon
[1] Ingo Stierand,et al. Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best , 1996, Information Hiding.
[2] Peter Grant,et al. Wideband coding for uncoordinated mulit-ple access communication , 1992 .
[3] K. Tanaka,et al. Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.
[4] D. Campana,et al. Spread-spectrum communications , 1993, IEEE Potentials.
[5] Germano Caronni. Assuring Ownership Rights for Digital Images , 1995, VIS.
[6] Laurence B. Milstein,et al. Spread-Spectrum Communications , 1983 .
[7] Lawrence O'Gorman,et al. Watermarking Document Images with Bounding Box Expansion , 1996, Information Hiding.
[8] Ingemar J. Cox,et al. Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[9] Ingemar J. Cox,et al. A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.
[10] Joshua R. Smith,et al. Modulation and Information Hiding in Images , 1996, Information Hiding.
[11] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[12] Lawrence O'Gorman,et al. Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.
[13] W. J. Dowling,et al. Watermarking digital images for copyright protection , 1996 .
[14] C. W. Therrien,et al. Decision, Estimation and Classification: An Introduction to Pattern Recognition and Related Topics , 1989 .
[15] Jean-Jacques Quisquater,et al. Cryptology for digital TV broadcasting , 1995, Proc. IEEE.
[16] Ingemar J. Cox,et al. Dynamic histogram warping of image pairs for constant image brightness , 1995, Proceedings., International Conference on Image Processing.
[17] Robert J. Safranek,et al. Signal compression based on models of human perception , 1993, Proc. IEEE.
[18] Allen Gersho,et al. Vector quantization and signal compression , 1991, The Kluwer international series in engineering and computer science.
[19] A.K. Jain,et al. Two-dimensional signal processing , 1980, Proceedings of the IEEE.
[20] Eckhard Koch,et al. Towards Robust and Hidden Image Copyright Labeling , 1995 .
[21] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[22] Jiri Weiss,et al. Digital Copyright: Who Owns What?. , 1995 .
[23] Eckhard Koch,et al. Copyright Protection for Multimedia Data , 1994 .
[24] Kineo Matsui,et al. Information Security and Cryptography. Video Stegonography. , 1995 .
[25] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[26] Jian Zhao,et al. Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.
[27] L. B. Milstein,et al. Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.
[28] S. P. Mudur,et al. Three-dimensional computer vision: a geometric viewpoint , 1993 .
[29] Albert C. Leighton. The Statesman Who Could not Read His Own Mail , 1993, Cryptologia.
[30] Silvio Micali,et al. Secret-Key Agreement without Public-Key Cryptography , 1993, CRYPTO.
[31] Ingemar J. Cox,et al. Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.
[32] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..