Wavelet-based blind watermarking of 3D models
Proceedings of the 2004 workshop on Multimedia and security
Rights Protection for Discrete Numeric Streams
IEEE Transactions on Knowledge and Data Engineering
Zero-knowledge watermark detector robust to sensitivity attacks
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Multiuser-based shadow watermark extraction system
Information Sciences: an International Journal
VQ-based watermarking scheme with genetic codebook partition
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Human visual system based adaptive digital image watermarking
Signal Processing
Digital watermarking of bitmap images
CompSysTech '07 Proceedings of the 2007 international conference on Computer systems and technologies
Efficient zero-knowledge watermark detection with improved robustness to sensitivity attacks
EURASIP Journal on Information Security
Machine learning based adaptive watermark decoding in view of anticipated attack
Pattern Recognition
Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing
EURASIP Journal on Information Security
A lightweight rao-cauchy detector for additive watermarking in the dwt-domain
Proceedings of the 10th ACM workshop on Multimedia and security
GA-Based Robustness Evaluation Method for Digital Image Watermarking
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Dither Modulation in the Logarithmic Domain
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Robust audio data hiding using correlated quantization with histogram-based detector
IEEE Transactions on Multimedia
Secure client-side ST-DM watermark embedding
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Image Processing
Transactions on data hiding and multimedia security III
Quantization-based methods: additive attacks performance analysis
Transactions on data hiding and multimedia security III
Image content protection based on multi-layer decomposition
ISPRA'10 Proceedings of the 9th WSEAS international conference on Signal processing, robotics and automation
Information hiding with optimal detector for highly correlated signals
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Client side embedding for ST-DM watermarks
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Distribution independent blind watermarking
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
A full-reference quality metric for geometrically distorted images
IEEE Transactions on Image Processing
Contourlet-based image watermarking using optimum detector in a noisy environment
IEEE Transactions on Image Processing
Perceptual image hashing based on virtual watermark detection
IEEE Transactions on Image Processing
Two dimensional time-frequency analysis based eigenvalue decomposition applied to image watermarking
Multimedia Tools and Applications
Fragile and resistant image watermarking based on inverse difference pyramid decomposition
WSEAS Transactions on Signal Processing
A low complexity video watermarking in H.264 compressed domain
IEEE Transactions on Information Forensics and Security
A provably secure anonymous buyer-seller watermarking protocol
IEEE Transactions on Information Forensics and Security
Time-frequency analysis and its application in digital watermarking
EURASIP Journal on Advances in Signal Processing - Special issue on time-frequency analysis and its applications to multimedia signals
Technical Section: Robust and blind mesh watermarking based on volume moments
Computers and Graphics
Fractal and neural networks based watermark identification
Multimedia Tools and Applications
Transform based additive data hiding based on a hierarchical prior
ECC'11 Proceedings of the 5th European conference on European computing conference
Practical data-hiding: additive attacks performance analysis
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Shadow watermark extraction system
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Speech authentication by semi-fragile watermarking
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Fundamentals of data hiding security and their application to spread-spectrum analysis
IH'05 Proceedings of the 7th international conference on Information Hiding
Watermarking using similarities based on fractal codification
Digital Signal Processing
Enhanced security architecture for music distribution on mobile
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
Robust gray-scale logo watermarking in wavelet domain
Computers and Electrical Engineering
Digital Image Authentication: A Review
International Journal of Digital Library Systems
On optimal detection for matrix multiplicative data hiding
Proceedings of the first ACM workshop on Information hiding and multimedia security
Multimedia Tools and Applications
Perceptual watermarking using a new Just-Noticeable-Difference model
Image Communication
An overview of digital speech watermarking
International Journal of Speech Technology
Hi-index | 0.00 |