Exportar 90 resultados:
Autor Título Tipo [ Año] Filtros: First Letter Of Last Name es D [Elimina todos los filtros]
«Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819. spie08one-bit-wm.pdf (277.85 KB)
, «Digital Satellite Communications», New York: Springer, 2007, p. -.
, «Digital Satellite Communications», New York: Springer, 2007, p. -.
, «On Distortion Measures Associated to Random Desynchronization Attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, «Efficient Non-Interactive Zero-Knowledge Watermark Detector Robust to Sensitivity Attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, «A Novel Interpretation of Content Authentication», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007. spie07authentication.pdf (179.34 KB)
, «Security of Spread-Spectrum-Based Data Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, «Two different approaches for attacking BOWS», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007. spie07bows.pdf (416.45 KB)
, «The blind Newton senstivity attack», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601. spie06_sensitivity.ps (1.62 MB)
, «High-rate quantization data hiding robust to arbitrary linear filtering attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
, «Robustness Improvement of Known-Host-State Watermarking Using Host Statistics», Signal Processing, vol. 86, pp. 1076-1088, 2006.
, «Secret dither estimation in lattice-quantization data hiding: a set-membership approach», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601. spie06_sme.pdf (223.01 KB)
, «Toward a theory of multirate nonlinear systems», in IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Cannes, France, 2006.
, «Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601. spie05_dpc.pdf (165.56 KB)
, «Detection in quantization-based watermarking: performance and security issues», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601. spie05_secur.pdf (401.96 KB)
, «Ensuring Gain Invariance in High-Rate Data-Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, «Robustness Improvement of Known-Host-State Watermarking Using Host Statistics», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, «Robustness Improvement of Known-Host-State Watermarking Using Host Statistics», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, «Spread-spectrum vs. quantization-based data hiding: misconceptions and implications», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, «Worst case additive attack against quantization-based data-hiding methods», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, «Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 805-815. spie04em.pdf (434.03 KB)
, «Linear Boundary Extensions for Finite Length Signals and Paraunitary Two-Channel Filter Banks», IEEE Transactions on Signal Processing, vol. 52, pp. 3213-3226, 2004.
, «Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 592-601. spie04.ps (572.73 KB)
, «Quantization-based watermarking performance improvement using host statistics: additive noise attack», in ACM Workshop on Multimedia and Security (MMSEC), Magdeburg, Germany, 2004.
, «Spread Spectrum Watermarking for Real Images: Is Everything So Hopeless?», in European Signal Processing Conference (EUSIPCO), Vienna, Austria, 2004.
,