


default search action
5. SWMC 2003: Santa Clara, California, USA
- Edward J. Delp III, Ping Wah Wong:

Security and Watermarking of Multimedia Contents V, Santa Clara, CA, USA, January 20, 2003. SPIE Proceedings 5020, SPIE 2003, ISBN 978-0-8194-4820-0
Audio
- Michiel van der Veen, Fons Bruekers, Arno J. van Leest, Stephane Cavin:

High capacity reversible watermarking for audio. 1-11 - Christian Neubauer, Martin Steinebach, Frank Siebenhaar, Joerg Pickel:

Robustness evaluation of transactional audio watermarking systems. 12-20 - Zheng Liu, Yoshiyuki Kobayashi, Shusaku Sawato, Akira Inoue:

Robust audio watermark method using sinusoid patterns based on pseudo-random sequences. 21-31 - Ryuki Tachibana:

Audio watermarking for live performance. 32-43 - Martin Steinebach, Jana Dittmann:

Capacity-optimized mp2 audio watermarking. 44-54 - Hamza Özer, Ismail Avcibas, Bülent Sankur, Nasir D. Memon

:
Steganalysis of audio based on audio quality metrics. 55-66 - Kaliappan Gopalan, Stanley J. Wenndt, Scott F. Adams, Darren M. Haddad:

Audio steganography by amplitude or phase modification. 67-76
Perceptual Techniques
- Sergi Ventosa

, Elisa Sayrol
, Josep Vidal:
Perceptual mask estimation from watermarked images. 77-84 - Iwan Setyawan

, Damien Delannay, Benoît Macq, Reginald L. Lagendijk:
Perceptual quality evaluation of geometrically distorted images using relevant geometric transformation modeling. 85-94 - Chih-Wei Tang, Hsueh-Ming Hang:

Exploring effective coefficients in transform-domain perceptual watermarking. 95-106 - Abdelhakim Saadane:

Watermark strength determination based on a new contrast masking model. 107-114 - Justin Picard, Arnaud Robert:

Optimizing watermark robustness with respect to a perceptual distortion constraint. 115-122
Steganalysis
- Shalin P. Trivedi, Rajarathnam Chandramouli

:
Active steganalysis of sequential steganography. 123-130 - Jeremiah J. Harmsen, William A. Pearlman

:
Steganalysis of additive-noise modelable information hiding. 131-142 - Jessica J. Fridrich, Miroslav Goljan, Dorin Hogea:

New methodology for breaking steganographic techniques for JPEGs. 143-155 - Roman Tzschoppe, Robert Bäuml, Johannes B. Huber, André Kaup

:
Steganographic system based on higher-order statistics. 156-166 - Jeffrey A. Bloom, Rafael Alonso:

SmartSearch steganalysis. 167-172 - Rajarathnam Chandramouli

, Nasir D. Memon
:
Steganography capacity: a steganalysis perspective. 173-177 - Jessica J. Fridrich, Miroslav Goljan, David Soukal:

Higher-order statistical steganalysis of palette images. 178-190 - Jessica J. Fridrich, Miroslav Goljan:

Digital image steganography using stochastic modulation. 191-202 - Jeroen Lichtenauer, Iwan Setyawan

, Ton Kalker, Reginald L. Lagendijk:
Exhaustive geometrical search and the false positive watermark detection probability. 203-214
Benchmarking
- Tony Rodriguez, David Cushman:

Optimized selection of benchmark test parameters for image watermark algorithms based on Taguchi methods and corresponding influence on design decisions for real-world applications. 215-228
Biometrics and Smart Cards
- Jean-Jacques Quisquater, David Samyde:

Signal processing for smart cards. 229-239 - Claus Vielhauer, Lucilla Croce Ferri:

Applications of a hologram watermarking protocol: aging-aware biometric signature verification and time validity check with personal documents. 240-248 - Jung-Jin Kim, Jin-Hyuk Choi, Eun-Soo Kim:

Implementation of ID card system using optodigital information hiding scheme. 249-259 - Naseem Ishaq Qazi:

Biometric data reduction for embedding in small images. 260-268
Embedding and Detection
- Gordon W. Braudaway, Frederick C. Mintzer:

Application of blurring filters to improve detection of invisible image watermarks. 269-277 - Gaëtan Le Guelvouit, Stéphane Pateux:

Wide spread spectrum watermarking with side information and interference cancellation. 278-289 - Mauro Barni, Franco Bartolini, Alessia De Rosa:

Advantages and drawbacks of multiplicative spread spectrum watermarking. 290-299 - Bijan G. Mobasseri:

Watermarking Wigner distribution. 300-310 - Jonathan Delhumeau, Teddy Furon, Neil J. Hurley

, Guénolé C. M. Silvestre:
Improved polynomial detectors for side-informed watermarking. 311-321 - Seong Geun Kwon, Ki-Ryong Kwon, Kuhn-Il Lee:

Watermark detection algorithm in multimedia using statistical decision theory. 322-329 - Christian Rey, Karine Amis

, Jean-Luc Dugelay
, Ramesh Pyndiah, Annie Picart:
Enhanced robustness in image watermarking using turbo codes. 330-336 - Oliver Benedens, Jana Dittmann, Fabien A. P. Petitcolas

:
3D watermarking design evaluation. 337-348 - Choong-Hoon Lee, Heung-Kyu Lee, Young-Ho Suh:

Autocorrelation-function-based watermarking with side information. 349-358 - Michael Voigt, Christoph Busch:

Feature-based watermarking of 2D vector data. 359-366 - Akiomi Kunisa:

Informed digital watermark embedding based on guided scrambling. 367-378
Applications
- Alessandro Piva

, Franco Bartolini, Iuve Coppini, Alessia De Rosa, Elena Tamburini:
Analysis of data hiding technologies for medical images. 379-390 - Jessica Fang, Miodrag Potkonjak:

Real-time watermarking techniques for sensor networks. 391-402 - Martin Schmucker, Hongning Yan:

Music score watermarking by clef modifications. 403-412 - Norberto Degara-Quintela, Fernando Pérez-González

:
Visible encryption: using paper as a secure channel. 413-422 - Ping Wah Wong:

Multiresolution binary image embedding. 423-429 - Osama M. Alattar, Alastair Reed:

Watermarking spot colors. 430-439
Video
- Adnan M. Alattar, Mehmet Utku Celik

, Eugene T. Lin:
Evaluation of watermarking low-bit-rate MPEG-4 bit streams. 440-451 - Andreas Lang, Stefan Thiemert, Enrico Hauer, Huajian Liu, Fabien A. P. Petitcolas:

Authentication of MPEG-4 data: risks and solutions. 452-461 - Hye-Joo Lee, Jin Woo Hong:

Video watermarking system using selection and overlapping of region by features of consecutive frames. 462-470 - Emmanuel Garcia, Jean-Luc Dugelay

:
Watermark recovery from 2D views of a 3D video object. 471-480 - Damien Delannay, Cédric De Roover, Benoît Macq:

Temporal alignment of video sequences for watermarking systems. 481-492 - Eugene T. Lin, Edward J. Delp III

:
Temporal synchronization in video watermarking: further studies. 493-504 - Ahmet M. Eskicioglu, Scott D. Dexter

, Edward J. Delp III
:
Protection of multicast scalable video by secret sharing: simulation results. 505-515 - Shiau-Jen Weng, Ta-Te Lu, Pao-Chi Chang:

Key-based video watermarking system on MPEG-2. 516-525
Digital Cinema
- Arno J. van Leest, Jaap Haitsma, Ton Kalker:

On digital cinema and watermarking. 526-535 - Jeffrey Lubin, Jeffrey A. Bloom, Hui Cheng:

Robust content-dependent high-fidelity watermark for tracking in digital cinema. 536-545 - John P. Lixvar:

Watermarking requirements for Boeing digital cinema. 546-552 - Philippe Nguyen, Raphaèle Balter, Nicolas Montfort, Séverine Baudry:

Registration methods for nonblind watermark detection in digital cinema applications. 553-562 - Xavier Orri, Joan-Maria Mas, Benoît Macq:

Digital rights language support for evolving digital cinema requirements. 563-573 - Xiaolin Wu:

Semantically transparent fingerprinting for right protection of digital cinema. 574-579
Theoretical Methods
- Sviatoslav Voloshynovskiy

, Oleksiy J. Koval, Frédéric Deguillaume, Thierry Pun:
Data hiding capacity analysis for real images based on stochastic nonstationary geometrical models. 580-593 - Marcel Ambroze

, Martin Tomlinson, Cristian Vasile Serdean, Graham Wade:
Limits of error correction coding in video watermarking. 594-603 - Ton Kalker, Frans M. J. Willems:

Capacity bounds and constructions for reversible data-hiding. 604-611 - Robert Bäuml, Roman Tzschoppe, André Kaup

, Johannes B. Huber:
Optimality of SCS watermarking. 612-622 - Félix Balado, Fernando Pérez-González

:
Hexagonal quantizers are not optimal for 2D data hiding. 623-631 - Brett A. Bradley, John Stach:

New wrinkle in dirty paper techniques. 632-643
Authentication
- Regunathan Radhakrishnan, Ziyou Xiong, Nasir D. Memon

:
Security of visual hash function. 644-652 - Jana Dittmann, Oliver Benedens:

Invertible authentication for 3D meshes. 653-664 - Masahiko Suzaki, Yasuhiro Mitsui, Masayuki Suto:

New alteration detecting technique for printed documents using dot pattern watermarking. 665-676 - André Adelsbach, Ahmad-Reza Sadeghi:

Advanced techniques for dispute resolving and authorship proofs on digital works. 677-688 - Mehmet Utku Celik

, Gaurav Sharma, A. Murat Tekalp
, Eli Saber:
Localized lossless authentication watermark (LAW). 689-698
Embedding and Detection II
- Hugh Brunk:

Host-aware spread spectrum watermark embedding techniques. 699-707 - Qing Chen, Henri Maître, Béatrice Pesquet-Popescu:

Oblivious image watermarking combined with JPEG compression. 708-716 - Julià Minguillón

, Jordi Herrera-Joancomartí
, David Megías
:
Empirical evaluation of a JPEG2000 standard-based robust watermarking scheme. 717-727 - Werner Dietl, Peter Meerwald

, Andreas Uhl:
Key-dependent pyramidal wavelet domains for secure watermark embedding. 728-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














