Cryptography Reference
In-Depth Information
3. Bender, W., Gruhl, D., and Morimoto, N. (1997): Techniques for data hiding.
IBM Systems Journal, 35 , 313336
4. De Vleeschouwer C., Delaigle, J.F., and Macq, B. (2001): Circular interpreta-
tion on histogram for reversible watermarking. IEEE International Multimedia
Signal Processing Workshop, 345350
5. Fridrich, J., Goljan, M., and Du, R. (2001): Invertible authentication. Proc.
SPIE, Security and Watermarking of Multimedia Contents, 3971 , 197 208
6. Xuan, G., Zhu, J., Chen, J., Shi, Y., Ni, Z., and Su, W. (2002): Distortionless
data hiding based on integer wavelet transform. IEE Electronics Letters, 38 ,
16461648
7. Goljan, M., Fridrich, J., and Du, R. (2001): Distortion-free data embedding for
images. 4th Information Hiding Workshop, LNCS, 2137 , Springer-Verlag, 2741
8. Celik, M., Sharma, G., Tekalp, A.M., and Saber E. (2002): Reversible data
hiding. Proc. of the International Conference on Image Processing 2002, 157
160
9. Ni, Z., Shi, Y., Ansari, N.,and Su, W. (2003): Reversible data hiding. Proc.
IEEE ISCAS03, 2 , II-912II-915
10. Yang, B., Schmucker, M., Funk, W., and Busch, C. (2004): Integer DCT-based
reversible watermarking for images using companding technique. Proc. SPIE,
Security and Watermarking of Multimedia Content, 5306 , 405415
11. Tian, J. (2002): Reversible watermarking by difference expansion. Proceedings
of Workshop on Multimedia and Security, 1922
12. Alattar, A.M. (2004) Reversible watermark using difference expansion of quads.
in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP04),
3 , 377380
13. Wu, X. and Memon, N. (1997): Context-based, adaptive, lossless image codec.
IEEE Trans. Commun., 45 , 437444
14. Fridrich, J., Goljan, M. and Du, R. (2001): Invertible authentication watermark
for JPEG images. Proc. ITCC 2001, 223227
15. Wu X. (1997) Lossless compression of continuous-tone images via context selec-
tion, quantization, and modeling. IEEE Trans. Image Process., 6 , 656664
16. Weng, S., Zhao, Y., and Pan, J.-S. (2006): Cropping resistant lossless water-
marking based on improved DE method. INFORMATICA International Jour-
nal, submitted
17. Holliman, M. and Memon, N. (2002): Counterfeiting attacks on oblivious block-
wise independent invisible watermarking schemes. IEEE Trans. on Image Pro-
ceesing, 9 , 432441
18. Shi, Y.Q., Ni, Z., Zou, D., Liang, C., and Xuan G. (2004): Lossless data hid-
ing: fundamentals, algorithms and applications. Proc. of the 2004 International
Symposium on Circuits and Systems, ISCAS 04, 2 , pp. II-33II-36
Search WWH ::




Custom Search