Exportar 111 resultados:
[ Autor] Título Tipo Año Filtros: Clave es watermarking [Elimina todos los filtros]
«High-rate quantization data hiding robust to arbitrary linear filtering attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
, «Improving Data Hiding Performance by Using Quantization in a Projected Domain», in IEEE International Conference on Multimedia and Expo (ICME), Lausanne, Switzerland, 2002.
, «A Tutorial on Digital Watermarking», in IEEE Annual Carnahan Conference on Security Technology, Madrid, Spain, 1999.
, «Rational Dither Modulation: a novel data-hiding method robust to value-metric attacks», in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 139-142.
, «Quantization-Based Data-Hiding Robust to Linear Time-Invariant Filtering», IEEE Transactions on Information Forensics and Security, vol. 3, pp. 137-152, 2008.
, «Performance Analysis of Existing and New Methods for Data Hiding with Known-Host Information in Additive Channels», IEEE Transactions on Signal Processing, vol. 51, pp. 960-980, 2003.
, «Quantized Projection Data Hiding», in IEEE International Conference on Image Processing (ICIP), Rochester (NY), USA, 2002.
, «Ensuring Gain Invariance in High-Rate Data-Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, «The Importance of aliasing in structured quantization index modulation data hiding (invited lecture)», in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 1-17.
, «Towards Traitor Tracing in Black-and-White-Box DNN Watermarking with Tardos-Based Codes», in 2023 IEEE International Workshop on Information Forensics and Security (WIFS), 2023, pp. 1-6. Towards_Traitor.pdf (1007.31 KB)
, «A new method for perspective correction of document images», in Document Recognition and Retrieval, San Francisco, CA, 2011, vol. 7874, p. 787410. spie-2011.pdf (439.17 KB)
, «Encrypted Domain Processing for Cloud Privacy: Concept and Practical Experience», in International Conference on Cloud Computing and Services Science (CLOSER), Noordwijkerhout, The Netherlands, 2011.
, «Gain-Invariant Dirty Paper Coding for Hierarchical OFDM», IEEE Transactions on Communications, vol. 59, pp. 3323-3334, 2011.
, «High-rate data-hiding robust to linear filtering for colored hosts», EURASIP Journal on Information Security, 2009.
, «A Dirty Paper Scheme for Hierarchical OFDM», in IEEE International Conference on Communications (ICC), Kioto, Japan, 2011.
, «AN EXTENDED ANALYSIS OF DISCRETE FOURIER TRANFORM - RATIONAL DITHER MODULATION FOR NON-WHITE HOSTS», in IEEE International Workshop on Information Forensics and Security (WIFS), London, U.K., 2009.
, «Leaving Timing Channel Fingerprints in Hidden Service Log Files», in Digital Forensic Research Workshop Annual Conference (DFRWS), Portland, Oregon, 2010.
, «Leaving Timing Channel Fingerprints in Hidden Service Log Files», Digital Investigation, 2010.
, «Secure Direct and Iterative Protocols for Solving Systems of Linear Equations», in Signal Processing in the Encrypted Domain (SPEED) Workshop, Lausanne, Switzerland, 2009, pp. 122–141. secure_sle_speedws09.pdf (193.97 KB)
, «Efficient Protocols for Secure Adaptive Filtering», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prage, Czech Republic, 2011, pp. 5860-5863. secure_adaptive_filteringICASSP2011.pdf (115.55 KB)
, «Efficient Non-Interactive Zero-Knowledge Watermark Detector Robust to Sensitivity Attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, «A new model for Gabor Coefficients' Magnitude in Face Recognition», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Dallas, USA, 2010.
, «Secure Adaptive Filtering», IEEE Transactions on Information Forensics and Security, vol. 6, pp. 469 -485, 2011. TPPGTIFS11-Secure_Adaptive_Filtering.pdf (396.27 KB)
, «Zero-Knowledge watermark detector robust to sensitivity attacks», in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 97-107.
, «Fully Homomorphic Faces», in IEEE International Conference on Image Processing (ICIP), Lake Buena Vista, Florida, USA, 2012. cryptofaces.pdf (213.56 KB)
,