Information Hiding Techniques for Steganography and Digital Watermaking
暂无分享,去创建一个
[1] Moni Naor,et al. Bit Commitment Using Pseudo-Randomness , 1989, CRYPTO.
[2] Andreas Westfeld,et al. Steganography in a Video Conferencing System , 1998, Information Hiding.
[3] Mauro Barni,et al. Robust watermarking of still images for copyright protection , 1997, Proceedings of 13th International Conference on Digital Signal Processing.
[4] Shelby Pereira,et al. Secure robust digital image watermark , 1998, Other Conferences.
[5] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[6] Bernd Girod,et al. Digital watermarking of MPEG-2 coded video in the bitstream domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[7] Jean-Paul M. G. Linnartz. The "Ticket" Concept for Copy Control Based on Embedded Signalling , 1998, ESORICS.
[8] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[9] Gary Friedman,et al. The trustworthy digital camera: restoring credibility to the photographic image , 1993 .
[10] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[11] Barry Rodger. Ascertaining the Statutory Lex Loci Delicti : Certain Difficulties Under the Private International Law (Miscellaneous Provisions) Act 1995 , 1998 .
[12] David A. Huffman,et al. A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.
[13] Ross J. Anderson,et al. Evaluation of copyright marking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[14] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[15] Joyce E. Farrell,et al. Perceptual quality metric for digitally coded color images , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).
[16] Sushil Jajodia,et al. Recovering Watermarks from Images , 1999 .
[17] Lawrence O'Gorman,et al. Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.
[18] C. G. J. Morse,et al. Torts in Private International Law: A New Statutory Framework , 1996, International and Comparative Law Quarterly.
[19] Ping Wah Wong,et al. A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[20] M. Yeung,et al. Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.
[21] Christophe De Vleeschouwer,et al. Low-cost perceptive digital picture watermarking method , 1997, Electronic Imaging.
[22] Scott Craver,et al. On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.
[23] Ira S. Moskowitz,et al. Covert Channels - A Context-Based View , 1996, Information Hiding.
[24] Lawrence Collins,et al. Interaction between Contract and Tort in the Conflict of Laws , 1967 .
[25] E. Owens. Introduction to the Psychology of Hearing , 1977 .
[26] Simmons,et al. The Subliminal Channel and Digital Signatures , 2022 .
[27] Maurice Maes,et al. Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks , 1998, Information Hiding.
[28] Nicholas F. Maxemchuk,et al. Electronic document distribution , 1994, AT&T Technical Journal.
[29] Frank Boland,et al. Watermarking digital images for copyright protection , 1995 .
[30] Jean-Paul M. G. Linnartz,et al. Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks , 1998, Information Hiding.
[31] D. Kahn. The codebreakers : the story of secret writing , 1968 .
[32] John Humphrey Carlile Morris,et al. The Proper Law of a Tort , 1951 .
[33] Clark Thomborson,et al. Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.
[34] Ingo Stierand,et al. Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best , 1996, Information Hiding.
[35] Bernd Girod,et al. Copyright Protection in Video Delivery Networks by Watermarking of Precompressed Video , 1997, ECMAST.
[36] L. B. Milstein,et al. Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.
[37] Joan Puate,et al. Using fractal compression scheme to embed a digital signature into an image , 1997, Other Conferences.
[38] Ingemar J. Cox,et al. A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.
[39] Xiang-Gen Xia,et al. A multiresolution watermark for digital images , 1997, Proceedings of International Conference on Image Processing.
[40] C.-C. Jay Kuo,et al. Image protection via watermarking on perceptually significant wavelet coefficients , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[41] Mauro Barni,et al. Mask building for perceptually hiding frequency embedded watermarks , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[42] Eckhard Koch,et al. Copyright Protection for Multimedia Data , 1994 .
[43] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[44] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[45] Deepa Kundur,et al. Digital watermarking using multiresolution wavelet decomposition , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[46] J. O'Ruanaidh,et al. Rotation, Translation and Scale Invariant Digital Image Watermarking , 1997 .
[47] Jiri Fridrich. A New Steganographic Method for Palette-Based Images , 1999, PICS.
[48] David Aucsmith,et al. Tamper Resistant Software: An Implementation , 1996, Information Hiding.
[49] Francis Rose,et al. Lloyd's Maritime and Commercial Law Quarterly , 2001 .
[50] Frans M. J. Willems,et al. Universal data compression and repetition times , 1989, IEEE Trans. Inf. Theory.
[51] Ernest G. Lorenzen. Restatement of the Conflict of Laws , 1935 .
[52] A. Froomkin. Flood Control on the Information Ocean: Living With Anonymity, Digital Cash, and Distributed Databases , 1996 .
[53] Julie E. Cohen. A Right to Read Anonymously: A Closer Look at , 1997 .
[54] Reginald L. Lagendijk,et al. Perceptual image quality based on a multiple channel HVS model , 1995, 1995 International Conference on Acoustics, Speech, and Signal Processing.
[55] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[56] Jian Zhao. A WWW SERVICE TO EMBED AND PROVE DIGITAL COPYRIGHT WATERMARKS , 1996 .
[57] Ross J. Anderson. Why cryptosystems fail , 1994, CACM.
[58] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[59] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[60] Ingemar J. Cox,et al. Copy protection for DVD video , 1999, Proc. IEEE.
[61] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[62] Arnaud E. Jacquin,et al. Image coding based on a fractal theory of iterated contractive image transformations , 1992, IEEE Trans. Image Process..
[63] David Chaum,et al. Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..
[64] Serge Vaudenay,et al. The Newton Channel , 1996, Information Hiding.
[65] Neil F. Johnson. An Introduction to Watermark Recovery from Images , 1999 .
[66] Boon-Lock Yeo,et al. Technical trials and legal tribulations , 1998, CACM.
[67] Joshua R. Smith,et al. Modulation and Information Hiding in Images , 1996, Information Hiding.
[68] Bernd Girod,et al. Digital watermarking of raw and compressed video , 1996, Other Conferences.
[69] Patrick Ian Ross. Bernstein v. United States Department of State , 1998 .
[70] Bernd Girod,et al. Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.
[71] Michel Barlaud,et al. Image coding using wavelet transform , 1992, IEEE Trans. Image Process..
[72] L.,et al. SECURE COMPUTER SYSTEMS : MATHEMATICAL FOUNDATIONS , 2022 .
[73] Adrian Perrig,et al. A Copyright Protection Environment for Digital Images , 1997, Verläßliche IT-Systeme.
[74] Walter Bender,et al. Echo Hiding , 1996, Information Hiding.
[75] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[76] P. B. Carter. Choice of Law in Tort: The Role of the Lex Fori , 1995 .
[77] Ahmed H. Tewfik,et al. Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[78] Alfred V. Aho,et al. Compilers: Principles, Techniques, and Tools , 1986, Addison-Wesley series in computer science / World student series edition.
[79] Ahmed H. Tewfik,et al. Multiresolution scene-based video watermarking using perceptual models , 1998, IEEE J. Sel. Areas Commun..
[80] Ross J. Anderson. Liability and Computer Security: Nine Principles , 1994, ESORICS.
[81] Ross J. Anderson. Stretching the Limits of Steganography , 1996, Information Hiding.
[82] Lisa M. Marvel,et al. Reliable Blind Information Hiding for Images , 1998, Information Hiding.
[83] Mark Chapman,et al. Hiding the Hidden: A software system for concealing ciphertext as innocuous text , 1997, ICICS.
[84] Jean-Francois Delaigle,et al. A Block Based Watermarking Technique for MPEG2 Signals: Optimization and Validation on Real Digital TV Distribution Links , 1998, ECMAST.
[85] Steven H. Low,et al. Modeling Cryptographic Protocols and Their Collusion Analysis , 1996, Information Hiding.
[86] Ross Anderson,et al. The Global Internet Trust Register , 1999 .
[87] Christopher Kuner,et al. Dispute Resolution in International Electronic Commerce , 1997 .
[88] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[89] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[90] Jian Zhao,et al. Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.
[91] Gregory K. Wallace,et al. The JPEG still picture compression standard , 1991, CACM.
[92] Jean-Paul M. G. Linnartz,et al. Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..
[93] Birgit Pfitzmann,et al. Anonymous Fingerprinting , 1997, EUROCRYPT.
[94] Stefan Winkler,et al. A perceptual distortion metric for digital color images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[95] Peter Wayner,et al. Mimic Functions , 1992, Cryptologia.
[96] Jean-Luc Dugelay,et al. Image watermarking based on the fractal transform: a draft demonstration , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[97] Sushil Jajodia,et al. A Role for Digital Watermarking in Electronic Commerce , 1999 .
[98] Birgit Pfitzmann,et al. Asymmetric fingerprinting for larger collusions , 1997, CCS '97.
[99] Michael A. Gerzon,et al. A High-Rate Buried-Data Channel for Audio CD , 1995 .
[100] Bernd Girod,et al. Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.
[101] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[102] Paul S. Heckbert. Color image quantization for frame buffer display , 1982, SIGGRAPH.
[103] Birgit Pfitzmann,et al. Trials of Traced Traitors , 1996, Information Hiding.
[104] Robert J. Hart,et al. Legal protection of computer programs in Europe - a guide to the EC Directive: by Bridgit Czarnota and Robert J Hart, 1991 (Hardcover) (Butterworths), 218 pp, 75.00, ISBN 0-406-00542-7 , 1992, Comput. Law Secur. Rev..
[105] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[106] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[107] Julie S. Sheinblatt. The WIPO Copyright Treaty , 1998 .
[108] Barbara Cohen. A Proposed Regime for Copyright Protection on the Internet , 1996 .
[109] Virgil D. Gligor,et al. A guide to understanding covert channel analysis of trusted systems , 1993 .
[110] Francis M. Boland,et al. Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[111] Ahmed H. Tewfik,et al. Data hiding for video-in-video , 1997, Proceedings of International Conference on Image Processing.
[112] Ingemar J. Cox,et al. Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[113] Christopher George John Morse. Torts in Private International Law , 1980 .
[114] Richard A. Kemmerer,et al. Shared resource matrix methodology: an approach to identifying storage and timing channels , 1983, TOCS.
[115] K. Tanaka,et al. Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.
[116] Jonathan N. Bradley,et al. Data embedding method , 1996, Other Conferences.
[117] X G Xia,et al. Wavelet transform based watermark for digital images. , 1998, Optics express.
[118] John McHugh,et al. A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[119] Catherine A. Meadows,et al. Fingerprinting Long Forgiving Messages , 1985, CRYPTO.
[120] Deepa Kundur,et al. A robust digital image watermarking method using wavelet-based fusion , 1997, Proceedings of International Conference on Image Processing.
[121] Adi Shamir,et al. The Steganographic File System , 1998, Information Hiding.
[122] M. Hayes. The reconstruction of a multidimensional sequence from the phase or magnitude of its Fourier transform , 1982 .
[123] Catherine Taylor Clelland,et al. Hiding messages in DNA microdots , 1999, Nature.
[124] Gonzalo R. Arce,et al. A blind wavelet based digital signature for image authentication , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[125] Sushil Jajodia,et al. Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.
[126] R A Olshen,et al. Thoracic CT images: effect of lossy image compression on diagnostic accuracy. , 1994, Radiology.
[127] Julie E. Cohen. Some Reflections on Copyright Management Systems and Laws Designed to Protect Them , 1997 .
[128] Eckhard Koch,et al. Towards Robust and Hidden Image Copyright Labeling , 1995 .
[129] Gordon W. Braudaway,et al. Protecting publicly-available images with an invisible image watermark , 1996, Proceedings of International Conference on Image Processing.
[130] Lawrence O'Gorman,et al. Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.
[131] Pamela Samuelson,et al. Copyright and digital libraries , 1995, CACM.
[132] Birgit Pfitzmann,et al. Asymmetric fingerprinting , 1996 .
[133] Reginald L. Lagendijk,et al. Robust labeling methods for copy protection of images , 1997, Electronic Imaging.
[134] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[135] Ioannis Pitas,et al. A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[136] Fabien A. P. Petitcolas,et al. Fair benchmark for image watermarking systems , 1999, Electronic Imaging.
[137] Jean-Paul M. G. Linnartz,et al. Improved watermark detection reliability using filtering before correlation , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[138] Steven H. Low,et al. Document identification for copyright protection using centroid detection , 1998, IEEE Trans. Commun..
[139] P. E. Nygh. Some Thoughts on the Proper Law of a Tort , 1977 .
[140] Frank Bossen,et al. Digital signature of color images using amplitude modulation , 1997, Electronic Imaging.
[141] M. Kutter. Watermaking resisting to translation, rotation, and scaling , 1998 .
[142] Ira S. Moskowitz,et al. Critical analysis of security in voice hiding techniques , 1997, ICICS.
[143] Jean-Paul M. G. Linnartz,et al. Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.
[144] Dorothy Glancy. PRIVACY AND INTELLIGENT TRANSPORTATION TECHNOLOGY , 1995 .
[145] Bernd Girod,et al. Watermarking of uncompressed and compressed video , 1998, Signal Process..
[146] Jeffrey D. Ullman,et al. Introduction to Automata Theory, Languages and Computation , 1979 .
[147] Olivier Hance,et al. Privacy and the internet: Intrusion, surveillance and personal data , 1996 .
[148] Reginald L. Lagendijk,et al. Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[149] P. Lapostolle. Collection Technique et Scientifique des Télécommunications , 1978 .
[150] Wenjun Zeng,et al. Extraction of multiresolution watermark images for resolving rightful ownership , 1999, Electronic Imaging.
[151] Tom Mulhall. Special feature: Where have all the hackers gone? A study in motivation, deterrence, and crime displacement , 1997 .
[152] Jane C. Ginsburg,et al. Computer Programs in Europe: A Comparative Analysis of the 1991 EC Software Directive , 1992 .
[153] Jessa Netting,et al. Spies like us , 2000 .
[154] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[155] Fernando Pérez-González,et al. The impact of channel coding on the performance of spatial watermarking for copyright protection , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[156] Michael Luby,et al. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.
[157] Doron Shaked,et al. Watermarking of dither halftoned images , 1999, Electronic Imaging.
[158] Steven H. Low,et al. Performance comparison of two text marking methods , 1998, IEEE J. Sel. Areas Commun..
[159] Stefan Winkler,et al. Perceptual distortion metric for digital color video , 1999, Electronic Imaging.
[160] Steven K. Rogers,et al. Perceptual-based hyperspectral image fusion using multiresolution analysis , 1995 .
[161] Fabien A. P. Petitcolas,et al. Weaknesses of copyright marking systems , 1998 .
[162] Pippa Rogerson. Choice of Law in Tort: A Missed Opportunity? , 1995 .
[163] M. Zweig,et al. Receiver-operating characteristic (ROC) plots: a fundamental evaluation tool in clinical medicine. , 1993, Clinical chemistry.
[164] Tuomas Aura,et al. Practical Invisibility in Digital Communication , 1996, Information Hiding.
[165] Yvo Desmedt,et al. SUBLIMINAL-FREE AUTHENTICATION AND SIGNATURE , 1988 .
[166] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[167] J Rees,et al. Intellectual property , 2001, The Lancet.
[168] Nasir D. Memon,et al. Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal Public Key Crypto System , 1999, Electronic Imaging.