Exportar 110 resultados:
[ Autor
Filtros: Clave es watermarking [Elimina todos los filtros]
«Improving the performance of RDM watermarking by means of trellis coded quantisation», IEE Proceedings on Information Security, vol. 153, pp. 107-114, 2006.
, «Analysis of Pilot-Based Synchronization Algorithms for Watermarking of Still Images», Signal Processing: Image Communication, vol. 17, pp. 661-633, 2002.
, «Coding at the Sample Level for Data Hiding: Turbo and Concatenated Codes», in Security and Watermarking of Multimedia Contents, San José, USA, 2001, vol. 4314, pp. 532–543.
, «On Distortion Measures Associated to Random Desynchronization Attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, «Blind Turbo Decoding of Side-Informed Data Hiding Using Iterative Channel Estimation», in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Lisboa, 2004.
, «Hexagonal Quantizers are not Optimal for 2-D Data Hiding», in Security and Watermarking of Multimedia Contents, Santa Clara, USA, 2003, vol. 5020.
, «Provably or Probably Robust Data Hiding?», in IEEE International Conference on Multimedia and Expo (ICME), Lausanne, Switzerland, 2002.
, «Digital image data hiding using side information», University of Vigo, Spain, 2003.
, «Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 805-815.
spie04em.pdf (434.03 KB)
, 
«Turbo Coding for Sample-Level Watermarking in the DCT Domain», in IEEE International Conference on Image Processing (ICIP), Thessaloniki, Greece, 2001, pp. 1003–1006.
, «Are you threatening me? Towards smart detectors in watermarking», in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014.
spie14_2.0.pdf (430.73 KB)
, 
«Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Honolulu, HW, USA, 2007, vol. 4, pp. 1261-1264.
icassp07reproducible.pdf (67.03 KB)
, 
«Statistical Analysis of a Linear Algebra Asymmetric Watermarking Scheme», in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
, «Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
spie05_dpc.pdf (165.56 KB)
, 
«Two different approaches for attacking BOWS», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
spie07bows.pdf (416.45 KB)
, 
«Weber's law-based side-informed data hiding», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, 2011, pp. 1840-1843.
comesanaicassp11.pdf (119.42 KB)
, 
«On a watermarking scheme in the logarithmic domain and its perceptual advantages», in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
icip07logwat.pdf (77.03 KB)
, 
«Side-informed data hiding: robustness and security analysis», University of Vigo, Spain, 2006.
thesis_pedro.pdf (2.18 MB)
, 
«Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime», IEEE Transactions on Information Theory, vol. 56, pp. 2804-2815, 2010.
tit-2010.pdf (240.81 KB)
, 
«The return of the sensitivity attack», in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274.
iwdw05.pdf (190.47 KB)
, 
«Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 592-601.
spie04.ps (572.73 KB)
, 
«Blind Newton Sensitivity Attack», IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006.
iee-06bnsa.ps (1.67 MB)
, 
«Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks», EURASIP Journal on Information Security, vol. 2007, 2007.
jis07bows.pdf (436.69 KB)
Source code available here. (8.51 MB)
, 

«Fundamentals of data hiding security and their application to spread-spectrum analysis», in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145.
ih05_fundamentals.pdf (222.99 KB)
, 
«An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios», in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Montreux, Switzerland, 2005.
wiamis05.pdf (119.47 KB)
, 