Download A review of watermarking principles and practices by Miller, Cox, Linnartz PDF

By Miller, Cox, Linnartz

Show description

Read or Download A review of watermarking principles and practices PDF

Similar computers books

Visual Information Systems

This publication is a completely prepared anthology outlining the state-of-the-art within the rising zone of visible informationsystems. The chapters awarded are a variety of completely refereed and revised complete papers first awarded on the First overseas convention on visible details platforms held in February 1996.

SDL 2009: Design for Motes and Mobiles: 14th International SDL Forum Bochum, Germany, September 22-24, 2009 Proceedings

This booklet constitutes the refereed complaints of the 14th overseas SDL discussion board, SDL 2009, held in Bochum, Germany, in September 2009. The 15 revised complete papers offered have been rigorously reviewed and chosen for inclusion within the e-book. The papers are prepared in topical sections on model-driven improvement, research and review, evolution of improvement languages, language implementation and help, and alertness stories.

Additional info for A review of watermarking principles and practices

Sample text

20] T. Kalker, J. Linnartz, and M. van Dijk, “Watermark estimation through detector analysis,” in Proceedings of the ICIP, (Chicago), Oct. 1998. Accepted. BIBLIOGRAPHY 31 [21] T. Kalker, “Watermark estimation through detector observations,” in Proceedings of the IEEE Benelux Signal Processing Symposium, (Leuven, Belgium), pp. 119–122, Mar. 1998. [22] I. J. -P. Linnartz, “Some general methods for tampering with watermarks,” IEEE Trans. on Selected Areas of Communications, vol. 16, no. 4, pp. 587–593, 1998.

16] J. J. Hernandez, F. Perez-Gonzalez, J. M. Rodriguez, and G. Nieto, “Performance analysis of a 2-D multipulse amplitude modulation scheme for data hiding and watermarking still images,” IEEE Trans. on Selected Areas of Communications, vol. 16, no. 4, pp. 510–524, 1998. [17] F. Petitcolas, R. Anderson, and M. Kuhn, “Attacks on copyright marking systems,” in Workshop on Information Hiding, Portland, OR, 1517 April, 1998. [18] I. -P. Linnartz, “Public watermarks and resistance to tampering,” in Proceedings of the IEEE International Conference on Image Processing, CDRom, 1997.

Kalker, “Watermark estimation through detector observations,” in Proceedings of the IEEE Benelux Signal Processing Symposium, (Leuven, Belgium), pp. 119–122, Mar. 1998. [22] I. J. -P. Linnartz, “Some general methods for tampering with watermarks,” IEEE Trans. on Selected Areas of Communications, vol. 16, no. 4, pp. 587–593, 1998. [23] R. , Information Hiding, vol. 1174 of Lecture Notes in Computer Science, Springer-Verlag, 1996. [24] IEEE Int. Conf. on Image Procesing, 1996. [25] D. Kahn, “The history of steganography,” in Information Hiding (R.

Download PDF sample

Rated 4.24 of 5 – based on 5 votes