PROCEEDINGS VOLUME 3657
ELECTRONIC IMAGING '99 | 23-29 JANUARY 1999
Security and Watermarking of Multimedia Contents
ELECTRONIC IMAGING '99
23-29 January 1999
San Jose, CA, United States
Image Watermarking I
Proc. SPIE 3657, Watermarking by DCT coefficient removal: a statistical approach to optimal parameter settings, (9 April 1999);doi: 10.1117/12.344659
Proc. SPIE 3657, Selective block assignment approach for robust digital image watermarking, (9 April 1999);doi: 10.1117/12.344668
Proc. SPIE 3657, Secure robust digital watermarking using the lapped orthogonal transform, (9 April 1999);doi: 10.1117/12.344678
Proc. SPIE 3657, DWT-based technique for spatio-frequency masking of digital signatures, (9 April 1999);doi: 10.1117/12.344689
Proc. SPIE 3657, Perceptual watermarks for digital images and video, (9 April 1999);doi: 10.1117/12.344700
Authentication Watermarks
Proc. SPIE 3657, Issues and solutions for authenticating MPEG video, (9 April 1999);doi: 10.1117/12.344703
Proc. SPIE 3657, Verification watermarks on fingerprint recognition and retrieval, (9 April 1999);doi: 10.1117/12.344704
Proc. SPIE 3657, Fragile imperceptible digital watermark with privacy control, (9 April 1999);doi: 10.1117/12.344705
Proc. SPIE 3657, Content-based integrity protection of digital images, (9 April 1999);doi: 10.1117/12.344706
Video and Multimedia Watermarking
Proc. SPIE 3657, Exploring CDMA for watermarking of digital video, (9 April 1999);doi: 10.1117/12.344660
Proc. SPIE 3657, Video watermarking system for broadcast monitoring, (9 April 1999);doi: 10.1117/12.344661
Proc. SPIE 3657, Robust 3D DFT video watermarking, (9 April 1999);doi: 10.1117/12.344662
Proc. SPIE 3657, IPR techniques applied to a multimedia environment in the HYPERMEDIA project, (9 April 1999);doi: 10.1117/12.344663
Watermark Attacks
Proc. SPIE 3657, Watermark extimation through local pixel correlation, (9 April 1999);doi: 10.1117/12.344664
Proc. SPIE 3657, Spread spectrum watermarking: malicious attacks and counterattacks, (9 April 1999);doi: 10.1117/12.344665
Proc. SPIE 3657, Channel model for a watermark attack, (9 April 1999);doi: 10.1117/12.344666
Audio Watermarking
Proc. SPIE 3657, Text-indicated speaker verification method using PSI-CELP parameters, (9 April 1999);doi: 10.1117/12.344667
Proc. SPIE 3657, Noninvertible watermarking methods for MPEG-encoded audio, (9 April 1999);doi: 10.1117/12.344669
Watermark Evaluation
Proc. SPIE 3657, Fragile watermarking using the VW2D watermark, (9 April 1999);doi: 10.1117/12.344670
Proc. SPIE 3657, Comparing robustness of watermarking techniques, (9 April 1999);doi: 10.1117/12.344671
Proc. SPIE 3657, Fair benchmark for image watermarking systems, (9 April 1999);doi: 10.1117/12.344672
Proc. SPIE 3657, OCTALIS benchmarking: comparison of four watermarking techniques, (9 April 1999);doi: 10.1117/12.344673
Image Watermarking II
Proc. SPIE 3657, Watermarking by histogram specification, (9 April 1999);doi: 10.1117/12.344674
Proc. SPIE 3657, Geometrical and frequential watermarking scheme using similarities, (9 April 1999);doi: 10.1117/12.344675
Proc. SPIE 3657, Digital image watermarking by salient point modification: practical results, (9 April 1999);doi: 10.1117/12.344676
Proc. SPIE 3657, Watermarking with quadratic residues, (9 April 1999);doi: 10.1117/12.344677
Proc. SPIE 3657, Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal Public Key Crypto System, (9 April 1999);doi: 10.1117/12.344679
Watermarking of Text, Graphics, and Halftones
Proc. SPIE 3657, Blind digital watermarking for cartoon and map images, (9 April 1999);doi: 10.1117/12.344680
Proc. SPIE 3657, Watermarking of dither halftoned images, (9 April 1999);doi: 10.1117/12.344681
Proc. SPIE 3657, Marking and detection of text documents using transform-domain techniques, (9 April 1999);doi: 10.1117/12.344682
Proc. SPIE 3657, Watermarking of 3D-polygon-based models with robustness against mesh simplification, (9 April 1999);doi: 10.1117/12.344683
Data Hiding
Proc. SPIE 3657, Dither modulation: a new approach to digital watermarking and information embedding, (9 April 1999);doi: 10.1117/12.344684
Proc. SPIE 3657, Algebraic construction of a new class of quasi-orthogonal arrays for steganography, (9 April 1999);doi: 10.1117/12.344685
Proc. SPIE 3657, Steganograpic image transformation, (9 April 1999);doi: 10.1117/12.344686
Proc. SPIE 3657, R/D optimal data hiding, (9 April 1999);doi: 10.1117/12.344687
Proc. SPIE 3657, Technique for image data hiding and reconstruction without host image, (9 April 1999);doi: 10.1117/12.344688
Proc. SPIE 3657, Reversible digital images, (9 April 1999);doi: 10.1117/12.344690
Image Watermarking III
Proc. SPIE 3657, Extraction of multiresolution watermark images for resolving rightful ownership, (9 April 1999);doi: 10.1117/12.344691
Proc. SPIE 3657, Recovering modified watermarked images with reference to the original image, (9 April 1999);doi: 10.1117/12.344692
Proc. SPIE 3657, Maximum-likelihood sequence decoding of digital image watermarking, (9 April 1999);doi: 10.1117/12.344693
Proc. SPIE 3657, Capacity of the watermark channel: how many bits can be hidden within a digital image?, (9 April 1999);doi: 10.1117/12.344694
Proc. SPIE 3657, Digital watermarking systems with chaotic sequences, (9 April 1999);doi: 10.1117/12.344695
Copyright Protection
Proc. SPIE 3657, Secure multicast protocol with copyright protection, (9 April 1999);doi: 10.1117/12.344696
Proc. SPIE 3657, Architecture of security management unit for safe hosting of multiple agents, (9 April 1999);doi: 10.1117/12.344697
Proc. SPIE 3657, Agent-based copyright protection architecture for online electronic publishing, (9 April 1999);doi: 10.1117/12.344698
Proc. SPIE 3657, Securing the anonymity of content providers in the World Wide Web, (9 April 1999);doi: 10.1117/12.344699
Proc. SPIE 3657, Coding and modulation in watermarking and data hiding, (9 April 1999);doi: 10.1117/12.344701
Watermark Attacks
Proc. SPIE 3657, Combining digital watermarks and collusion-secure fingerprints for digital images, (9 April 1999);doi: 10.1117/12.344702
Back to Top