Multimedia data-embedding and watermarking technologies
暂无分享,去创建一个
Ahmed H. Tewfik | Mitchell D. Swanson | M. Kobayashi | M. Swanson | A. Tewfik | M. Kobayashi | M. D. Swanson
[1] Thomas S. Huang,et al. Image processing , 1971 .
[2] Thomas L. Marzetta,et al. Detection, Estimation, and Modulation Theory , 1976 .
[3] A. Gualtierotti. H. L. Van Trees, Detection, Estimation, and Modulation Theory, , 1976 .
[4] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[5] J. M. Foley,et al. Contrast masking in human vision. , 1980, Journal of the Optical Society of America.
[6] L. B. Milstein,et al. Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.
[7] 조위덕. Cryptography , 1987, The Official (ISC)2 SSCP CBK Reference.
[8] R L Rivest,et al. Factoring and cryptography. , 1988, Science.
[9] Bernd Girod,et al. The Information Theoretical Significance of Spatial and Temporal Masking in Video Signals , 1989, Photonics West - Lasers and Applications in Science and Engineering.
[10] J. Van Leeuwen,et al. Handbook of theoretical computer science - Part A: Algorithms and complexity; Part B: Formal models and semantics , 1990 .
[11] John E. Howland,et al. Computer graphics , 1990, IEEE Potentials.
[12] Ronald L. Rivest,et al. The MD4 Message-Digest Algorithm , 1990, RFC.
[13] Ronald L. Rivest,et al. The MD4 Message-Digest Algorithm , 1990, RFC.
[14] Robert J. Safranek,et al. Signal compression based on models of human perception , 1993, Proc. IEEE.
[15] P. Noll,et al. Wideband speech and audio coding , 1993, IEEE Communications Magazine.
[16] John C. Russ,et al. The image processing handbook (3. ed.) , 1995 .
[17] Lawrence O'Gorman,et al. Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.
[18] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[19] Nicholas F. Maxemchuk,et al. Electronic document distribution , 1994, AT&T Technical Journal.
[20] Frank Boland,et al. Watermarking digital images for copyright protection , 1995 .
[21] Bin Zhu,et al. Low bit rate near-transparent image coding , 1995, Defense, Security, and Sensing.
[22] Jian Zhao,et al. Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.
[23] Lawrence O'Gorman,et al. Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.
[24] A. Viterbi. CDMA: Principles of Spread Spectrum Communication , 1995 .
[25] Germano Caronni. Assuring Ownership Rights for Digital Images , 1995, VIS.
[26] Lawrence O'Gorman,et al. Protecting ownership rights through digital watermarking , 1996 .
[27] Francis M. Boland,et al. Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[28] Kineo Matsui,et al. Embedding a seal into a picture under orthogonal wavelet transform , 1996, Proceedings of the Third IEEE International Conference on Multimedia Computing and Systems.
[29] Michael Scott,et al. Fractal Based Image Steganography , 1996, Information Hiding.
[30] Gordon W. Braudaway,et al. Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.
[31] Ja-Ling Wu,et al. Hidden signatures in images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[32] Ahmed H. Tewfik,et al. Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[33] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[34] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[35] Ahmed H. Tewfik,et al. Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).
[36] Ioannis Pitas,et al. A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[37] Ioannis Pitas,et al. Applications of toral automorphisms in image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[38] Edward J. Delp,et al. A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[39] Andrew Calway,et al. Proceedings of the IEEE International Conference on Image Processing , 1996 .
[40] Joshua R. Smith,et al. Modulation and Information Hiding in Images , 1996, Information Hiding.
[41] Jonathan N. Bradley,et al. Data embedding method , 1996, Other Conferences.
[42] Bernd Girod,et al. Digital watermarking of raw and compressed video , 1996, Other Conferences.
[43] Jonathan N. Bradley,et al. The data embedding method , 1996 .
[44] Michael Luby,et al. Pseudorandomness and cryptographic applications , 1996, Princeton computer science notes.
[45] M. Yeung,et al. Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.
[46] Ahmed H. Tewfik,et al. Multiresolution video watermarking using perceptual models and scene segmentation , 1997, Proceedings of International Conference on Image Processing.
[47] Bernd Girod,et al. Copyright Protection in Video Delivery Networks by Watermarking of Precompressed Video , 1997, ECMAST.
[48] Ja-Ling Wu,et al. Digital watermarking for video , 1997, Proceedings of 13th International Conference on Digital Signal Processing.
[49] Bernd Girod,et al. Digital watermarking of MPEG-2 coded video in the bitstream domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[50] Christophe De Vleeschouwer,et al. Low-cost perceptive digital picture watermarking method , 1997, Electronic Imaging.
[51] Ahmed H. Tewfik,et al. Data hiding for video-in-video , 1997, Proceedings of International Conference on Image Processing.
[52] Frank Bossen,et al. Digital signature of color images using amplitude modulation , 1997, Electronic Imaging.
[53] Bernd Girod,et al. Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.
[54] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[55] Wenjun Zeng,et al. Digital image watermarking using visual models , 1997, Electronic Imaging.
[56] Ahmed H. Tewfik,et al. Object-based transparent video watermarking , 1997, Proceedings of First Signal Processing Society Workshop on Multimedia Signal Processing.
[57] Joan Puate,et al. Using fractal compression scheme to embed a digital signature into an image , 1997, Other Conferences.
[58] Paul G. Flikkema,et al. Spread-spectrum techniques for wireless communication , 1997, IEEE Signal Process. Mag..
[59] Wenjun Zeng,et al. Perceptual watermarking of still images , 1997, Proceedings of First Signal Processing Society Workshop on Multimedia Signal Processing.
[60] Hiroshi Masuda,et al. Embedding Data in 3D Models , 1997, IDMS.
[61] Hiroshi Masuda,et al. Watermaking three-dimensional polygonal models , 1997, MULTIMEDIA '97.
[62] M. Yeung,et al. Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications , 1998, IEEE J. Sel. Areas Commun..
[63] John F. Tilki. Encoding a Hidden Digital Signature onto an Audio Signal Using Psychoacoustic Masking , 1998 .
[64] Ahmed H. Tewfik,et al. Robust audio watermarking using perceptual masking , 1998, Signal Process..
[65] Gerhard C. Langelaar,et al. Copy Protection for Multimedia Data based on Labeling Techniques , 1998 .
[66] Bernd Girod,et al. Watermarking of uncompressed and compressed video , 1998, Signal Process..
[67] Steven H. Low,et al. Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.
[68] J. van Leeuwen,et al. Information Hiding , 1999, Lecture Notes in Computer Science.
[69] 京都大学数理解析研究所,et al. Number Theory and Its Applications , 1999 .