Spread spectrum communications handbook (revised ed.)
Spread spectrum communications handbook (revised ed.)
IBM Systems Journal
Digital Pictures: Representation, Compression, and Standards
Digital Pictures: Representation, Compression, and Standards
Jikzi: A New Framework for Secure Publishing
Proceedings of the 7th International Workshop on Security Protocols
Fast Robust Template Matching for Affine Resistant Image Watermarks
IH '99 Proceedings of the Third International Workshop on Information Hiding
Fundamentals of Applied Probability Theory
Fundamentals of Applied Probability Theory
Vision: A Computational Investigation into the Human Representation and Processing of Visual Information
If one watermark is good, are more better?
ICASSP '99 Proceedings of the Acoustics, Speech, and Signal Processing, 1999. on 1999 IEEE International Conference - Volume 04
Evaluation of Copyright Marking Systems
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Fast communication: Steganography and error-correcting codes
Signal Processing
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Hardware assisted watermarking for multimedia
Computers and Electrical Engineering
Reversible Data Hiding in the VQ-Compressed Domain
IEICE - Transactions on Information and Systems
Fault-tolerant and progressive transmission of images
Pattern Recognition
An adaptive steganographic method based on the measurement of just noticeable distortion profile
Image and Vision Computing
An intelligent chaotic embedding approach to enhance stego-image quality
Information Sciences: an International Journal
Hi-index | 0.00 |
In an earlier paper, "Techniques for Data Hiding," the overall goals and constraints of information-hiding problem space and a variety of approaches to information hiding in image, audio, and text were described. In this sequel, information-hiding goals and applications are expanded beyond watermarking to encompass the more general concept of information tagging. As a framework for illustrating these concepts, multiple-bit and midlevel image-representation information-hiding techniques are described. A range of applications, including anticounterfeiting and authentication, is explored.