Applications of data hiding in digital images
暂无分享,去创建一个
[1] Bernd Girod,et al. Digital watermarking of MPEG-2 coded video in the bitstream domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[2] W. J. Dowling,et al. Watermarking digital images for copyright protection , 1996 .
[3] Bin Zhu,et al. Robust data hiding for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.
[4] Lawrence O'Gorman,et al. Protecting ownership rights through digital watermarking , 1996 .
[5] Jean-Paul M. G. Linnartz,et al. Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[6] Bin Zhu,et al. Low bit rate near-transparent image coding , 1995, Defense, Security, and Sensing.
[7] Walter Bender,et al. Echo Hiding , 1996, Information Hiding.
[8] Scott Craver,et al. On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.
[9] Germano Caronni. Assuring Ownership Rights for Digital Images , 1995, VIS.
[10] Jean-Paul M. G. Linnartz,et al. Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.
[11] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[12] Michael Scott,et al. Fractal Based Image Steganography , 1996, Information Hiding.
[13] Joshua R. Smith,et al. Modulation and Information Hiding in Images , 1996, Information Hiding.
[14] Gordon W. Braudaway,et al. Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.
[15] Bernd Girod,et al. Digital watermarking of raw and compressed video , 1996, Other Conferences.
[16] Maurice Maes,et al. Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks , 1998, Information Hiding.
[17] Bernd Girod,et al. Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.
[18] Bernd Girod,et al. Watermarking of MPEG-2 encoded video without decoding and reencoding , 1997, Electronic Imaging.
[19] Jean-Paul M. G. Linnartz,et al. Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..
[20] Bo Tao,et al. Adaptive watermarking in the DCT domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[21] Ingemar J. Cox,et al. Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[22] Frank Boland,et al. Watermarking digital images for copyright protection , 1995 .
[23] Jean-Paul M. G. Linnartz,et al. Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks , 1998, Information Hiding.
[24] Francis M. Boland,et al. Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[25] Lawrence O'Gorman,et al. Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.
[26] B. Zhu,et al. Transparent robust authentication and distortion measurement technique for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.
[27] Jessica Fridrich. Combining low-frequency and spread-spectrum watermarking , 1998, Optics & Photonics.
[28] David Kahn,et al. The History of Steganography , 1996, Information Hiding.
[29] Jian Zhao,et al. Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.
[30] William G. Chambers. Basics of Communications and Coding , 1985 .
[31] Ahmed H. Tewfik,et al. Data hiding for video-in-video , 1997, Proceedings of International Conference on Image Processing.
[32] Ross J. Anderson. Stretching the Limits of Steganography , 1996, Information Hiding.
[33] Andrew Z. Tirkel,et al. TOWARDS A ROBUST DIGITAL WATERMARK , 1995 .
[34] Ioannis Pitas,et al. Image watermarking using DCT domain constraints , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[35] J P Smith. Authentication of digital medical images with digital signature technology. , 1995, Radiology.
[36] Ingemar J. Cox,et al. Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.
[37] J. M. Foley,et al. Contrast masking in human vision. , 1980, Journal of the Optical Society of America.
[38] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[39] Andrew Z. Tirkel,et al. A TWO-DIMENSIONAL DIGITAL WATERMARK , 1995 .
[40] Jean-Paul M. G. Linnartz,et al. Public watermarks and resistance to tampering , 1997, Proceedings of International Conference on Image Processing.
[41] David Aucsmith,et al. Tamper Resistant Software: An Implementation , 1996, Information Hiding.
[42] Akihiro Yamamoto,et al. A digital watermark based on the wavelet transform and its robustness on image compression , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[43] Ton Kalker. Watermark Estimation through Detector Observations , 1998 .
[44] Andrew B. Watson,et al. DCT quantization matrices visually optimized for individual images , 1993, Electronic Imaging.
[45] Ingemar J. Cox,et al. A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.
[46] Xiang-Gen Xia,et al. A multiresolution watermark for digital images , 1997, Proceedings of International Conference on Image Processing.
[47] R. Blahut. Theory and practice of error control codes , 1983 .
[48] I. S. Moskowitz,et al. Covert channels-here to stay? , 1994, Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance.
[49] Ioannis Pitas,et al. Copyright protection of images using robust digital signatures , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.
[50] Eckhard Koch,et al. Copyright Protection for Multimedia Data , 1994 .
[51] Paul F. Syverson,et al. Hiding Routing Information , 1996, Information Hiding.
[52] Jian Zhao. A WWW SERVICE TO EMBED AND PROVE DIGITAL COPYRIGHT WATERMARKS , 1996 .
[53] Wenjun Zeng,et al. Perceptual watermarking of still images , 1997, Proceedings of First Signal Processing Society Workshop on Multimedia Signal Processing.
[54] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[55] Ahmed H. Tewfik,et al. Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[56] Thierry Pun,et al. Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.
[57] Feng Lin,et al. Representations that uniquely characterize images modulo translation, rotation, and scaling , 1996, Pattern Recognit. Lett..
[58] Kineo Matsui,et al. Embedding a seal into a picture under orthogonal wavelet transform , 1996, Proceedings of the Third IEEE International Conference on Multimedia Computing and Systems.
[59] O. Rioul,et al. Wavelets and signal processing , 1991, IEEE Signal Processing Magazine.
[60] Edward J. Delp,et al. A WATERMARKING TECHNIQUE FOR DIGITAL IMAGERY: FURTHER STUDIES , 2001 .
[61] Ahmed H. Tewfik,et al. Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).
[62] K. Tanaka,et al. Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.
[63] Ting Chen,et al. Time-scale modification of audio signals with combined harmonic and wavelet representations , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[64] J.L. Massey,et al. Theory and practice of error control codes , 1986, Proceedings of the IEEE.
[65] Ahmed H. Tewfik,et al. Multiresolution video watermarking using perceptual models and scene segmentation , 1997, Proceedings of International Conference on Image Processing.
[66] Jonathan N. Bradley,et al. Data embedding method , 1996, Other Conferences.
[67] Fabien A. P. Petitcolas,et al. Weakness of existing watermarking schemes , 1997 .
[68] Norman B. Nill,et al. A Visual Model Weighted Cosine Transform for Image Compression and Quality Assessment , 1985, IEEE Trans. Commun..
[69] Eckhard Koch,et al. Towards Robust and Hidden Image Copyright Labeling , 1995 .
[70] Mark Ettinger,et al. Steganalysis and Game Equilibria , 1998, Information Hiding.
[71] Gordon W. Braudaway,et al. Protecting publicly-available images with an invisible image watermark , 1996, Proceedings of International Conference on Image Processing.
[72] Lawrence O'Gorman,et al. Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.
[73] Pamela Samuelson,et al. Copyright and digital libraries , 1995, CACM.
[74] Reginald L. Lagendijk,et al. Robust labeling methods for copy protection of images , 1997, Electronic Imaging.
[75] Wenjun Zeng,et al. Digital image watermarking using visual models , 1997, Electronic Imaging.
[76] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[77] Narendra Ahuja,et al. A new wavelet-based scheme for watermarking images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[78] Christophe De Vleeschouwer,et al. Digital watermarking of images , 1996 .
[79] Thierry Pun,et al. Secure Copyright Protection Techniques for Digital Images , 1998, Information Hiding.
[80] Peter Wayner. Disappearing cryptography - being and nothingness on the net , 1996 .
[81] Ross Anderson,et al. Information hiding terminology , 1996 .
[82] Bernd Girod,et al. Watermarking of uncompressed and compressed video , 1998, Signal Process..
[83] M. Yeung,et al. Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.
[84] Zixiang Xiong,et al. Multiresolution watermarking for images and video: a unified approach , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[85] Christophe De Vleeschouwer,et al. Low-cost perceptive digital picture watermarking method , 1997, Electronic Imaging.
[86] Jiri Fridrich,et al. Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[87] Edward J. Delp,et al. A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[88] Bernd Girod,et al. Copyright Protection in Video Delivery Networks by Watermarking of Precompressed Video , 1997, ECMAST.
[89] Lawrence O'Gorman,et al. Watermarking Document Images with Bounding Box Expansion , 1996, Information Hiding.
[90] Gerhard C. Langelaar,et al. Copy Protection for Multimedia Data based on Labeling Techniques , 1998 .
[91] Robert J. Safranek,et al. Perceptual coding of images , 1993, Electronic Imaging.
[92] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[93] Wenjun Zeng,et al. Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..
[94] John McHugh,et al. A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[95] Deepa Kundur,et al. A robust digital image watermarking method using wavelet-based fusion , 1997, Proceedings of International Conference on Image Processing.
[96] Robert J. Safranek,et al. Signal compression based on models of human perception , 1993, Proc. IEEE.
[97] Ja-Ling Wu,et al. Hidden signatures in images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[98] Mauro Barni,et al. DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.
[99] Ioannis Pitas,et al. A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[100] Cornelius W. A. M. van Overveld,et al. Digital watermarking by geometric warping , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[101] Jiri Fridrich,et al. Robust Digital Watermarking Based on Key-Dependent Basis Functions , 1998, Information Hiding.
[102] Ahmed H. Tewfik,et al. Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.
[103] Bernd Girod,et al. The Information Theoretical Significance of Spatial and Temporal Masking in Video Signals , 1989, Photonics West - Lasers and Applications in Science and Engineering.