default search action
4. SWMC 2002: San Jose, California, USA
- Edward J. Delp III, Ping Wah Wong:
Security and Watermarking of Multimedia Contents IV, San Jose, CA, USA, January 19, 2002. SPIE Proceedings 4675, SPIE 2002, ISBN 978-0-8194-4415-8
Special Session: Steganalysis
- Jessica J. Fridrich, Miroslav Goljan:
Practical steganalysis of digital images: state of the art. 1-13 - Rajarathnam Chandramouli:
Mathematical approach to steganalysis. 14-25 - Joachim J. Eggers, Robert Bäuml, Bernd Girod:
Communications approach to image steganography. 26-37 - Pierre Guillon, Teddy Furon, Pierre Duhamel:
Applied public-key steganography. 38-49 - Stefan Katzenbeisser, Fabien A. P. Petitcolas:
Defining security in steganographic systems. 50-56 - Sviatoslav Voloshynovskiy, Alexander Herrigel, Yuri B. Rytsar, Thierry Pun:
StegoWall: blind statistical detection of hidden data. 57-68 - Rajarathnam Chandramouli, Grace Li, Nasir D. Memon:
Adaptive steganography. 69-78
Audio Watermarking
- Martin Steinebach, Andreas Lang, Jana Dittmann:
StirMark Benchmark: audio watermarking attacks based on lossy compression. 79-90 - Michael Arnold, Kai Schilz:
Quality evaluation of watermarked audio tracks. 91-101 - Neil J. Hurley, Guénolé C. M. Silvestre:
Nth-order audio watermarking. 102-109 - Regunathan Radhakrishnan, Nasir D. Memon:
Audio content authentication based on psycho-acoustic model. 110-117
Text and Printing
- Burt Perry, Brian MacIntosh, David Cushman:
Digimarc MediaBridge: the birth of a consumer product from concept to commercial application. 118-123 - Yuji Honjo, Kiyoshi Tanaka:
Digital watermarking scheme for extremely high-resolution printing images. 124-131 - Essam A. El-Kwae, Li Cheng:
HIT : a new approach for hiding multimedia information in text. 132-140 - Heajoung Yoo, Seungchul Seo, Sangjin Lee, Jongin Lim:
Practical off-line authentication. 141-148 - Christoph Busch, Stephen D. Wolthusen:
Sensitivity labels and invisible identification markings in human-readable output. 149-157
Speech and Music
- Chung-Ping Wu, C.-C. Jay Kuo:
Comparison of two speech content authentication approaches. 158-169 - Taiga Nakamura, Ryuki Tachibana, Seiji Kobayashi:
Automatic music monitoring and boundary detection for broadcast using audio watermarking. 170-180 - Christoph Busch, Paolo Nesi, Martin Schmucker, Marius B. Spinu:
Evolution of music score watermarking algorithm. 181-193 - Daisuke Inoue, Tsutomu Matsumoto:
Scheme of standard MIDI files steganography and its evaluation. 194-205 - Martin Schmucker:
Capacity improvement for a blind symbolic music score watermarking technique. 206-213
Color Watermarking Techniques
- Josep Vidal, Maribel Madueño, Elisa Sayrol:
Color image watermarking using channel-state knowledge. 214-221 - Alastair Reed, Brett T. Hannigan:
Adaptive color watermarking. 222-229 - Patrizio Campisi, Deepa Kundur, Dimitrios Hatzinakos, Alessandro Neri:
Hiding-based compression for improved color image coding. 230-239
Special Session: Protocols
- Jana Dittmann, Martin Steinebach, Lucilla Croce Ferri:
Watermarking protocols for authentication and ownership protection based on timestamps and holograms. 240-251 - Scott Craver:
Return of ambiguity attacks. 252-259 - Stefan Katzenbeisser, Helmut Veith:
Securing symmetric watermarking schemes against protocol attacks. 260-268 - Caroline Fontaine, Frédéric Raynal:
Links between cryptography and information hiding. 269-280
Attacks
- Robert Bäuml, Joachim J. Eggers, Roman Tzschoppe, Johannes B. Huber:
Channel model for watermarks subject to desynchronization attacks. 281-292 - Peter Meerwald, Shelby Pereira:
Attacks, applications, and evaluation of known watermarking algorithms with Checkmark. 293-304 - Jin S. Seo, Chang D. Yoo:
Design of template in the autocorrelation domain. 305-312 - Frédéric Deguillaume, Sviatoslav Voloshynovskiy, Thierry Pun:
Method for the estimation and recovering from general affine transforms in digital watermarking applications. 313-322 - Changryoul Choi, Jechang Jeong:
Robust image watermarking scheme resilient to desynchronization attacks. 323-333
Transform Methods
- Ki-Ryong Kwon, Ahmed H. Tewfik:
Adaptive watermarking using successive subband quantization and perceptual model based on multiwavelet transform. 334-348 - Dominique A. Winne, Henry D. Knowles, David R. Bull, Cedric Nishan Canagarajah:
Digital watermarking in wavelet domain with predistortion for authenticity verification and localization. 349-356 - Dominique A. Winne, Henry D. Knowles, David R. Bull, Cedric Nishan Canagarajah:
Compression-compatible digital watermark algorithm for authenticity verification and localization. 357-367 - Pao-Chi Chang, Ta-Te Lu, Li-Lin Lee:
Blockwise image watermarking system with selective data embedding in wavelet transform domain. 368-377 - Florent Autrusseau, Jean-Pierre V. Guédon:
Image watermarking for copyright protection and data hiding via the Mojette transform. 378-386
Theoretical Models
- Joachim J. Eggers, Robert Bäuml, Bernd Girod:
Estimation of amplitude modifications before SCS watermark detection. 387-398 - Jim Chou, Kannan Ramchandran, S. Sandeep Pradhan:
Turbo-coded trellis-based constructions for data hiding. 399-408 - Mauro Barni, Franco Bartolini, Alessia De Rosa, Alessandro Piva:
Optimum decoding and detection of a multiplicative amplitude-encoded watermark. 409-420 - Shuichi Shimizu:
Performance analysis of information hiding. 421-432 - Ruizhen Liu, Tieniu Tan:
Theoretical framework for watermark capacity and energy estimation. 433-440 - Youngha Hwang, Kyung A. Moon, Myung J. Kim:
Watermark design for the Wiener attack and whitening filtered detection. 441-449 - Soo-Chang Pei, Jun-Horng Chen:
Improved watermarking scheme by reference signal mingling. 450-457
Video Techniques
- Matthew J. Holliman, Minerva M. Yeung:
Watermarking for automatic quality monitoring. 458-469 - Eric Debes, Matthew J. Holliman, William Macy, Yen-Kuang Chen, Minerva M. Yeung:
Computational analysis and system implications of video watermarking applications. 470-477 - Eugene T. Lin, Edward J. Delp III:
Temporal synchronization in video watermarking. 478-490 - Karen Su, Deepa Kundur, Dimitrios Hatzinakos:
Novel approach to collusion-resistant video watermarking. 491-502 - Han Ho Lee, Jong J. Chae, Jong-Uk Choi:
Real-time video watermarking technique. 503-511 - Xiamu Niu, Martin Schmucker, Christoph Busch:
Video watermarking resistance to rotation, scaling, and translation. 512-519 - Iwan Setyawan, Geerd Kakes, Reginald L. Lagendijk:
Synchronization-insensitive video watermarking using structured noise pattern. 520-530 - Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp, Eli Saber:
Video authentication with self-recovery. 531-541 - Jan C. Vorbrüggen, Niels J. Thorwirth:
Digital watermarking for secure and adaptive teleconferencing. 542-547
Embedding
- Damien Delannay, Benoît Macq:
Method for hiding synchronization marks in scale- and rotation-resilient watermarking schemes. 548-554 - Gordon W. Braudaway, Frederick C. Mintzer:
Application of composite invisible image watermarks to simplify detection of a distinct watermark from a large set. 555-562 - Hiuk Jae Shim, Byeungwoo Jeon:
Rotation-, scaling-, and translation-robust image watermarking using Gabor kernels. 563-571 - Jessica J. Fridrich, Miroslav Goljan, Rui Du:
Lossless data embedding for all image formats. 572-583 - Chih-Wei Tang, Hsueh-Ming Hang:
Image-feature-based robust digital watermarking scheme. 584-595 - Wolfgang Funk:
Image watermarking in the Fourier domain based on global features of concentric ring areas. 596-599 - Jean-Marie Moureaux, Ludovic Guillemot:
Image compression and watermarking using lattice vector quantization. 600-610
Applications
- John Stach, Trenton J. Brundage, Brett T. Hannigan, Brett A. Bradley, Tony Kirk, Hugh Brunk:
Use of web cameras for watermark detection. 611-620 - Michael Voigt, Christoph Busch:
Watermarking 2D-vector data for geographical information systems. 621-628 - Lucilla Croce Ferri, Astrid Mayerhöfer, Marcus Frank, Claus Vielhauer, Ralf Steinmetz:
Biometric authentication for ID cards with hologram watermarks. 629-640 - Takami Satonaka:
Biometric watermarking based on face recognition. 641-651 - Volker Roth, Michael Arnold:
Improved key management for digital watermark monitoring. 652-658
Fragile Watermarking
- Kurato Maeno, Qibin Sun, Shih-Fu Chang, Masayuki Suto:
New semifragile image authentication watermarking techniques using random bias and nonuniform quantization. 659-670 - Yuichi Nakai:
Multivalued semifragile watermarking. 671-678 - Jun Tian:
Wavelet-based reversible watermarking for authentication. 679-690 - Jessica J. Fridrich:
Security of fragile authentication watermarks with localization. 691-700 - Dinu Coltuc, Philippe Bolon, Jean-Marc Chassery:
Fragile and robust watermarking by histogram specification. 701-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.