FileMood

Download WM

WM

Name

WM

 DOWNLOAD Copy Link

Total Size

685.8 MB

Total Files

499

Hash

E8D562DF62260FF0A25044D7E3177D1B6CD4B4C2

/.../!Communications of the ACM - July 1998 - Vol. 41, No. 7/

p35-memon.pdf

1.0 MB

p78-isakowitz.pdf

894.4 KB

p57-mintzer.pdf

672.4 KB

p45-craver.pdf

641.0 KB

p67-zhao.pdf

527.2 KB

p23-schank.pdf

301.6 KB

p13-glass.pdf

290.2 KB

p81-lohse.pdf

279.6 KB

p75-acken.pdf

273.9 KB

p89-tenenbaum.pdf

235.0 KB

p91-kambil.pdf

226.5 KB

p17-rada.pdf

224.3 KB

p9-fox.pdf

220.3 KB

p107-balasubramanian.pdf

209.5 KB

p30-yeung.pdf

172.7 KB

p26-crawford.pdf

156.9 KB

p86-lincke.pdf

137.9 KB

p5-crawford.pdf

133.7 KB

p101-arocena.pdf

131.9 KB

p112-dennis.pdf

129.9 KB

p114-maurer.pdf

125.1 KB

p103-takahashi.pdf

122.2 KB

p99-van_heck.pdf

118.2 KB

p117-senn.pdf

111.9 KB

p116-turoff.pdf

110.2 KB

p98-oinas-kukkonen.pdf

97.3 KB

p128-neumann.pdf

84.0 KB

content.txt

2.3 KB

/article/!CSS/

Barry - Cryptography in Home Entertainment A look at content scrambling in DVDs.mht

187.5 KB

The DVD Content Scrambling System Explained (Part 4).mht

132.5 KB

The DVD Content Scrambling System Explained (Part 3).mht

127.2 KB

The DVD Content Scrambling System Explained (Part 2).mht

114.5 KB

The DVD Content Scrambling System Explained (Part 1).mht

105.0 KB

Stevenson - Cryptanalysis of Contents Scrambling System.mht

23.6 KB

/.../!Multimedia and Security Workshop at ACM Multimedia 98. Bristol/

Workshop ACM 98.pdf

2.5 MB

/.../Bas Chassery Macq - Geometrically Invariant Watermarking Using Feature Points/

Geometrically Invariant Watermarking Using Feature Points.pdf

1.9 MB

/.../Bender - Applications for data hiding/

afdh.pdf

886.3 KB

/.../Bender - Techniques for Data Hiding/

313.pdf

431.2 KB

/.../Boncelet - A multiresolution watermark for digital images/

10.1.1.27.9944.pdf

788.1 KB

/.../Bors Pitas - Image watermarking using block site selection and DCT domain constraints/

bors98image.pdf

638.2 KB

/.../Bruce - A Review of Digital Watermarking/

10.1.1.90.9540.pdf

746.1 KB

/.../Chae Manjunath - A Robust Embedded Data from Wavelet Coefficients/

10.1.1.1.6958.pdf

1.3 MB

/.../Chae Manjunath - A Technique for Image Data Hiding and Reconstruction without Host Image/

10.1.1.33.4939.pdf

105.3 KB

/.../Chae Manjunath - Data Hiding in Video/

data-hiding-in-video.pdf

50.7 KB

/.../Chandramouli Memon - Digital Watermarking/

10.1.1.84.6722.pdf

187.2 KB

/.../Dugad Ratakonda - A new wavelet-based scheme for watermarking images/

10.1.1.41.3163.pdf

223.4 KB

/.../Ellinas - A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection/

10.1.1.81.8931.pdf

604.3 KB

/.../Gruhl Bender - Information Hiding to Foil the Casual Counterfeiter/

10.1.1.35.3750.pdf

292.3 KB

/.../Herrigel Voloshynovskiy Rytsar - The Watermark Template Attack/

10.1.1.26.5902.pdf

610.5 KB

/.../Jin - A Robust Wavelet-based Blind Digital Watermarking Algorithm/

358-363.pdf

690.4 KB

/.../Kim - Robustness Analysis of Patchwork Watermarking Schemes/

PatchworkFinalAll.pdf

271.5 KB

/.../Kundur - A robust digital image watermarking method using wavelet-based fusion/

10.1.1.26.8225.pdf

234.7 KB

/.../Kutter Bhattacharjee Ebrahimi - Towards second generation watermarking schemes/

10.1.1.40.4961.pdf

141.2 KB

/.../Meerwald - Robustness and Security of Wavelet-Based Watermarking Algorithms/

10.1.1.10.4370.pdf

757.8 KB

/.../Memon Wong - Protecting Digital MediaContent/

p35-memon.pdf

1.0 MB

/.../Miller Cox Bloom - Watermarking in the Real World An Application to DVD/

10.1.1.43.3615.pdf

90.2 KB

/.../Paiz - Tartan Threads A Method for the Real-time Digital Recognition/

10.1.1.34.6601.pdf

582.2 KB

/.../Perrig Willmott - Digital Image Watermarking in the Real World/

10.1.1.42.6876.pdf

191.8 KB

/.../Qi - An Efficient Wavelet-Based Watermarking Algorithm/

10.1.1.100.4668.pdf

382.5 KB

/.../Swanson - Robust audio watermarking using perceptual masking/

audio2.pdf

548.3 KB

/.../Swanson - Robust data hiding for images/

10.1.1.56.1165.pdf

264.4 KB

/.../Sweldens - Building Your Own Wavelets at Home/

athome.pdf

576.1 KB

/.../Sweldens - Wavelets and the Lifting Scheme A 5 Minute Tour/

sweldens96wavelets.pdf

162.7 KB

/.../Wang - A wavelet-based watermarking algorithm for ownership verification of digital images/

10.1.1.20.5700.pdf

2.3 MB

/.../Wang Su Kuo - Wavelet-based digital image watermarking/

416AEBAA-BDB9-137E-CC2DC0DC08314475_63350.pdf

235.3 KB

/.../Westfeld - F5-A Steganographic Algorithm High Capacity Despite Better Steganalysis/

21370289.pdf

237.6 KB

/.../Zhu - Multiresolution Watermarking For Images And Video A Unified Approach/

zhu99multiresolution.pdf

186.4 KB

/.../Лысенко - Построение цифрового водяного знака устойчивого к потери синхронизации/

a11.7z

727.1 KB

/.../Adelsbach Sadeghi - Zero-Knowledge Watermark Detection and Proof of Ownership/

Zero-Knoledge watermark.pdf

249.1 KB

/.../Agrawal Haas Kiernan - Watermarking relational data framework, algorithms and analysis/

25.PDF

223.2 KB

/.../Agung Sweeney - A Method for Combating Random Geometric Attack on Image Watermarking/

combat_stirmark.pdf

65.8 KB

/.../Ahn Hopper - Public-Key Steganography/

public_key_steganography.pdf

331.6 KB

/.../Ahsan Kundur - Practical Data Hiding in TCP IP/

ACM02.PDF

106.6 KB

/.../Anderson Kuhn - Tamper Resistance a Cautionary Note/

TAMPER.PDF

171.7 KB

/.../Anderson Petitcolas - On The Limits of Steganography/

steganjsac2.ps.pdf

206.4 KB

/.../Ansari Memon - The JPEG Lossless Standards/

7.PDF

217.5 KB

/.../Ansari Memon - The JPEG Standard/

6.PDF

365.4 KB

/.../Atallah Raskin Hempelmann Karahan Sion Topkara Triezenberg - Natural Language Watermarking and Tamperproofing/

natural language watermarking.pdf

241.0 KB

/.../Atallah Sion Prabhakar - Watermarking non-media content/

talk-Qual2-CS-2000.pdf

690.0 KB

poster-Symposium-CERIAS-2001.pdf

183.6 KB

/.../Atallah Wagstaff - Watermarking with quadratic residues/

WATER.PDF

156.4 KB

/.../Avcibas - Image Quality Statistics and Their Use in Steganalysis and Compression/

avcibas01image.pdf

679.7 KB

/.../Avcibas Memon Sankur - Steganalysis Based on Image Quality Metrics/

48.PDF

226.6 KB

steganalysis-based-on-image.pdf

179.4 KB

/.../Avcibas Memon Sankur Sayood - A Progressive Lossless Near-Lossless Image Compression Algorithm/

11 A Progressive Lossless-Near-Lossless Image Compression Algorithm.pdf

137.6 KB

/.../Avcibas Sankur Sayood - Statistical Evaluation of Image Quality Measures/

avcibas02statistical.pdf

300.3 KB

/.../Baharav Shaked - Watermarking of Dither Halftoned Images/

HPL-98-32.pdf

580.0 KB

/.../Barni Bartolini Cappellini Piva - Image watermarking for secure transmission over public networks/

image-watermarking-for-secure.pdf

564.7 KB

/.../Bas Chassery Macq - Geometrically Invariant Watermarking Using Feature Points/

Geometrically Invariant Watermarking Using Feature Points.pdf

1.9 MB

/.../Bassia Pitas - Robust audio watermarking in the time domain/

Bassia98a.ps.pdf

149.0 KB

/.../Bauml Eggers Huber - A Channel Model for Watermarks Subject to Desynchronization Attacks/

RB_ITG02.PDF

218.7 KB

/.../Bauml Eggers Tzschoppe Huber - A Channel Model for Watermarks Subject to Desynchronization Attacks/

EI2002-4675-31.pdf

269.5 KB

/.../Benedens - Robust Watermarking and Affine Registration of 3D Meshes/

Robust Watermarking of 3D Meshes.pdf

358.5 KB

/.../Berenstein - Random Transforms, Wavelets, and Application/

TR_96-65.PDF

1.6 MB

/.../Bloom Alonso - SmartSearch Steganalysis/

bloom03smartsearch.pdf

35.7 KB

/.../Bloom Cox Kalker Linnartz Miller Traw - Copy Protection for DVD Video/

ProcIEEE1999b.pdf

108.3 KB

/.../Blundo Galdi - Steganography Using Modern Arts/

12 Mozaics.pdf

364.4 KB

/.../Boneh Shaw - Collusion-Secure Fingerprinting for Digital Data/

FINGER.PDF

292.2 KB

/.../Bors Pitas - Embedding parametric digital signatures in images/

Bors96b.ps.pdf

178.4 KB

/.../Bors Pitas - Image watermarking using dct domain constraints/

Bors96d.ps.pdf

238.4 KB

/.../Bounkong Saad Lowe - ICA based Steganography/

NCRG_2002_023.pdf

178.5 KB

/.../Bounkong Saad Lowe - Independent Component Analysis for Domain Independent Watermarking/

NCRG_2002_022.pdf

157.7 KB

/.../Bounkong Saad Lowe - Quantisation Effects and Watermarking Capacity/

iscta2003_revised.pdf

207.6 KB

/.../Bounkong Toch Saad Lowe - ICA for Watermarking Digital Images/

S_ica_watermarking_jmlr_revised.pdf

556.1 KB

/.../Bounkong Toch Saad Lowe - Structured Codebooks for SCSWatermarking/

404-108.PDF

181.8 KB

/.../Brandao Queluz Rodrigues - Diversity Enhancement of Coded Spread Spectrum Video Watermarking/

9.PDF

190.5 KB

/.../Brickman - Literature Survey on Audio Watermarking/

LitSurveyReport.pdf

106.9 KB

/.../Brisbane Safavi-Naini Ogunbona - An Algorithm for Data Hiding Using Median Cut Segmentation/

data hiding.pdf

117.8 KB

/.../Burges Platt Jana - Distortion Discriminant Analysis for Audio Fingerprinting/

IEEE_SAP.PDF

186.5 KB

/.../Cano Batlle Gomez Gomes Bonnet - Audio fingerprinting concepts and applications/

cano02audio.pdf

72.4 KB

/.../Cano Batlle Kalker Haitsma - A Review of Algorithms for Audio Fingerprinting/

a-review-of-algorithms.pdf

55.3 KB

/.../Celik Sharma Saber Tekalp - A hierarchical image authenticationwatermark with improved localization and security/

celik01hierarchical.pdf

2.4 MB

/.../Celik Sharma Tekalp Saber - Lossless Generalized-LSB Data Embedding/

lossless-generalized-lsb-data.pdf

376.0 KB

/.../Celik Sharma Tekalp Saber - Reversible data hiding/

reversible-data-hiding.pdf

194.7 KB

/.../Chandramouli - A Mathematical Framework for Active Steganalysis/

a-mathematical-framework-for.pdf

232.4 KB

/.../Chandramouli Memon - A Distributed Detection Framework for Steganalysis/

ATTAC.PDF

125.2 KB

/.../Chandramouli Memon Rabbani - Digital Watermarking/

3.PDF

187.2 KB

/.../Chang Kankanhalli Guan Huang Wu - Robust image authentication using content based compression/

Robust image authentication.pdf

1.2 MB

/.../Chou Pradham Pradhan Ghaoui Ramchandran - Watermarking Based On Duality With Distributed Source Coding/

chou00robust.pdf

382.4 KB

/.../Cohen - Information Theoretic Analysis of Watermarking Systems/

THESIS.PDF

1.2 MB

/.../Cohen Draper Martinian Wornell - Source Requantization Successive Degradation and Bit Stealing/

cohen02source.pdf

473.1 KB

/.../Cohen Draper Martinian Wornell - Stealing Bits from a Quantized Source/

isit-lausanne-switzerland-june.pdf

79.9 KB

/.../Cohen Lapidoth - Generalized Writing on Dirty Paper/

gwdpAbs.pdf

128.0 KB

/.../Cohen Lapidoth - On the Gaussian Watermarking Game/

isit_2000.pdf

149.4 KB

/.../Cohen Lapidoth - The Capacity of the Vector Gaussian Watermarking Game/

isit_2001.pdf

157.9 KB

/.../Cohen Lapidoth - The Gaussian Watermarking Game/

IT_FINAL.PDF

485.1 KB

/.../Cohen Lapidoth - Watermarking Capacity for Gaussian Sources/

PROC.PDF

195.2 KB

/.../Cohen Zemor - Copyright Protection for Digital Data/

cohen99copyright.pdf

151.2 KB

/.../Cox Kilian Leighton Shamoon - A Secure, Robust Watermark for Multimedia/

CAM96.PDF

850.2 KB

/.../Cox Kilian Leighton Shamoon - Secure spread spectrum watermarking for images, audio and video/

ICIP96.PDF

271.9 KB

/.../Cox Linnartz - Public watermarks and resistance to tampering/

ICIP97.PDF

139.1 KB

/.../Cox Miller - A review of watermarking and the importance of perceptual modeling/

EI97.PDF

180.6 KB

/.../Cox Miller - Electronic watermarking the first 50 years/

MMSP01.PDF

114.3 KB

/.../Cox Miller - The first 50 years of electronic watermarking/

JASP02.PDF

115.4 KB

/.../Cox Miller Bloom - Watermarking applications and their properties/

ITCC00.PDF

34.7 KB

/.../Cox Miller McKellips - Watermarking as communications with side information/

procieee1_99.pdf

263.6 KB

/.../Craver - On Public-Key Steganography in the Presence of an Active Warden/

18 On Public-Key Steganography in the Presence.pdf

224.6 KB

/.../Cvejic Seppanen - Improving audio watermarking scheme using psychoacoustic watermark filtering/

93.PDF

33.0 KB

/.../Dalbegue Baras Sidiropoulos - Compact Image Coding from Multiscale Edges/

TR_98-61.PDF

451.8 KB

/.../Das Maitra - Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme/

4.PDF

376.9 KB

/.../Day Jou Lee - Rotation, Scaling, and Translation Resilient Image Watermarking with Side Information at Encoder/

5.PDF

345.5 KB

/.../Delannay - Digital Watermarking Algorithms Robust Against Loss of Synchronization/

DigitalWatermarking Algorithms Robust Against.pdf

4.7 MB

/.../Delannay - Integrated Fingerprinting in Secure Digital Cinema Projection/

delannay_OS&T01.pdf

683.5 KB

/.../Delannay Delaigle Macq Barlaud - Compensation of Geometrical Deformations for Watermark Extraction in the Digital Cinema Application/

delannay_SPIE01.pdf

204.5 KB

/.../Delannay Macq - A Method for Hiding Synchronization Marks in Scale and Rotation Resilient Watermarking Schemes/

delannay_SPIE02.pdf

376.6 KB

/.../Doerr Dugelay - A guide tour of video watermarking/

imageComm2003.pdf

850.0 KB

/.../Doerr Dugelay - New intra-video collusion attack using mosaicing/

ICME2003.PDF

102.0 KB

/.../Doerr Dugelay - Secure Background Watermarking Based on Video Mosaicing/

SPIE2004.PDF

355.7 KB

/.../Doerr Dugelay - Secure Video Watermarking Via Embedding Strength Modulation/

IWDW2003.PDF

228.8 KB

/.../Doerr Dugelay - Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking/

doerrSP2004.pdf

204.5 KB

/.../Doerr Dugelay - Switching Between Orthogonal Watermarks for Enhanced Security Against Collusion in Video/

RR_03_080.pdf

128.1 KB

/.../Doerr Dugelay - Video watermarking overview and challenges/

furhtBook.pdf

408.2 KB

/.../Droogenbroeck Benedett - Techniques for a selective encryption of uncompressed and compressed images/

acivs2002mvd.pdf

532.0 KB

/.../Droogenbroeck Delvaux - An entropy based technique for information embedding in images/

SPS-034.PDF

519.6 KB

/.../Du Zou Lu - An Optimized Spatial Data Hiding Scheme Combined with Convolutional Codes and Hilbert Scan/

Data hiding and codes.pdf

882.2 KB

/.../Dugelay Rey Doerr Csurka - Dewatermarking Based on Self-Similarities/

RR_02_060.pdf

932.1 KB

/.../Dumitrescu Wu Memon - On Steganalysis of Random LSB Embedding in Images/

41.PDF

167.8 KB

/.../Dumitrescu Wu Wang - Detection of LSB Steganography via Sample Pair Analysis/

22.PDF

363.8 KB

/.../Eggers - Digital Watermarking Theoretic Foundation and Applications/

RUEGEN.PDF

167.7 KB

/.../Eggers - Information Embedding and Digital Watermarking/

stanford_jan_2002.pdf

610.3 KB

/.../Eggers Bauml Girod - A Communications Approach to Image Steganography/

ei2002_stego.pdf

189.6 KB

/.../Eggers Bauml Girod - Digital Watermarking Facing Attacks by Amplitude Scaling and Additive White Noise/

JJ_ITG02.PDF

158.9 KB

/.../Eggers Bauml Girod - Estimation Of Amplitude Modifications before SCS Watermark Detection/

ei2002_estimD.pdf

303.0 KB

/.../Eggers Bauml Tzschoppe Girod - Inverse Mapping of SCS-Watermarked Data/

inverseSCS.pdf

128.0 KB

/.../Eggers Bauml Tzschoppe Girod - Scalar Costa Scheme for Information Embedding/

eggersIEEEsi20.pdf

492.5 KB

/.../Eggers Bauml Tzschoppe Huber - Applications of Information Hiding and Digital Watermarking/

v3d2ECDL.pdf

106.0 KB

/.../Eggers Girod - Blind watermarking applied to image authentication/

ICASSP01.PDF

117.9 KB

/.../Eggers Girod - Quantization Effects on Digital Watermarks/

Eggers99a.pdf

308.9 KB

/.../Eggers Girod - Quantization Watermarking/

SPIE2000.PDF

196.3 KB

/.../Eggers Girod - Robustness of Public Key Watermarking Schemes/

pubkey_vortrag2.pdf

328.5 KB

/.../Eggers Girod - Watermark Detection after Quantization Attacks/

Eggers99b.pdf

183.0 KB

/.../Eggers Ihlenfeldt Girod - Digital Watermarking of Chemical Structure Sets/

IHW4TH.PDF

165.4 KB

/.../Eggers Su - Performance of a Practical Blind Watermarking Scheme/

EI2001.PDF

225.3 KB

/.../Eggers Su Girod - A Blind Watermarking Scheme Based on Structured Codebooks/

SIIA_paper.pdf

179.0 KB

/.../Eggers Su Girod - Asymmetric Watermarking Schemes/

BerlinGI2000.pdf

105.9 KB

/.../Eggers Su Girod - Public keywatermarking by eigenvectors of linear transforms/

eusipco2000.pdf

83.7 KB

/.../Eggers Su Girod - Robustness of a blind imagewatermarking scheme/

ICIP2000.PDF

84.5 KB

/.../Emmanuel Kankanhalli - A digital rights management scheme for broadcast video/

bradcast video.pdf

321.1 KB

/.../Engan Gulsrud Josefsen - Watermarking of digital mammograms without interfering with automatic detection of microcalcifications/

ICIP2003.PDF

83.6 KB

/.../Eskicioglu - Quality measurement for monochrome compressed images in the past 25 years/

quality-measurement-for-monochrome.pdf

44.9 KB

/.../Faridy Lyu - Higher-order Wavelet Statistics and their Application to Digital Forensics/

SACV03.PDF

2.5 MB

/.../Fei Kundur Kwong - The Choice of Watermark Domain in the Presence of Compression/

fei01choice.pdf

102.1 KB

/.../Fisk Papadopoulos Neil - Eliminating Steganography in Internet Traffic with Active Wardens/

Eliminating Steganography In Internet Traffic.pdf

227.0 KB

IH02.PDF

101.2 KB

/.../Fletcher Larkin - Direct Embedding and Detection of RST Invariant Watermarks/

Direct Embedding And Detection of RST-Invariant WM.pdf

1.2 MB

/.../Foote Adcock Girgensohn - Time Base Modulation A New Approach to Watermarking Audio/

FXPAL-PR-03-212.pdf

111.0 KB

/.../Fotopoulos Skodras - A subband dct approach to image watermarking/

ANS-C33.PDF

245.2 KB

/.../Fourier Transform in image processing/

Mathematics - FourierTransform in image processing.pdf

666.3 KB

/.../Franz - Steganography Preserving Statistical Properties/

Steganography Preserving Statistical Properties.pdf

383.9 KB

/.../Fridrich - Key-Dependent Random Image Transforms and Their Applications in Image Watermarking/

key-dependent-random-image.pdf

93.4 KB

/.../Fridrich Goljan Du - Lossless Data Embedding For All Image Formats/

lossless_all_formats.pdf

268.6 KB

/.../Fridrich Goljan Hogea - Steganalysis of JPEG Images Breaking the F5 Algorithm/

Steganalysis of JPEG Images Breaking the F5 Algorithm.pdf

274.1 KB

/.../Fridricha Goljanb Memonc Shended Wonge - On the security of the Yeung-Mintzer authentication watermark/

15 ON THE SECURITY OF THE YEUNG-MINTZER.pdf

236.4 KB

/.../Gilani Skodras - Dlt-based digital image watermarking/

ANS-C34.PDF

52.8 KB

/.../Gilani Skodras - Robust image watermarking by subband dlt/

ANS-C41.PDF

250.7 KB

/.../Girod Hartung Horn - Multiresolution coding of image and video signals/

ghh_eus98.ps.pdf

247.6 KB

/.../Goljan Fridrich Du - Distortion-Free Data Embedding for Images/

Distortion Free Data Embedding For Images.pdf

251.0 KB

/.../Gomes Gomez Moreau - Resynchronization methods for audio watermarking/

gomes01resynchronization.pdf

406.2 KB

/.../Gomez Cano Gomes Batlle Bonnet - Mixed Watermarking-Fingerprinting Approach for Integrity Verification of Audio Recordings/

mixed-watermarking-fingerprinting-approach.pdf

285.2 KB

/.../Gonzalez Hernandez - A tutorial on digital watermarking/

Tutorial on DWM 99.pdf

393.7 KB

/.../Gordy Bruton - Performance Evaluation of Digital Audio Watermarking Algorithms/

Performance Evaluation of Digital Audio Watermarking Algorithms.pdf

92.9 KB

/.../Grosbois Gerbelot Ebrahimi - Authentication and access control in the JPEG 2000 compressed domain/

jpeg2000_grosbois.pdf

1.3 MB

/.../Guelvouit Pateux - Wide spread spectrum watermarking with side information and interference cancellation/

wide-spread-spectrum-watermarking.pdf

687.3 KB

/.../Guelvouit Pateux Guillemot - Information-theoretic resolution of perceptual WSS watermarking of non i.i.d. Gaussian signals/

leguelvouit02informationtheoretic.pdf

217.7 KB

/.../Guelvouit Pateux Guillemot - Perceptual Watermarking Of Non I.i.d. Signals Based On Wide Spread Spectrum Using Side Information/

leguelvouit02perceptual.pdf

140.5 KB

/.../Guo Georganas - Digital imagewatermarking for joint ownership verification without a trusted dealer/

digital-image-watermarking-for.pdf

174.2 KB

/.../Guoxiang Weiwei - Image-Feature Based Second Generation Watermarking in Wavelet Domain/

Image-feature wavelet WM.pdf

100.9 KB

/.../Hartung Eisert Girod - Digital Watermarking of 3D Head Model Animation Parameters/

fh_imdsp98_poster.ps.pdf

63.0 KB

/.../Hartung Eisert Girod - Digital Watermarking of MPEG-4 Facial Animation Parameters/

cg98.ps.pdf

369.1 KB

/.../Hartung Girod - Copyright Protection in Video Delivery Networks by Watermarking of Pre-Compressed Video/

ecmast97.ps.pdf

240.4 KB

/.../Hartung Girod - Digital watermarking of MPEG-2 coded video in the bitstream domain/

icassp97.ps.pdf

148.8 KB

/.../Hartung Girod - Digital Watermarking of Raw and Compressed Video/

berlin.ps.pdf

331.5 KB

/.../Hartung Girod - Fast public-key watermarking of compressed video/

icip97.ps.pdf

139.9 KB

/.../Hartung Girod - Watermarking of Uncompressed and Compressed Video/

sig_pro_66_3.ps.pdf

552.6 KB

/.../Hartung Kutter - Multimedia Watermarking Techniques/

ProcIEEEHartungKutter.pdf

1.4 MB

/.../Hartung Su Girod - Spread Spectrum Watermarking Malicious Attacks and Counterattacks/

attacks.ps.pdf

266.3 KB

/.../Holliman Memon - Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes/

publi_countr_wtrmrk.pdf

725.7 KB

/.../Honsinger Rabbani - Data Embedding Using Phase Dispersion/

dataEmbedding.pdf

720.8 KB

/.../Hopper Langford Ahn - Companion to Provably Secure Steganography/

companion-to-provably-secure.pdf

107.7 KB

/.../Hopper Langford Ahn - Provably Secure Steganography/

17.PDF

226.0 KB

/.../Hwang Shih Kao Chang - Lossy Compression Tolerant Steganography/

13.PDF

229.4 KB

/.../Jacobsen Solanki Madhow Manjunath Chandrasekaran - Image adaptive high volume data hiding based on scalar quantization/

image-adaptive-high-volume.pdf

207.9 KB

/.../Johnson - An Introduction to Watermark Recovery from Images/

NFJIDR99.PDF

963.5 KB

/.../Jung Seok Hong - An Improved Detection Technique for Spread Spectrum Audio Watermarking with a Spectral Envelope Filter/

25-01-08.PDF

781.7 KB

/.../Kailasanathan Naini Ogunbona - Compression Performance of JPEG Encryption Scheme/

compression-performance-of-jpeg.pdf

102.2 KB

/.../Kailasanathan Naini Ogunbona - Compression Tolerant DCT Based Image Hash/

compression-tolerant-dct-based.pdf

144.4 KB

/.../Kailasanathan Safavi-Naini Ogunbona - Fragile Watermark on Critical Points/

fragile-watermark-on-critical.pdf

202.5 KB

/.../Kailasanathan Safavi-Naini Ogunbona - Image Authentication Surviving Acceptable Modifications/

image-authentication-surviving-acceptable.pdf

144.7 KB

/.../Kankanhalli Hau - Watermarking of Electronic Text Documents/

Watermarking of text document.pdf

150.3 KB

/.../Karakos - Digital Watermarking, Fingerprinting and Compression An Information-Theoretic Perspective/

PhD_2002-5.pdf

661.7 KB

/.../Karakos Papamarcou - A Relationship Between Quantization and Watermarking Rates in the Presence of Gaussian Attacks/

01214075 A Relationship Between Quantization and.pdf

979.7 KB

TR_2001-50.pdf

400.1 KB

ciss2002_final.pdf

241.2 KB

/.../Karakos Papamarcou - Fingerprinting, Watermarking and Quantization of Gaussian Data/

ALLERTON.PDF

189.5 KB

/.../Karakos Papamarcou - Relationship between Quantization and Distribution Rates of Digitally Watermarked Data/

ISIT2000.PDF

112.3 KB

/.../Karakos Trahanias - Generalized Multichannel Image-Filtering Structures/

00597278 Generalized Multichannel Image-Filtering Structures.pdf

456.2 KB

/.../Karasaridis Simoncelli - A filter design technique for steerable pyramid image transforms/

karasaridis96.ps.pdf

156.9 KB

/.../Kesal Mihcak Koetter Moulin - Iteratively decodable codes for watermarking applications/

kesal00iteratively.pdf

162.5 KB

/.../Kim - Audio Watermarking Techniques/

Invite-Kim.pdf

193.2 KB

/.../Kim Baek Lee Suh - Robust Image Watermark Using Radon Transform and Bispectrum Invariants/

Robust Image WM using Rnd Transform And Bispectrum Invariants .pdf

254.3 KB

/.../Kim Perrig Tsudik - Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups/

CCS2000.PDF

250.8 KB

/.../Kirovski Attias - Audio Watermark Robustness to Desynchronization via Beat Detection/

Audio WM Robustness via Beat Detection.pdf

333.5 KB

wmbeatfinal.pdf

259.9 KB

/.../Kirovski Drinic Potkonjak - Hypermedia-Aided Design/

dac2001HAD.pdf

291.1 KB

/.../Kokes Gibson Orsak Stolpman - The method of types and lossy data-embedding/

kokes00method.pdf

333.3 KB

/.../Korjik Morales-Luna - Information Hiding through Noisy Channels/

Infromation Hiding Through Noisy Channels.pdf

145.3 KB

/.../Kugarajah Zhang - Multi-Dimensional Wavelet Frames/

TR_95-31.PDF

445.8 KB

/.../Kundur - Implications for High Capacity Data Hiding in the Presence of Lossy Compression/

kundur00implications.pdf

84.6 KB

/.../Kundur Hatzinakos - Mismatching Perceptual Models for Effective Watermarking in the Presence of Compression/

kundur99mismatching.pdf

376.5 KB

/.../Kutter Petitcolas - Fair Evaluation Methods for Image Watermarking Systems/

jei00-benchmark.pdf

343.3 KB

/.../Lai Kuo - Image quality measurement using the Haar wavelet/

lai97image.pdf

232.8 KB

/.../Lai Kuo Li - New Image Compression Artifact Measure Using Wavelets/

new-image-compression-artifact.pdf

271.8 KB

/.../Lambrecht Farrell - Perceptual Quality Metric for Digitally Coded Color Images/

vdb_eusipco96b.pdf

412.5 KB

/.../Le Desmedt - Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection/

CryptoAnalysis For UCLA WM Scheme.pdf

188.5 KB

/.../Le Nguyen - Digital Image Watermarking with Geometric Distortion Corrections Using the Moment Image Theory/

DIWM with Geometric Distort Correct using Moment Image Theory.pdf

124.8 KB

/.../Lee - An Adaptive Digital Image Watermarking Technique for Copyright Protection/

IS99-Watermarking.pdf

177.3 KB

/.../Lee Chen - Object-based image steganography using affine transformation/

23.PDF

905.3 KB

/.../Lee Chen - Secure error-free steganography for jpeg images/

24.PDF.!ut

662.9 KB

/.../Levy Merhav - An Image Watermarking Scheme Based on Information Theoretic Principles/

HPL-2001-13.pdf

407.4 KB

/.../Levy Shaked - A Transform Domain Hardcopy Watermarking Scheme/

HPL-2001-309.pdf

189.4 KB

/.../Li Chang - Security of Public Watermarking Schemes for Binary Sequences/

Security of Watermarking Technicues for Binary Sequences.pdf.!ut

174.5 KB

/.../Loo - Digital Watermarking using Complex Wavelets/

PatrickLooPhDThesis.pdf

2.0 MB

/.../Loo Kingsbury - Digital watermarking with complex wavelets/

PL_iee00.pdf

347.4 KB

/.../Lu Huang Sze Liao - A New Watermarking Technique for Multimedia Protection/

ch18.ps.pdf

1.0 MB

/.../Lu Liao - Oblivious cocktail watermarking by sparse code shrinkage a regional- and global-based scheme/

icip2000_3604.ps.pdf

272.3 KB

/.../Lu Liao - Oblivious watermarking using generalized gaussian/

cvprip00.ps.pdf

176.7 KB

/.../Lyu Farid - Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines/

lyu02detecting.pdf

246.8 KB

/.../McGuire - An image registration technique for recovering rotation, scale and translation parameters/

Image registration.pdf

311.0 KB

/.../Meerwald - Quantization watermarking in the JPEG2000 coding pipeline/

jpeg2000_meerwald.pdf

300.2 KB

/.../Meerwald Uhl - Watermark security viawavelet filter parametrization/

watermark-security-via-wavelet.pdf

637.5 KB

/.../Mehrabi - Digital Watermark/

Digital watermarking.pdf

183.5 KB

/.../Mei Wong Memon - Data Hiding in Binary Text Documents/

51.PDF.!ut

153.4 KB

/.../Memon Neuhoff Shende - Optimizing prediction gain in axial symmetric scans/

54.PDF.!ut

65.0 KB

/.../Memon Sayood - Facsimile/

fax_compress.pdf

191.8 KB

/.../Merhav - On Random Coding Error Exponents of Watermarking Codes/

HPL-98-169.pdf

261.4 KB

/.../Miller Cox Bloom - Informed embedding exploiting image and detector information during watermark insertion/

ICIP00.PDF

111.8 KB

/.../Miller Cox Linnartz - A review of watermarking principles and practices/

bookchapter99.pdf

236.0 KB

/.../Miller Doerr Cox - Applying Informed Coding and Embedding to Design a Robust, High Capacity Watermark/

millerIP2003.pdf

528.6 KB

/.../Miller Doerr Cox - Dirty-paper trellis codes forwatermarking/

icip02 v2.pdf

416.6 KB

miller2002.pdf

120.5 KB

/.../Miller Doerr Cox - Informed Embedding for Multi-bit Watermarks/

multi-bit watermarks.pdf

195.4 KB

/.../Miller Rodriguez Cox - Audio Fingerprinting Nearest Neighbor Search in High Dimensional Binary Spaces/

MMSP02.PDF

132.7 KB

/.../Mintzer Braudaway Bell - Opportunities for Watermarking Standards/

MINTZER.PDF

672.4 KB

/.../Moulin - The role of information theory in watermarking and its application to image watermarking/

Information theory in WM.PDF.!ut

270.2 KB

/.../Moulin Koetter - Data-Hiding Codes/

ProcIEEE05.pdf

1.3 MB

/.../Muntean Grivel Nafornita Najim - Audio digital watermarking for copyright protection/

L13.PDF

204.4 KB

/.../Muntean Grivel Najim - Watermark space partition for digital audio blind watermarking/

PAPER25.PDF

256.1 KB

/.../Nagai Ikehara Kaneko Kurematsu - Generalized Unequal Length Lapped Orthogonal Transform for Subband Image Coding/

ullotnagai.pdf

929.2 KB

/.../Nakai - Semi Fragile Watermarking Based on Wavelet Transform/

semifragile.pdf

136.3 KB

/.../Nakamura Tachibana Kobayashi - Automatic music monitoring and boundary detection for broadcast using audio watermarking/

Taiga_EI02Paper.pdf

98.5 KB

/.../Natarajan - Robust Public Key Watermarking of Digital Images/

HPL-97-118.pdf

196.7 KB

/.../Newman Moskowitz Chang Brahmadesam - A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis/

A Steganographic Embedding Undetectable.pdf

267.3 KB

/.../Nikolaidis Pitas - Copyright protection of images using robust digital signatures/

icassp96.ps.pdf

196.5 KB

/.../Nikolaidis Pitas - Facial feature extraction and pose determination/

NikolaidisA99a.pdf

304.6 KB

/.../Noda Spaulding Shirazi Niimi Kawaguchi - Bit-Plane Decomposition Steganography Combined with JPEG2000 Compression/

Bit-Plane Decomposition Steganography + JPEG2000.pdf

323.0 KB

/.../Oh Seok Hong Youn - New Echo Embedding Technique for Robust and Imperceptible Audio Watermarking/

PAP672.PDF

196.9 KB

/.../Ohbuchi Mukaiyama Takahashi - A Frequency-Domain Approach to Watermarking 3D Shapes/

26.PDF

617.9 KB

/.../Osberger Bergmann Maeder - An automatic image quality assessment technique incorporatinghigher level perceptual factors/

an-automatic-image-quality.pdf

691.5 KB

/.../Osberger Maeder Bergmann - A Technique For Image Quality Assessment Based On A Human Visual System Model/

osberger98technique.pdf

456.2 KB

/.../Osberger Maeder McLean - A Computational Model of the Human Visual System for Image Quality Assessment/

osberger97computational.pdf

222.1 KB

/.../Ozer Ramkumar Akansu - A New Method for Detection of Watermarks in Geometrically Distorted Images/

PAPER2.PDF

390.2 KB

/.../Pan Wu - A Novel Data Hiding Method for Two-Color Images/

@10 A Novel Data Hiding Method for Two-Color.pdf

229.7 KB

/.../Park Kim Kang Han - Digital Geographical Map Watermarking Using Polyline Interpolation/

geagraphical map watermarking.pdf

175.7 KB

/.../Pereira - Robust Digital Image Watermarking/

Pereira_thesis2000.pdf

914.6 KB

/.../Pereira Pun - A Framework for Optimal Adaptive DCT Watermarks/

PereiraPun_eusipco2000.pdf

116.7 KB

/.../Pereira Voloshynoskiy Pun - Optimal Transform Domain Watermark Embedding Via Linear Programming/

PereiraVoloshynovskiyPun_sigProc2001.pdf

269.4 KB

/.../Pereira Voloshynovskiy Madueno Marchand-Maillet Pun - Second generation benchmarking and application oriented evaluation/

PereiraVoloshynovskiyMaduenoMarchandPun_ihw2001.pdf

195.0 KB

/.../Perez-Gonzalez Balado - Multidimensional Distortion-Compensated Dither Modulation/

25780087.pdf

286.8 KB

/.../Perrig Canetti Song Tygar - Efficient and Secure Source Authentication for Multicast/

NDSS.PDF

142.9 KB

/.../Perrig Canetti Tygar Song - Efficient Authentication and Signing of Multicast Streams over Lossy Channels/

STREAM.PDF

260.3 KB

/.../Perrig Song Tygar - ELK a New Protocol for Efficient Large-Group Key Distribution/

ELK.PDF

176.7 KB

/.../Petitcolas Anderson - Evaluation of copyright marking systems/

ieeemm99-evaluation.pdf

149.4 KB

/.../Petrovic Winograd Jemili Metois - Data hiding within audio signals/

ILJA6.PDF

305.1 KB

/.../Picard - Probabilistic Argumentation Systems Applied to Information Retrieval/

phd_thesis.pdf

1.4 MB

/.../Picard Robert - Neural Networks Functions for Public Key Watermarking/

wat_IH01.pdf

307.1 KB

/.../Picard Robert - On the public key watermarking issue/

wat_spie_PK.pdf

195.7 KB

/.../Pitas - A Method For Signature Casting On Digital Images/

Pitas96a.ps.pdf

144.9 KB

/.../Pitas Kaskalis - Applying Signatures on Digital Images/

Kaskalis95.ps.pdf

147.7 KB

/.../Podilchuk Delp - Digital Watermarking Algorithms and Applications/

DWM - Algorithms & Applications.pdf

1.2 MB

/.../Provos - Defending Against Statistical Steganalysis/

provos01defending.pdf

317.7 KB

/.../Radhakrishnan Memon - Audio Content Authentication Based on Psycho-Acoustic Model/

44.PDF

120.7 KB

/.../Radhakrishnan Memon - On the security of the sari image authentication system/

SARI_CSVT.pdf

127.7 KB

/.../Rajaratnam Memon - Analysis of lsb based image steganography techniques/

46.PDF

69.8 KB

/.../Rey Doerr Csurka Dugelay - Toward generic image dewatermarking/

REY2002.PDF

1.0 MB

/.../Reyzin Russell - More Efficient Provably Secure Steganography/

reyzin03more.pdf

190.2 KB

/.../Richter Leier Banzhaf Rauhe - Private and Public Key DNA steganography/

PubKey.pdf

221.2 KB

/.../Roche Dugelay Molva - Multi-resolution access control algorithm based on fractal coding/

@1499 MULTI{RESOLUTION ACCESS CONTROL ALGORITHM BASED ON.pdf

435.7 KB

/.../Sequeira Kundur - Communication and Information Theory in Watermarking A Survey/

communication-and-information-theory.pdf

203.5 KB

/.../Setyawan - Attacks on Watermarking Systems/

Watermark_Attacks.pdf

221.1 KB

/.../Setyawan Lagendijk - Extended Differential Energy Watermarking XDEW algorithm for low bit-rate video watermarking/

extended-differential-energy-watermarking.pdf

256.4 KB

/.../Shaked Baharav - Watermark Rate and the Distortion of Error Diffused Halftones/

HPL-98-89R1.pdf

401.5 KB

/.../Shaked Levy Baharav Yen - A Visually Significant Two Dimensional Barcode/

HPL-2000-164R1.pdf

118.2 KB

/.../Shanmugasundaram Memon - Automatic Reassembly of Document Fragments via Data Compression/

42.PDF

206.2 KB

/.../Sharp - An Implementation of Key-Based Digital Signal Steganography/

Key Based Steganography.pdf

1.2 MB

/.../Shimanovsky Feng Potkonjak - Hiding Data in DNA/

Hiding Data in DNA.pdf

199.4 KB

/.../Shimizu - Performance Analysis of Data Hiding/

performance analysis.pdf

157.1 KB

/.../Silvestre Hurley Furon - Robustness and Efficiency of Non-linear Side-Informed Watermarking/

Robustness And Efficiency Of Non-linear WM.pdf

248.0 KB

/.../Simoncelli Freeman - The steerable pyramid a flexible architecture for multi-scale derivative computation/

simoncelli95b.ps.pdf

64.3 KB

/.../Simoncelli Freeman Adelson Heeger - Shiftable Multi-scale Transforms/

simoncelli91.ps.pdf

593.5 KB

/.../Sion - Power A Metric for Evaluating Watermarking Algorithms/

sion2002wmpower.pdf

105.3 KB

/.../Sion - Watermarking Multi-Content Aggregates/

talk-UNLV-2002.pdf

786.0 KB

/.../Sion - Watermarking non-media content/

talk-Seminar-CERIAS-2001.pdf

587.9 KB

/.../Sion Atallah - Attacking Digital Watermarks/

sion2003wmbounds.pdf

297.8 KB

/.../Sion Atallah Prabhakar - Key Commitment in Multimedia Watermarking/

TR-CERIAS-2002-30.pdf

140.4 KB

/.../Sion Atallah Prabhakar - On Watermarking Numeric Sets/

TR-CERIAS-2001-60.pdf

241.2 KB

/.../Sion Atallah Prabhakar - On Watermarking Semi-Structures/

on-watermarking-semi-structures.pdf

458.1 KB

/.../Sion Atallah Prabhakar - Rights Protection for Relational Data/

sion2003wmdb-tkde.pdf

286.3 KB

sion2002wmdb-sigmod.pdf

235.2 KB

/.../Sion Atallah Prabhakar - Watermarking Relational Databases/

TR-CERIAS-2002-28.pdf

318.9 KB

/.../Sojka - A New Algorithm for Direct Corner Detection in Digital Images/

techrep.zip

1.6 MB

part1.pdf

283.0 KB

/.../Solachidis Nikolaidis Pitas - Fourier descriptors watermarking of vector graphics images/

Solachidis00c.ps.pdf

105.4 KB

/.../Solachidis Nikolaidis Pitas - Watermarking polygonal lines using fourier descriptors/

Solachidis00a.ps.pdf

195.6 KB

/.../Solachidis Pitas - Circularly symmetric watermark embedding in 2-D DFT domain/

Solachidis99a.pdf

92.3 KB

/.../Solachidis Pitas - Self-similar ring shaped watermark embedding in 2-D DFT domain/

Solachidis00b.ps.pdf

167.8 KB

/.../Solanki Jacobsen Chandrasekaran Madhow Manjunath - High-volume data hiding in images introducing perceptual criteria into quantization based embedding/

solanki02highvolume.pdf

68.3 KB

/.../Stern Tillich - Automatic Detection of a Watermarked Document Using a Private Key/

Automatic Detection of Watermark Using The Private Key.pdf

223.8 KB

/.../Stone Tao McGuire - Analysis of image registration noise due to rotationally dependent aliasing/

Image aliasing.pdf

401.6 KB

/.../Su - Data Embedding and Digital Watermarking/

SU.PDF

587.2 KB

/.../Su Eggers Girod - Analysis of digital watermarks subjected to optimum linear filtering and additive noise/

SIGPROseg2001.pdf

560.2 KB

/.../Su Eggers Girod - Capacity of digital watermarks subjected to an optimal collusion attack/

DIWA_EUS2000SU.pdf

135.1 KB

/.../Su Eggers Girod - Illustration of the Duality Between Channel Coding and Rate Distortion with Side Information/

asilomar_duality.pdf

263.6 KB

/.../Su Eggers Girod - Optimum Attack on DigitalWatermarks and its Defense/

asilomar_attack.pdf

101.7 KB

/.../Su Hartung Girod - A Channel Model for a Watermark Attack/

ei99.ps.pdf

217.2 KB

/.../Su Wang Kuo - An Integrated Approach to Image Watermarking and JPEG-2000 Compression/

watermarking & JPEG2000.pdf

883.5 KB

/.../Suel Memon - Algorithms for Delta Compression and Remote File Synchronization/

DELTA.PDF

161.5 KB

/.../Sugihara - Practical Capacity of DigitalWatermarks/

Practical Capasity Of Digital Watermark.pdf

1.5 MB

/.../Sun Cui Wang - Research on Technology of Chaos Secrecy Communications in Digital Watermarking/

2.PDF

148.3 KB

/.../Swanson Zhu Tewfik - Multiresolution Scene-Based Video Watermarking Using Perceptual Models/

16sac04-swanson.pdf

290.3 KB

/.../Tachibana - Audio Watermarking for Live Performance/

Ryuki_EI03Paper.pdf

255.6 KB

/.../Tachibana - Improving Audio Watermark Robustness Using Stretched Patterns against Geometric Distortion/

improving aoudio watermarks.pdf

182.6 KB

/.../Tang - Audio Watermarking An Overview/

vdo_2002_12_05_ChihWeiTang_AudioWM.pdf

425.4 KB

/.../Tefas Nikolaidis Solachidis Tsekeridou Pitas - Performance analysis ofwatermarking schemes based on skew tent chaotic sequences/

Tefas01c.pdf

134.7 KB

/.../Tefas Pitas - Image authentication and tamper proofing using mathematical morphology/

Tefas00d.ps.pdf

117.2 KB

/.../Tefas Pitas - Image authentication using chaoticmixing systems/

Tefas00c.ps.pdf

227.6 KB

/.../Tefas Pitas - Multi-bit imagewatermarking robust to geometric distortions/

Tefas00a.ps.pdf

97.8 KB

/.../Thilak Nosratinia - Signal Design for Robust Watermarking on ISI Channels/

asilomar02_vimal.pdf

220.0 KB

/.../Toch Lowe Saad - Watermarking of audio signals using Independent Component Analysis/

wedel03_ica.pdf

72.1 KB

/.../Trahanias Karakos Venetsanopoulos - Directional processing of color images theory and experimental results/

00503905 Directional processing of color images.pdf

1.7 MB

/.../Trappe Wu Liu - Anti-Collusion Fingerprinting for Multimedia/

TR_2002-17.pdf

698.5 KB

/.../Trivedi Chandramouli - Active Steganalysis of Sequential Steganography/

active-steganalysis-of-sequential.pdf

531.2 KB

/.../Tsekeridou - Theoretic performance analysis of a watermarking system/

Tsekeridou01b.pdf

902.7 KB

/.../Tsekeridou Nikolaidis Sidiropoulos Pitas - Copyright protection of still images using self-similar chaotic watermarks/

Tsekeridou00d.ps.pdf

1.1 MB

/.../Tsekeridou Pitas - Wavelet-based self-similarwatermarking for still images/

Tsekeridou00a.ps.pdf

218.2 KB

/.../Tsekeridou Solachidis Nikolaidis Tefas Pitas - Bernoulli shift generated chaotic watermarks theoretic investigation/

Tsekeridou01a.pdf

109.9 KB

/.../Tsekeridou Solachidis Nikolaidis Tefas Pitas - Theoretic investigation of the use of watermark signals derived from bernoulli chaotic sequences/

Tsekeridou01c.pdf

452.9 KB

/.../Uludag - Visual Data Watermarking Based on Sinusoidal Signal Embedding/

uludag01visual.pdf

1.8 MB

/.../Uludag Arslan - Audio watermarking using dc level shifting/

uludag01audio.pdf

245.7 KB

/.../Venkatesan Kesal - Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks/

Cryptanalysis of Discrete-Sequence Spread.pdf

306.8 KB

/.../Venkatesan Koon Jakubowski Moulin - Robust image hashing/

ICIP00Hash.pdf

52.4 KB

/.../Voloshynovskiy Deguillaume Pun - Content Adaptive Watermarking Based On A Stochastic Multiresolution Image Modeling/

VoloshynovskiyDeguillaumePun_es2000.pdf

274.6 KB

/.../Voloshynovskiy Herrigel Baumgaertner Pun - A Stochastic Approach to Content Adaptive Digital Image Watermarking/

VoloshynovskiyHerrigelBaumgaertnerPun_wih99.pdf

913.1 KB

/.../Voloshynovskiy Herrigel Pun - Blur-Deblur Attack against Document Protection Systems Based on Digital Watermarking/

Blur Deblur Attack on watermarking.pdf

260.9 KB

/.../Voloshynovskiy Pereira Pun Eggers Su - Attacks on Digital Watermarks Classification, Estimation-based Attacks and Benchmarks/

IEEEcom2.pdf

285.0 KB

/.../Voyatzis Nikolaidis Pitas - Copyright protection of multimedia documents from theory to application/

Voyatzis98c.ps.pdf

282.5 KB

/.../Voyatzis Nikolaidis Pitas - Digital watermarking an overview/

Voyatzis98a.ps.pdf

191.5 KB

/.../Voyatzis Pitas - Application of toral automorphisms in image watermarking/

Voyatzis96b.pdf

301.1 KB

/.../Voyatzis Pitas - Chaotic mixing of digital images and applications to watermarking/

Voyatzis96a.ps.pdf

293.2 KB

/.../Voyatzis Pitas - Chaotic Watermarks for Embedding in the Spatial Digital Image Domain/

Voyatzis98b.ps.pdf

225.7 KB

/.../Voyatzis Pitas - Digital Image Watermarking using Mixing Systems/

voyatzis98digital.pdf

564.2 KB

/.../Voyatzis Pitas - Embedding Robust Watermarks by Chaotic Mixing/

Voyatzis97a.ps.pdf

162.3 KB

/.../Wang Shamma - Zero-crossings and noise supression in auditory wavelet transformations/

TR_92-94.PDF

1.5 MB

/.../Wang Su Kuo - Wavelet-based digital image watermarking/

wavelet based WM.pdf

235.3 KB

/.../Wang Wiederhold - WaveMark Digital Image Watermarking Using Daubechies Wavelets and Error Correcting Coding/

wang98wavemark.pdf

958.1 KB

/.../Wang Yang - Watermark Embedding Mechanism Using Modulus-based for Intellectual Property Protection on Image Data/

Watermark embedding mechanism.pdf

274.1 KB

/.../Watson - The Cortex Transform Rapid Computation of Simulated Neural Images/

CortexTransform.pdf

1.6 MB

/.../Westfeld - Detecting Low Embedding Rates/

Detecting Low Embedding Rates.pdf

424.4 KB

/.../Westfeld - F5 A Steganographic Algorithm High Capacity Despite Better Steganalysis/

F5 - Steganographic Algorithm.pdf

237.6 KB

/.../Wu Kuo - Fragile speech watermarking based on exponential scale quantization for tamper detection/

fragile-speech-watermarking-based.pdf

97.7 KB

/.../Wu Kuo - Fragile speech watermarking for content integrity verification/

fragile-speech-watermarking-for.pdf

150.2 KB

/.../Wu Kuo - Speech content authentication integrated with celp speech coders/

wu01speech.pdf

77.4 KB

/.../Wu Su Kuo - Robust and efficient digital audio watermarking using audio content analysis/

robust-and-efficient-digital.pdf

327.2 KB

/.../Yang Liao Hsieh - Watermarking MPEG-4 2D Mesh Animation in Multiresolution Analysis/

8.PDF

113.7 KB

/.../Yongliang Gao Yao Song - Secure Watermark Verification Scheme/

secure watermark verification.pdf

66.6 KB

/.../Zane - Efficient Watermark Detection and Collusion Security/

Efficient Detection.pdf

666.3 KB

/.../Zhang Ping - A Fast and Effective Steganalytic Technique against JSteg-like Algorithms/

zhang03fast.pdf

1.4 MB

/.../Zhang Xiong Wang - Hiding a Logo Watermark in an Image for Its Copyright Protection/

1 Hiding a Logo Watermark in an Image for Its.pdf

12.7 KB

/.../Zhuang Baras - Existence and Construction of Optimal Wavelet Basis for Signal Representation/

TR_94-28.PDF

1.9 MB

/.../Zhuang Baras - Optimal Wavelet Basis Selection for Signal Representation/

TR_94-3.PDF

237.3 KB

/.../Calderbank Daubechies Sweldens Yeo - Wavelet transforms that map integers to integers/

Integer to integer DWT.PDF

280.2 KB

/.../Chao - Reversible wavelet transform for image compression/

wavelet transform for image compression.ps

896.3 KB

/.../Forsberg Johansson - Wavelets and Wavelet Packets/

forsberg99wavelets.pdf

2.3 MB

/.../Polikar - The wavelet tutorial/

Polikar - The wavelet tutorial.7z

44.6 KB

/.../Sweldens - The lifting scheme a construction of second generation wavelets/

Lifting Scheme - second generation wavelet.PDF

335.2 KB

/.../Sweldens - The Lifting Scheme A New Philosophy in Biorthogonal Wavelet Constructions/

Biorthogonal wavelet construction.pdf

177.5 KB

/.../Sweldens - Wavelets and the Lifting Scheme A 5 Minute Tour/

Quick wavelet tour.pdf

162.5 KB

/.../Zhu Yang Tewfik Kieffer - Efficient coding of wavelet trees and its applications in image coding/

wavelet trees in image coding.ps

241.4 KB

/.../Левкович-Маслюк Переберин - Курс по Вейвлет анализу/

wavelet.7z

936.5 KB

/.../Хорун - Введение в теорию вэйвлетов/

Wavelet.7z

288.0 KB

/.../!Wavelet Analysis and Its Applications Second International Conference Proceedings/

wavelet_analysis_.pdf

11.8 MB

/.../AACS Introduction and Common Cryptographic Elements/

AACS_Spec_Common_0.91.pdf

549.7 KB

/.../Chen Ge Zhang Kurose Towsley - On Dynamic Subset Difference Revocation Scheme/

10.1.1.3.7551.pdf

262.4 KB

/.../DELL - blu-ray disc next-generation optical storage protecting content on the bd-rom/

brcp.pdf

261.5 KB

/.../Dodis Fazio - Public Key Broadcast Encryption for Stateless Receivers/

10.1.1.67.2744.pdf

227.8 KB

/.../Duan Canny - How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack/

10.1.1.71.8680.pdf

540.8 KB

/.../Fazio - On Cryptographic Techniques for Digital Rights Management/

10.1.1.74.4329.pdf

1.3 MB

/.../Frolova Simakov - Matching with Invariant Features/

ppt-InvariantFeatures.pdf

3.4 MB

/article/MPEG/

mpeg.ZIP

788.8 KB

/.../Naor Naor Lotspiech - Revocation and Tracing Schemes for Stateless Receivers/

2nl.pdf

2.3 MB

/.../Wallace - The JPEG Still Picture Compression Standard/

Wallace.JPEG.pdf

79.1 KB

/article/Арифметическое кодирование/

arithm.rar

17.1 KB

/.../Заметки Крикса об алгоритме декодирования JPEG/

jpeg-rus.zip

26.4 KB

/.../Cichocki Amar - Introduction to Blind Signal Processing Problems and Applications/

WILEY - Introduction to Blind Signal Processing Problems & Applications.pdf

4.7 MB

/.../Cichocki Amari - Adaptive Blind Signal And Image Processing/

Cichocki, Amari - Adaptive Blind Signal And Image Processing - Wiley.pdf

25.2 MB

/.../Cole - Hiding in Plain Sight Steganography and the Art of Covert Communication/

Hiding.In.Plain.Sight.Steganography.And.The.Art.Of.Covert.Communication.eBook-LiB.pdf

8.0 MB

/.../Cox Miller Bloom Fridrich Kalker - Digital Watermarking and Steganography/

Digital Watermarking and Steganography.pdf

10.5 MB

/.../Erhardt Ferron - Theory and Applications of Digital Image Processing/

Theory and Applications of Digital Image Processing.pdf

725.8 KB

/.../Farid - Fundamentals of Image Processing/

[ebook] (Computer Graphics) Fundamentals of Image Processing.pdf

1.4 MB

/.../Hayes - Digital Signal Processing/

McGraw-Hill - Digital Signal Processing (Schaum's Outlines, OCR) - 1999 - (By Laxxuss).pdf

7.0 MB

/.../Image Processing Toolbox For Use with MATLAB User’s Guide/

MATLAB Image Processing Toolbox.pdf

11.1 MB

/.../Ingle Proakis - Digital Signal Processing Using Matlab V4/

Digital Signal Processing Using Matlab V4 (Ingle & Proakis 1997).pdf

12.8 MB

/.../Jahne - Digital Image Processing/

Springer-- Digital Image Processing- Bernd Jahne.pdf

20.8 MB

/.../Menezes - Handbook of applied cryptography/

Alfred J. Menezes - Handbook of applied cryptography (eng).pdf

4.9 MB

A.Menezes,_ Handbook of applied cryptography.djvu

4.0 MB

/.../Mertins - Signal Analysis Wavelets, Filter Banks, Time-Frequency Transforms and Applications/

Signal Analysis - Wavelets, Filter Banks, Time-Frequency Transforms and Applications.pdf

12.6 MB

/.../Pratt - Digital image processing/

Addison Wesley - Digital Image Processing (2nd Edition).pdf

18.3 MB

/.../Rabiner Schafer - Digital Processing Of Speech Signals/

Prentice Hall - Digital Processing Of Speech Signals.pdf

37.4 MB

/.../Ritter Wilson - Handbook of Computer Vision Algorithms in Image Algebra/

(Ebook) Algorithms - Handbook Of Computer Vision Algorithms In Image Algebra.pdf

20.8 MB

/.../Rowe - Multivariable Bayesian statistics Models for source separation and signal unmixing/

Rowe D.B. Multivariable Bayesian statistics.. models for source separation and signal unmixing (C.djv

1.6 MB

/.../Russ - Image processing handbook/

CRC Press - Image Processing Handbook, 3rd Edition.pdf

101.7 MB

/.../Sangwine Horn - Colour Image Processing Handboook/

Colour Image Processing Handboook, Sangwine and Horn(Edts.).pdf

24.8 MB

/.../Stark - Wavelets and Digital Image Processing/

Wavelets & Digital Image Processing.pdf

365.0 KB

/.../Айфичер Джервис - Цифровая обработка сигналов/

Айфичер Э. Джервис Б. Цифровая обработка сигналов. Практический подход. 2-е издание.djvu

9.8 MB

/.../Анисимов Курганов Злобин - Распознавание и цифровая обработка изображений/

Raspozn_i_obrab.djvu

5.3 MB

/.../Астафьева - Вейвлет-анализ основы теории и примеры применения/

Astafeva1996ru.djvu

669.6 KB

/.../Баричев Серов - Основы современной криптографии/

Barichev.Osnovi Sovremennoj Kryptografii.djvu

833.1 KB

/.../Бердышев Петрак - Аппроксимация функций Сжатие численной информации/

Berdyshev Petrak - Approksimaciya funkcij (1999).djvu

3.0 MB

/.../Брассар - Современная криптология/

Brassar Zh. (_Brassard_) Sovremennaja kriptologija (1999)(ru)(T)(178s).djvu

2.1 MB

/.../Брейсуэлл - Преобразование Хартли/

hartley.djvu

2.0 MB

/.../Брюс Шнайер - Прикладная криптография/

2.PDF

625.1 KB

4.PDF

550.6 KB

7.PDF

520.6 KB

6.PDF

395.1 KB

5.PDF

392.2 KB

3.PDF

356.3 KB

9.PDF

349.3 KB

8.PDF

79.0 KB

1.PDF

61.9 KB

/.../Гонсалес Вудс - Цифровая обработка изображения/

Gonzalez.Woods.Digital.Image.Processing.djvu

18.7 MB

/.../Гонсалес Вудс Эддинс - Цифровая обработка изображений в среде MATLAB/

dipum.djvu

12.3 MB

/.../Грузман Киричук Косых Перетягин Спектор - Цифровая обработка изображений в информационных системах/

Цифровая обработка изображений в информационных системах.pdf

44.7 MB

/.../Добеши - Десять лекций о вейвлетах/

dleex.djvu

2.7 MB

/.../Зубов - Совершенные шифры/

Зубов А.Ю. - Совершенные шифры (2003)(T)(O).djvu

1.1 MB

/.../Миано - Форматы и алгоритмы сжатия изображений в действии/

Miano-AlgZhat.djvu

3.5 MB

/.../Новиков - Основы вейвлет анализа сигналов/

glava1.pdf

994.4 KB

glava3.pdf

793.7 KB

glava21.pdf

742.5 KB

glava22.pdf

633.5 KB

titul.pdf

332.2 KB

contens.pdf

22.9 KB

/.../Прэтт - Цифровая обработка изображений/

Прэтт Уильям_Цифровая обработка изображений.djvu

12.4 MB

/.../Рябко Фионов - Основы современной криптографии/

The_base_of_modern_cryptography.djvu

8.0 MB

/.../Скворцов - Триангуляция Делоне и её применение/

09.pdf

2.7 MB

/.../Уэлстид - Фракталы и вейвлеты для сжатия изображений в действии/

FractalWavelet.djvu

6.9 MB

fractalCD.rar

595.3 KB

/book/Цифровая стеганография/

stego.zip

1.7 MB

/.../Чуи - введение в вейвлеты/

Chui K. (_C.K.Chui_) Vvedenie v vejvlety (Mir, 2001)(ru)(K)(T)(412s)_MNw_.djvu

3.1 MB

/.../Яне - Цифровая обработка изображений/

DIPyane.djvu

12.7 MB

/.../Ярославский - Введение в цифровую обработку изображений/

Jaroslavski-CifrObrab.djvu

4.6 MB

 

Total files 499


Copyright © 2024 FileMood.com