[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Skip header Section
Digital Watermarking and SteganographyNovember 2007
Publisher:
  • Morgan Kaufmann Publishers Inc.
  • 340 Pine Street, Sixth Floor
  • San Francisco
  • CA
  • United States
ISBN:978-0-08-055580-5
Published:13 November 2007
Pages:
624
Skip Bibliometrics Section
Reflects downloads up to 10 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession. *This new edition now contains essential information on steganalysis and steganography *New concepts and new applications including QIM introduced *Digital watermark embedding is given a complete update with new processes and applications

References

  1. http://www.usatoday.com/tech/news/2001-02-05-binladen.htm.Google ScholarGoogle Scholar
  2. http://www.vernace.com.Google ScholarGoogle Scholar
  3. http://www.aacsla.com.Google ScholarGoogle Scholar
  4. http://www.tektronix.com/Measurement/App_Notes/25_14225/eng/25W_14225 2.pdf.Google ScholarGoogle Scholar
  5. Personal communication.Google ScholarGoogle Scholar
  6. http://www.research.att.com/njas/lattices/.Google ScholarGoogle Scholar
  7. http://forum.doom9.org/showthread.php?t=119871.Google ScholarGoogle Scholar
  8. Anonimity 0: Scientology 1, 1995. http://www.wired.com/wired/archive/3.05/eword. html?pg=7.Google ScholarGoogle Scholar
  9. In P. P. Ewald, editor. 50 Years of X-Ray Diffraction . Reprinted in pdf format for the IUCr XVIII Congress, Glasgow, Scotland, Copyright 1962, 1999 International Union of Crystallography, 1999.Google ScholarGoogle Scholar
  10. Epson introduces revolutionary image authentication system for Epson digital cameras. Business Wire , April 5, 1999.Google ScholarGoogle Scholar
  11. J. Abbate. Inventing the Web. Proc. of the IEEE , 87(11):1999-2002, 1999.Google ScholarGoogle Scholar
  12. A. Abrardo, M. Barni. Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding. IEEE Trans. on signal Processing , 53(2): 824-833, 2005.Google ScholarGoogle Scholar
  13. A. Abrardo, M. Barni, F. Perez-Gonzalez, and C. Mosquera. Trellis-coded rational dither modulation for digital watermarking. In Proceedings of the 4th International Workshop on Digital Watermarking , volume LNCS 3710, pages 351-360. Springer Lecture Notes in Computer Science, 2005. Google ScholarGoogle Scholar
  14. A. J. Ahumada and H. A. Peterson. Luminance-model-based DCT quantization for color image compression. Proceedings of the SPIE , 1666:365-374, 1992.Google ScholarGoogle Scholar
  15. A. M. Alattar. Reversible watermark using difference expansion of quads. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing , volume 3, pages 377-380, May 2004.Google ScholarGoogle Scholar
  16. A. M. Alattar. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Transactions on Image Processing , 13(8):1147-1156, August 2004.Google ScholarGoogle Scholar
  17. Masoud Alghoniemy and Ahmed H. Tewfik. Geometric distortion correction through image normalization. Proc. of the International Conference on Multimedia and Expo , 2000.Google ScholarGoogle Scholar
  18. E. Allamanche, J. Herre, O. Hellmuth, B. Bernhard Frobach, and M. Cremer. AudioID: Towards content-based identification of audio material. In Proc. of the Int. Conf. on Web Delivering of Music , 2001.Google ScholarGoogle Scholar
  19. O. Altun, G. Sharma, U. Celik, and F. Bocko. A set theoretic framework for watermarking and its application to semifragile tamper detection. IEEE Trans. on Information Forensics and Security , 1(4):479-492, 2006.Google ScholarGoogle Scholar
  20. R. Anderson, editor. Information Hiding , volume 1174 of Lecture Notes in Computer Science . Springer-Verlag, 1996.Google ScholarGoogle Scholar
  21. R. J. Anderson. Stretching the limits of steganography. In Ross Anderson, editor, Information Hiding: First International Workshop , volume 1174 of Lecture Notes in Computer Science , pages 39-48. Springer-Verlag, 1996. Google ScholarGoogle Scholar
  22. R. J. Anderson and F. A. P. Petitcolas. On the limits of steganography. IEEE Journal of Selected Areas in Communications, Special Issue on Copyright and Privacy Protection , 16(4):474-481, 1998.Google ScholarGoogle Scholar
  23. Daniel Augot, Jean-Marc Boucqueau, Jean-Francois Delaigle, Caroline Fontaine, and Eddie Goray. Secure delivery of images over open networks. Proceedings of the IEEE , 87(7):1251-1266, 1999.Google ScholarGoogle Scholar
  24. I. Avcibas, M. Kharrazi, N. Memon, and B. Sankur. Image steganalysis with binary similarity measures. EURASIP Journal on Applied Signal Processing , 17:2749-2757, 2005. Google ScholarGoogle Scholar
  25. I. Avcibas, N. D. Memon, and B. Sankur. Steganalysis using image quality metrics. In E. Delp, et al., editors, Proceedings SPIE, Electronic Imaging, Security, and Watermarking of Multimedia Contents III , San Jose, CA, 2001, volume 4314, pages 523-531, 2001.Google ScholarGoogle Scholar
  26. M. Backes and C. Cachin. Public-key steganography with active attacks. In J. Kilian, editor, 2nd Theory of Cryptography Conference TCC , volume 3378 of LNCS , pages 210-226. Springer-Verlag, Heidelberg, 2005.Google ScholarGoogle Scholar
  27. F. Bacon. Of the advancement and proficiencies of learning or the partitions of sciences , volume VI. Leon Lichfield, Oxford, for R. Young and E. Forest, 1640.Google ScholarGoogle Scholar
  28. Z. Bahrav and D. Shaked. Watermarking of dithered halftoned images. In Proc. of the SPIE Conf. on Security and Watermarking of Multimedia Data , volume 3657, pages 307-316, 1999.Google ScholarGoogle Scholar
  29. M. Barni, F. Bartolini, V. Cappellini, and A. Piva. A DCT-domain system for robust image watermarking. Signal Processing , 66(3):357-372, 1998. Google ScholarGoogle Scholar
  30. James M. Barton. Method and apparatus for embedding authentication information within digital data. United States Patent , 5,646,997, 1997.Google ScholarGoogle Scholar
  31. P. Bas, J.-M. Chassery, and F. Davoine. A geometrical and frequential watermarking scheme using similarities. In SPIE Conf. on Security and Watermarking of Multimedia Contents , volume 3657, pages 264-272, 1999.Google ScholarGoogle Scholar
  32. P. Bas, J.-M. Chassery, and B. Macq. Robust watermarking based on the warping of predefined triangular patterns. Security and Watermarking of Multimedia Contents II , SPIE-3971:99-109, 2000.Google ScholarGoogle Scholar
  33. J. G. Beerends. Audion quality determination based on perceptual measurement techniques. In M. Kahrs and K. Brandenburg, editors, Applications of Digital Signal Processing to Audio and Acoustics , pages 1-38. Kluwer Academic Press, 1998.Google ScholarGoogle Scholar
  34. Alan E. Bell. The dynamic digital disk. IEEE Spectrum , 36(10):28-35, 1999. Google ScholarGoogle Scholar
  35. W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for data hiding. IBM Systems Journal , 35(3/4):313-336, 1996. Google ScholarGoogle Scholar
  36. O. Benedens. Geometry-based watermarking of 3D models. IEEE Computer Graphics and Applications , 19:46-55, 1999. Google ScholarGoogle Scholar
  37. C. Berrou and A. Glavieux. Near optimum error correcting and decoding: turbo-codes. IEEE Trans. on Communications , 44(10):1261-1271, 1996.Google ScholarGoogle Scholar
  38. S. Bhattacharjee and M. Kutter. Compression tolerant image authentication. In IEEE Int. Conf. on Image Processing , volume 1, pages 435-439, 1998.Google ScholarGoogle Scholar
  39. J. Bierbrauer. On Crandall's problem. Personal communication, 1998.Google ScholarGoogle Scholar
  40. J. Bierbrauer. Introduction to Coding Theory . Chapman & Hall/CRC, 2004.Google ScholarGoogle Scholar
  41. K. A. Birney and T. R. Fischer. On modeling of DCT and subband image data for compression. IEEE Trans. on Image Processing , 4(2):186-193, 1995.Google ScholarGoogle Scholar
  42. J. A. Bloom, I. J. Cox, T. Kalker, J-P Linnartz, M. L. Miller, and B. Traw. Copy protection for DVD video. Proc. of IEEE , 87(7):1267-1276, 1999.Google ScholarGoogle Scholar
  43. J. Boeuf and J. P. Stern. An analysis of one of the SDMI candidates. In Proceedings of Info Hiding '01 , 2001. Google ScholarGoogle Scholar
  44. B. P. Bogert, M. J. R. Healy, and J. W. Tukey. The frequency analysis of time series for echos: Cepstrum, pseudo-autocovariance, cross-cepstrum, and saphe cracking. Proc. of the Symp. Time Series Analysis , pages 209-243, 1963.Google ScholarGoogle Scholar
  45. D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. In Proceedings of Advances in Cryptology--CRYPTO'95 , volume Lecture Notes in Computer Science 963, pages 452-465, 1995. Google ScholarGoogle Scholar
  46. L. Boney, A. H. Tewfik, and K. N. Hamdy. Digital watermarks for audio signals. In Proc. Third IEEE Int. Conf. on Multimedia Computing and Systems , pages 473-480, 1996. Google ScholarGoogle Scholar
  47. A. Borodin, R. Ostrovsky, and Y. Rabani. Lower bounds for high dimensional nearest neighbor search and related problems. In Proc. 31st ACM STOC , pages 312-321, 1999. Google ScholarGoogle Scholar
  48. R. N. Bracewell. The Fourier Transform and Its Applications . McGraw-Hill, 1986.Google ScholarGoogle Scholar
  49. J. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman. Electronic marking and identification techniques to discourage document copying. In Proc. IEEE Infocom'94 , volume 3, pages 1278-1287, 1994.Google ScholarGoogle Scholar
  50. J. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman. Electronic marking and identification techniques to discourage document copying. IEEE Journal of Selected Areas in Communication , 13:1495-1504, 1995.Google ScholarGoogle Scholar
  51. J. Brassil, S. Low, N. F. Maxemchuk, and L. O'Gorman. Electronic marking and identification techniques to discourage document copying. In Proceedings, Infocom '94, pages 1278-1287, 1994.Google ScholarGoogle Scholar
  52. G. W. Braudaway, K. A. Magerlein, and F. Mintzer. Protecting publicly available images with a visible image watermark. In SPIE Conf. on Optical Security and Conterfeit Deterrence Techniques , volume 2659, pages 126-133, 1996.Google ScholarGoogle Scholar
  53. Hans-Joachim Braun. Advanced weaponry of the stars. American Heritage of Invention & Technology , 12(4):10-16, 1997.Google ScholarGoogle Scholar
  54. D. Brewster. Microscope , volume XIV. Encyclopedia Britannica or the Dictionary of Arts, Sciences, and General Literature, Edinburgh, IX-Application of photography to the microscope, 8th edition, 1857.Google ScholarGoogle Scholar
  55. R. S. Broughton and W. C. Laumeister. Interactive video method and apparatus. United States Patent , 4,807,031, 1989.Google ScholarGoogle Scholar
  56. Janelle Brown. Playmate meets geeks who made her a net star. Wired News Web Site, May 1997. http://www.wired.com/news/culture/0,1284,4000,00.html.Google ScholarGoogle Scholar
  57. Lisa Gottesfeld Brown. A survey of image registration techniques. ACM Computing Surveys , 24(4):325-376, 1992. Google ScholarGoogle Scholar
  58. Redmond A. Burke. The most beautiful book of the fifteenth century: Hypnerotomachia poliphili. Bulletin of the New York Public Library , 58(9):419-428, 1954.Google ScholarGoogle Scholar
  59. Pierre Buser and Michel Imbert. Audition . MIT Press, 1992. Translated by R. H. Kay.Google ScholarGoogle Scholar
  60. C. Cachin. An information-theoretic model for steganography. In D. Aucsmith, editor, Information Hiding, 2nd International Workshop , volume 1525 of LNCS , pages 306-318. Springer-Verlag, New York, 1998.Google ScholarGoogle Scholar
  61. F. W. Campbell and J. J. Kulikowski. Orientation selectivity of the human visual system. J. Physiol. , 187:437-445, 1966.Google ScholarGoogle Scholar
  62. F. W. Campbell, J. J. Kulikowski, and J. Levinson. The effect of orientation on the visual resolution of gratings. J. Physiol. , 187:427-436, 1966.Google ScholarGoogle Scholar
  63. Carol Carr and Patricia E. O'Neill. Adding INSPEC to your chemical search strategy-- let's get physical. Database , 18(2):99-102, 1995. Google ScholarGoogle Scholar
  64. D. Casasent and D. Psaltis. Position, rotation, and scale invariant optical correlation. Applied Optics , 15(7):1795-1799, 1976.Google ScholarGoogle Scholar
  65. D. Casasent and D. Psaltis. New optical transforms for pattern recognition. Proc. of the IEEE , 65(1):77-84, 1977.Google ScholarGoogle Scholar
  66. F. Cayre, C. Fontaine, and T. Furon. Watermarking security: Theory and practice. IEEE Trans. on Signal Processing , 53(10):3976-3987, 2003.Google ScholarGoogle Scholar
  67. F. Cayre, C. Fontaine, and T. Furon. A theoretical study of watermarking security. Proceedings International Symposium on Information Theory (ISIT) , pages 1868-1872, 2005.Google ScholarGoogle Scholar
  68. M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber. Lossless generalized LSB data embedding. IEEE Transactions on Image Processing , 14(2):253-266, February 2005.Google ScholarGoogle Scholar
  69. A. Chakrabarti, B. Chazelle, B. Gum, and A. Lvov. A lower bound on the complexity of approximate nearest neighbor searching on the Hamming cube. In Proc. 31st ACM STOC , pages 305-311, 1999. Google ScholarGoogle Scholar
  70. R. Chandramouli, M. Kharrazi, and N. Memon. Image steganography and steganalysis: Concepts and practice. In T. Kalker, Y. M. Ro, and I. Cox, editors, Digital Watermarking, 2nd International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 , volume 2939 of LNCS , pages 35-49. Springer-Verlag, New York, 2004.Google ScholarGoogle Scholar
  71. R. Chandramouli, G. Li, and N. Memon. Adaptive steganography. In Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IV, San Jose, CA, January 21-24, 2002 , pages 69-78, 2002.Google ScholarGoogle Scholar
  72. R. Chandramouli and N. D. Memon. Analysis of LSB based image steganography techniques. In Proceedings ICIP 2001, Thessaloniki, Greece, October 7-10, 2001 , 2001. CD Version.Google ScholarGoogle Scholar
  73. Ee-Chien Chang and M. Orchard. Geometric properties of watermarking schemes. IEEE Int. Conf. on Image Processing , 3:714-717, 2000.Google ScholarGoogle Scholar
  74. D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM , 24(2):84-88, 1981. Google ScholarGoogle Scholar
  75. B. Chen and C.-E. Sundberg. Digital audio broadcasting in the FM band by means of contiguous band insertion and precanceling techniques. IEEE Trans. on Communications , 48(10):1634-1637, 2000.Google ScholarGoogle Scholar
  76. B. Chen and G. Wornell. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory , 47(4):1423-1443, 2001.Google ScholarGoogle Scholar
  77. B. Chen and G. W. Wornell. Digital watermarking and information embedding using dither modulation. In IEEE Second Workshop on Multimedia Signal Processing , pages 273-278, 1998.Google ScholarGoogle Scholar
  78. B. Chen and G. W. Wornell. An information-theoretic approach to the design of robust digital watermarking systems. IEEE Transactions on Acoustics, Speech, and Signal Processing , 1999. Google ScholarGoogle Scholar
  79. B. Chen and G. W. Wornell. Preprocessed and postprocessed quantization index modulation methods for digital watermarking. In Security and Watermarking of Multimedia Contents II , volume SPIE-3971, pages 48-59, 2000.Google ScholarGoogle Scholar
  80. Q. Cheng and T. S. Huang. Blind digital watermarking for images and videos and performance analysis. In IEEE Int. Conf. on Multimedia and Expo , volume 1, pages 389-392, 2000.Google ScholarGoogle Scholar
  81. Y. Cheng. Music database retrieval based on spectral similarity. In Int. Symp. on Music Information Retrieval , 2001.Google ScholarGoogle Scholar
  82. Jim Chou, S. Sandeep Pradhan, and Kannan Ramchandran. On the duality between distributed source coding and data hiding. Thirty-third Asilomar Conference on Signals, Systems, and Computers , 2:1503-1507, 1999.Google ScholarGoogle Scholar
  83. D. Coltuc and J.-M. Chassery. Distortion-free robust watermarking: A case study. In E. Delp III, editor, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX , volume 6505, January 2007.Google ScholarGoogle Scholar
  84. J. H. Conway and N. J. A. Sloane. Sphere Packings, Lattices, and Groups . Springer-Verlag, 1988. Google ScholarGoogle Scholar
  85. D. Coppersmith, F. Mintzer, C. Tresser, C. W. Wu, and M. M. Yeung. Fragile imperceptible digital watermark with privacy control. In Security and Watermarking of Multimedia Contents , volume SPIE-3657, pages 79-84, 1999.Google ScholarGoogle Scholar
  86. Corel Stock Photo Library 3, Corel Corporation, Ontario, Canada.Google ScholarGoogle Scholar
  87. Tom N. Cornsweet. Visual Perception . Academic Press, 1970.Google ScholarGoogle Scholar
  88. M. Costa. Writing on dirty paper. IEEE Trans. Inform. Theory , 29:439-441, 1983.Google ScholarGoogle Scholar
  89. Thomas M. Cover and Joy A. Thomas. Elements of Information Theory . John Wiley & Sons, 1991. Google ScholarGoogle Scholar
  90. I. J. Cox. Spread spectrum watermark for embedded signalling. United States Patent , 5,848,155, 1998.Google ScholarGoogle Scholar
  91. I. J. Cox. Watermarking of image data using mpeg/jpeg coefficients. United States Patent , 6,069,914, 2000.Google ScholarGoogle Scholar
  92. I. J. Cox, T. Kalker, G. Pakura, and M. Scheel. Information transmission and steganography. In Int. Workshop on Digital Watermarking , 2005. Google ScholarGoogle Scholar
  93. I. J. Cox and J-P. M.G. Linnartz. Public watermarks and resistance to tampering. IEEE Int. Conference on Image Processing , 3, 1997.Google ScholarGoogle Scholar
  94. I. J. Cox and M. L. Miller. Counteracting geometric distortions for DCT based watermarking. United States Patent , 6,108,434, 2000.Google ScholarGoogle Scholar
  95. I. J. Cox, M. L. Miller, and A. McKellips. Watermarking as communications with side information. Proc. IEEE , 87(7):1127-1141, 1999.Google ScholarGoogle Scholar
  96. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Trans. on Image Processing , 6(12):1673-1687, 1997.Google ScholarGoogle Scholar
  97. I. J. Cox and M. L. Miller. A review of watermarking and the importance of perceptual modeling. In Proceedings of SPIE, Human Vision & Electronic Imaging II , volume 3016, pages 92-99, 1997.Google ScholarGoogle Scholar
  98. I. J. Cox, G. Doerr, and T. Furon. Watermarking is not cryptography. Int. Workshop on Digital Watermarking , 2006.Google ScholarGoogle Scholar
  99. S. Craver. On public-key steganography in the presence of an active warden. Technical Report RC 20931, IBM, 1997.Google ScholarGoogle Scholar
  100. S. Craver. On public-key steganography in the presence of an active warden. In Proceedings 2nd Information Hiding Workshop , pages 355-368, 1998.Google ScholarGoogle Scholar
  101. S. Craver, N. Memon, B.-L. Yeo, and M. M. Yeung. Can invisible watermarks solve rightful ownerships? IBM Technical Report RC 20509, IBM Research, July 1996. IBM CyberJournal: http://www.research.ibm.Google ScholarGoogle Scholar
  102. S. Craver, N. Memon, B.-L. Yeo, and M. M. Yeung. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications. IEEE Journal of Selected Areas in Communication , 16(4):573-586, 1998.Google ScholarGoogle Scholar
  103. G. Csurka, F. Deguillaume, J. J. K. O'Ruanaidh, and T. Pun. A Bayesian approach to affine transformation resistant image and video watermarking. In Proc. of the 3rd Int. Information Hiding Workshop , pages 315-330, 1999. Google ScholarGoogle Scholar
  104. O. Dabeer, K. Sullivan, U. Madhow, S. Chandrasekaran, and B. S. Manjunath. Detection of hiding in the least significant bit. IEEE Transactions on Signal Processing , 52:3046-3058, 2004.Google ScholarGoogle Scholar
  105. Scott Daly. The Visible Difference Predictor: An algorithm for the assessment of image fidelity. In A. B. Watson, editor, Digital Images and Human Vision , chapter 14, pages 179-206. MIT Press, 1993. Google ScholarGoogle Scholar
  106. G. Danezsis, R. Dingledine, and N. Mathewson. Mixminion: Design of a type iii anonymous remailer protocol. In IEEE Proc. of the 2003 Symposium on Security and Privacy , pages 2-15, 2003. Google ScholarGoogle Scholar
  107. Steve Decker. Engineering considerations in commercial watermarking. IEEE Communications Magazine , 39(8):128-133, 2001.Google ScholarGoogle Scholar
  108. J. F. Delaigle, C. De Vleeschouwer, and B. Macq. Watermarking algorithm based on a human visual model. Signal Processing , 66(3):319-335, 1998. Google ScholarGoogle Scholar
  109. D. Delannay and B. Macq. Generalized 2D cyclic patterns for secret watermark generation. In IEEE Int. Conf. on Image Processing , volume 2, pages 77-79, 2000.Google ScholarGoogle Scholar
  110. G. Depovere, T. Kalker, J. Haitsma, M. Maes, L. de Strycker, P. Termont, J. Vandewege, A. Langell, C. Alm, P. Norman, B. O'Reilly, G. Howes, H. Vaanholt, R. Hintzen, P. Donnelly, and A. Hudson. The VIVA project: Digital watermarking for broadcast monitoring. IEEE Int. Conf. on Image Processing , 2:202-205, 1999.Google ScholarGoogle Scholar
  111. Geert Depovere, Ton Kalker, and Jean-Paul Linnartz. Improved watermark detection using filtering before correlation. In IEEE Int. Conf. on Image Processing , volume 1, pages 430-434, Chicago, October 1998.Google ScholarGoogle Scholar
  112. Y. Desmedt. Subliminal-free authentication and signature. In Advances in Cryptology, Proc. of EUROCRYPT '88 , volume 330 of Lecture Notes in Computer Science , pages 22-33. Springer, 1988. Google ScholarGoogle Scholar
  113. Jana Dittmann, Thomas Fiebig, and Ralf Steinmetz. A new approach for transformation invariant image and video watermarking in the spatial domain: SSP self-spanning patterns. Security and Watermarking of Multimedia Contents II , SPIE-3971:176-185, 2000.Google ScholarGoogle Scholar
  114. Ray Dolby. Apparatus and method for the identification of specially encoded FM stereophonic broadcasts. United States Patent , 4,281,217, 1981.Google ScholarGoogle Scholar
  115. M. Dolson. The phase vocoder: A tutorial. Comput. Music J. , 10:14-27, 1986.Google ScholarGoogle Scholar
  116. R. O. Duda, P. E. Hart, and D. G. Stork. Pattern Classification, second edition . John Wiley & Sons, Inc., 2001. Google ScholarGoogle Scholar
  117. R. O. Duda, P. E. Hart, and D. H. Stork. Pattern Classification . Wiley Interscience, New York, 2000. Google ScholarGoogle Scholar
  118. J.-L. Dugelay and F. A. P. Petitcolas. Possible counter-attacks against random geometric distortions. In Proc. SPIE Conf. on Security and Watermarking of Multimedia Content II , volume 3971, pages 338-345, 2000.Google ScholarGoogle Scholar
  119. I. Dumer. Concatenated codes and their multilevel generalizations. In V. S. Pless, W. C. Huffman, and R. A. Brualdi, editors, Handbook of Coding Theory: Volume II , chapter 23, pages 1911-1988. Elsevier Science, Amsterdam, 1998.Google ScholarGoogle Scholar
  120. S. Dumitrescu and X. Wu. LSB steganalysis based on higher-order statistics. In Proceedings ACM Multimedia and Security Workshop, New York, NY, August 1-2 , 2005. Google ScholarGoogle Scholar
  121. S. Dumitrescu, X. Wu, and N. Memon. On steganalysis of random LSB embedding in continuous-tone images. In Proceedings ICIP, Rochester, NY, September 22-25, 2002 , pages 324-339, 2002.Google ScholarGoogle Scholar
  122. S. Dumitrescu, X. Wu, and Z. Wang. Detection of LSB steganography via sample pair analysis. In F. A. P. Petitcolas, editor, Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002 , volume 2578 of LNCS , pages 355-372. Springer-Verlag, New York, 2003. Google ScholarGoogle Scholar
  123. J. Eggers, R. Buml, and B. Girod. A communications approach to steganography. In Proceedings SPIE, Electronic Imaging, Security, and Watermarking of Multimedia Contents IV, San Jose, CA, January 21-24, 2002 , volume 4675, pages 26-37, 2002.Google ScholarGoogle Scholar
  124. J. J. Eggers, J. K. Su, and B. Girod. Robustness of a blind image watermarking scheme. In IEEE Int. Conf. on Image Processing , volume 3, pages 17-20, 2000.Google ScholarGoogle Scholar
  125. Joachim J. Eggers, Robert Buml, Roman Tzschoppe, and Bernd Girod. Scalar costa scheme for information embedding. IEEE Transactions on Signal Processing , 51(4):1003-1019, April 2003.Google ScholarGoogle Scholar
  126. Joachim J. Eggers and Bernd Girod. Watermark detection after quantization attacks. In A. Pfitzmann, editor, Third Int. Workshop on Information Hiding , volume 1768 of Lecture Notes in Computer Science , pages 172-186, 1999. Google ScholarGoogle Scholar
  127. Joachim J. Eggers and Bernd Girod. Quantization effects on digital watermarks. Signal Processing , 81(3), 2001. Google ScholarGoogle Scholar
  128. Joachim J. Eggers, Jonathan K. Su, and Bernd Girod. Public key watermarking by eigenvectors of linear transforms. In EUSIPCO , Tampere, Finland, Sept. 2000.Google ScholarGoogle Scholar
  129. J. Eggers, R. Baumi, and B. Girod. Estimation of amplitude modifications before SCS water mark detection. Proc. SPIE Security, Steganography and Watermarking of Mutlimedia Contents , 387-398, 2002.Google ScholarGoogle Scholar
  130. F. Ergun, J. Kilian, and R. Kumar. A note on the limits of collusion-resistant watermarks. In Advances in Cryptology--EUROCRYPT '99 , pages 140-149. Springer-Verlag, 1999. Google ScholarGoogle Scholar
  131. J. M. Ettinger. Steganalysis and game equilibria. In D. Aucsmith, editor, Information Hiding, 2nd International Workshop, IH 1998, Portland, Oregon, April 1998 , volume 1525 of LNCS , pages 319-328. Springer-Verlag, New York, 1998.Google ScholarGoogle Scholar
  132. H. Farid and L. Siwei. Detecting hidden messages using higher-order statistics and support vector machines. In F. A. P. Petitcolas, editor, Information Hiding, 5th International Workshop, IW 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002 , volume 2578 of LNCS , pages 340-354. Springer-Verlag, New York, 2002. Google ScholarGoogle Scholar
  133. Aníbal J. S. Ferreira. An odd-DFT based approach to time-scale expansion of audio signals. IEEE Trans. Speech and Audio Proc. , 7(4):441-453, 1999.Google ScholarGoogle Scholar
  134. David J. Field. Relations between the statistics of natural images and the response properties of cortical cells. J. Opt. Soc. Am. A , 4(12):2379-2394, 1987.Google ScholarGoogle Scholar
  135. D. Fragoulis, G. Rousopoulos, T. Panagopoulos, C. Alexiou, and C. Papaodysseus. On the automated recognition of seriously distorted musical recordings. IEEE Trans. on Signal Processing , 49(4):898-908, 2001.Google ScholarGoogle Scholar
  136. E. Franz. Steganography preserving statistical properties. In F. A. P. Petitcolas, editor, Information Hiding, 5th International Workshop , volume 2578 of LNCS , pages 278- 294. Springer-Verlag, New York, 2002. Google ScholarGoogle Scholar
  137. J. Fridrich. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In J. Fridrich, editor, Information Hiding, 6th International Workshop, IW 2004, Toronto, Canada, May 23-25, 2004 , volume 3200 of LNCS , pages 67-81. Springer-Verlag, New York, 2005. Google ScholarGoogle Scholar
  138. J. Fridrich and M. Goljan. Images with self-correcting capabilities. In Proc. IEEE Int. Conf. on Image Processing , volume 3, 1999.Google ScholarGoogle Scholar
  139. J. Fridrich and M. Goljan. On estimation of secret message length in LSB steganography in spatial domain. In Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, January 19-22, 2004 , volume 5306, pages 23-34, 2004.Google ScholarGoogle Scholar
  140. J. Fridrich, M. Goljan, and M. Du. Invertible authentication. In Proc. of SPIE, Security and Watermarking of Multimedia Contents , 2001.Google ScholarGoogle Scholar
  141. J. Fridrich, M. Goljan, and R. Du. Detecting LSB steganography in color and grayscale images. IEEE Multimedia, Special Issue on Security , 8(4):22-28, October-December 2001. Google ScholarGoogle Scholar
  142. J. Fridrich, M. Goljan, and R. Du. Reliabile detection of LSB steganography in grayscale and color images. In J. Dittmann, K. Nahrstedt, and P. Wohlmacher, editors, Proceedings of the ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, October 5, 2001 , pages 27-30, 2001. Google ScholarGoogle Scholar
  143. J. Fridrich, M. Goljan, and R. Du. Steganalysis based on JPEG compatibility. In A. G. Tescher, editor, Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia Systems and Applications IV, Denver, CO, August 20-24, 2001 , volume 4518, pages 275-280, 2001.Google ScholarGoogle Scholar
  144. J. Fridrich, M. Goljan, and D. Hogea. Steganalysis of JPEG images: Breaking the F5 algorithm. In 5th International Workshop on Information Hiding, Noordwijkerhout, The Netherlands, October 7-9, 2002 , volume 2578 of LNCS , pages 310-323. Springer, New York, 2002. Google ScholarGoogle Scholar
  145. J. Fridrich, M. Goljan, D. Hogea, and D. Soukal. Quantitative steganalysis of digital images: Estimating the secret message length. ACM Multimedia Systems Journal, Special Issue on Multimedia Security , 9(3):288-302, 2003.Google ScholarGoogle Scholar
  146. J. Fridrich, M. Goljan, and D. Soukal. Higher-order statistical steganalysis of palette images. In Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, Santa Clara, CA, January 21-24, 2003 , pages 178-190, 2003.Google ScholarGoogle Scholar
  147. J. Fridrich, M. Goljan, and D. Soukal. Perturbed quantization steganography using wet paper codes. In J. Dittman and J. Fridrich, editors, Proceedings ACM Multimedia and Security Workshop, Magdeburg, Germany, September 20-21, 2004 , pages 4-15. ACM Press, New York, 2004. Google ScholarGoogle Scholar
  148. J. Fridrich, M. Goljan, and D. Soukal. Perturbed quantization steganography. ACM Multimedia and Security Journal , 11(2):98-107, 2005.Google ScholarGoogle Scholar
  149. J. Fridrich, M. Goljan, and D. Soukal. Steganography via codes for memory with defective cells. In 43rd Conference on Coding, Communication, and Control, September 28-30, 2005 , 2005.Google ScholarGoogle Scholar
  150. J. Fridrich, M. Goljan, and D. Soukal. Efficient wet paper codes. In M. Barni, editor, Proceedings, Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005 , LNCS. Springer, Berlin, 2006.Google ScholarGoogle Scholar
  151. J. Fridrich, M. Goljan, D. Soukal, and T. Holotyak. Forensic steganalysis: Determining the stego key in spatial domain steganography. In Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, January 17-20, 2005 , volume 5681, pages 631-642, 2005.Google ScholarGoogle Scholar
  152. J. Fridrich and D. Soukal. Matrix embedding for large payloads. IEEE Trans on Information Security and Forensics , 1(3):390-394, 2006.Google ScholarGoogle Scholar
  153. J. Fridrich, R. Du, and M. Long. Steganalysis of LSB encoding in color images. IEEE International Conference on Multimedia and Expo , 2000.Google ScholarGoogle Scholar
  154. G. L. Friedman. The trustworthy camera: Restoring credibility to the photographic image. IEEE Trans. on Consumer Electronics , 39(4):905-910, 1993.Google ScholarGoogle Scholar
  155. G. L. Friedman. Digital camera with apparatus for authentication of images produced from an image file. United States Patent , 5,499,294, 1996.Google ScholarGoogle Scholar
  156. M. S. Fu and O. C. Au. Data hiding for halftone images. In Proc. SPIE Conf. on Security and Watermarking of Multimedia Data , volume 3971, pages 228-236, 2000.Google ScholarGoogle Scholar
  157. T. Furon and P. Duhamel. An asymmetric public detection watermarking technique. In Proc. of the 3rd Int. Information Hiding Workshop , pages 88-100, Dresden, Germany, Sept. 1999. Google ScholarGoogle Scholar
  158. T. Furon and P. Duhamel. Robustness of an asymmetric watermarking technique. IEEE Int. Conference on Image Processing , 3:21-24, 2000.Google ScholarGoogle Scholar
  159. F. Galand and G. Kabatiansky. Information hiding by coverings. In Proceedings ITW2003, Paris, France, 2003 , pages 151-154, 2003.Google ScholarGoogle Scholar
  160. R. A. Garcia. Digital watermarking of audio signals using a psychoacoustic auditory model and spread spectrum theory. Proc. 107th AES Convertion , 1999.Google ScholarGoogle Scholar
  161. S. I. Gel'fand and M. S. Pinsker. Coding for channel with random parameters. Problems of Control and Information Theory , 9(1):19-31, 1980.Google ScholarGoogle Scholar
  162. Bernd Girod. What's wrong with mean-squared error? In A. B. Watson, editor, Digital Images and Human Vision , chapter 15, pages 207-220. MIT Press, 1993. Google ScholarGoogle Scholar
  163. R. D. Gitlin, J. F. Hayes, and S. B. Weinstein. Data Communications Principles . Plenum Press, 1992. Google ScholarGoogle Scholar
  164. H. M. Gladney, F. C. Mintzer, and F. Schiattarella. Safeguarding digital library contents and users: Digital images of treasured antiquities. D-Lib Magazine , 1997.Google ScholarGoogle Scholar
  165. M. Goljan, J. Fridrich, and R. Du. Distortion-free data embedding for images. In 4th Int. Information Hiding Workshop , 2001. Google ScholarGoogle Scholar
  166. M. Goljan, J. Fridrich, and T. Holotyak. New blind steganalysis and its implications. In E. Delp III and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII , volume 6072, 1-13, 2006.Google ScholarGoogle Scholar
  167. R. C. Gonzalez and R. E. Woods. Digital Image Processing . Addison-Wesley, 1992. Google ScholarGoogle Scholar
  168. David M. Green and John A. Swets. Signal Detection Theory and Psychophysics . Robert E. Krieger Publishing Co., 1973.Google ScholarGoogle Scholar
  169. J. Haitsma and T. Kalker. A highly robust audio fingerprinting system. In 3rd Int. Conf. on Music Information Retrieval ISMIR 2002 , 2002.Google ScholarGoogle Scholar
  170. J. Haitsma, T. Kalker, and J. Oostveen. Robust audio hashing for content identification. In Content Based Multimedia Indexing , 2001.Google ScholarGoogle Scholar
  171. C. F. Hall and E. L. Hall. A nonlinear model for the spatial characteristics of the human visual system. IEEE Trans. Systems Man and Cybernetics , 7(3):161-170, 1977.Google ScholarGoogle Scholar
  172. Khaled N. Hamdy, Ahmed H. Tewfik, Ting Chen, and Satoshi Takagi. Time-scale modification of audio signals with combined harmonic and wavelet representations. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing , 1:439-442, 1997. Google ScholarGoogle Scholar
  173. A. Hanjalic, G. C. Langelaar, P. M. B. van Roosmalen, J. Biemond, and R. L. Lagendijk. Image and Video Databases: Restoration, Watermarking and Retrieval . Elsevier, 2000. Google ScholarGoogle Scholar
  174. J. J. Harmsen and W. A. Pearlman. Steganalysis of additive noise modelable information hiding. In E. Delp III and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, Santa Clara, CA, January 21-24, 2003 , volume 5020, pages 131-142, 2003.Google ScholarGoogle Scholar
  175. J. J. Harmsen and W. A. Pearlman. Capacity of steganalysis channels. In Proceedings ACM Multimedia and Security Workshop, New York, NY, August 1-2, 2005 , pages 11-24, 2005. Google ScholarGoogle Scholar
  176. Fredric J. Harris. On the use of windows for harmonic analysis with the Discrete Fourier Transform. Proc. IEEE , 66(1):51-83, 1978.Google ScholarGoogle Scholar
  177. F. Hartung, P. Eisert, and B. Girod. Digital watermarking of MPEG-4 facial animation parameters. Comput. and Graphics , 22(4):425-435, 1998.Google ScholarGoogle Scholar
  178. F. Hartung and B. Girod. Watermarking of uncompressed and compressed video. Signal Processing , 66(3):283-301, 1998. Google ScholarGoogle Scholar
  179. F. Hartung, J. K. Su, and B. Girod. Spread spectrum watermarking: Malicious attacks and counterattacks. In SPIE Conf. on Security and Watermarking of Multimedia Content , volume 3657, pages 147-158, 1999.Google ScholarGoogle Scholar
  180. Frank Hartung and Martin Kutter. Multimedia watermarking techniques. Proc. IEEE , 87(7):1079-1107, 1999.Google ScholarGoogle Scholar
  181. G. E. Healey and R. Kondepudy. Radiometric CCD camera calibration and noise estimation. IEEE Transactions on Pattern Analysis and Machine Intelligence , 16(3):267-276, March 1994. Google ScholarGoogle Scholar
  182. C. Heegard and A. El-Gamal. On the capacity of computer memory with defects. IEEE Trans. on Inform. Theory , 29:731-739, 1983.Google ScholarGoogle Scholar
  183. H. Heijmans and L. Kamstra. Reversible data embedding based on the Haar wavelet decomposition. In Proceedings of the Seventh International Conference on Digital Image Computing: Techniques and Applications (DICTA) , pages 5-13, 2003.Google ScholarGoogle Scholar
  184. C. W. Helstrom. Statistical Theory of Signal Detection . Pergamon Press, 1960.Google ScholarGoogle Scholar
  185. Emil Frank Hembrooke. Identification of sound and like signals. United States Patent , 3,004,104, 1961.Google ScholarGoogle Scholar
  186. H. Hering, M. Hagmüller, A. Kröpfl, and G. Kubin. Speech watermarking for air traffic control. In Proceedings of the XII European Signal Processing Conference (EUSIPCO) , pages 1653-1656, 2004.Google ScholarGoogle Scholar
  187. H. Hering, M. Hagmüller, and G. Kubin. Safety and security increase for air traffic management through unnoticeable watermark aircraft identification tag transmitted with the VHF voice communication. In Proceedings of the 22nd Digital Avionics Systems Conference , pages 4E2,1-10, 2003.Google ScholarGoogle Scholar
  188. J. J. Hernandez, F. Perez-Gonzalez, J. M. Rodriguez, and G. Nieto. Performance analysis of a 2D multipulse amplitude modulation scheme for data hiding and watermarking still images. IEEE Journal of Selected Areas in Communication , 16(4):510-524, 1998.Google ScholarGoogle Scholar
  189. J. R. Hernandez, M. Amado, and F. Perez-Gonzalez. DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Transactions on Image Processing , 9(1):55-68, 2000.Google ScholarGoogle Scholar
  190. J. R. Hernandez, J.-F. Delaigle, and B. Macq. Improving data hiding by using convolutional codes and soft-decision decoding. In Proc. SPIE Conf. on Security and Watermarking of Multimedia Content II , volume 3971, pages 24-47, 2000.Google ScholarGoogle Scholar
  191. J. R. Hernandez and F. Perez-Gonzalez. Statistical analysis of watermarking schemes for copyright protection of images. Proceedings of the IEEE , 87(7):1142-1166, 1999.Google ScholarGoogle Scholar
  192. Herodotus. The Histories . Penguin Books, London, 1996. Translated by Aubrey de Sélincourt.Google ScholarGoogle Scholar
  193. S. Hetzl and P. Mutzel. A graph-theoretic approach to steganography. In J. Dittmann et al., editor, Communications and Multimedia Security. 9th IFIP TC-6 TC-11 International Conference, CMS 2005 , volume 3677 of LNCS , pages 119-128, Salzburg, Austria, September 19-21, 2005. Google ScholarGoogle Scholar
  194. K. Hofbauer and H. Hering. Digital signatures for the analogue radio. In Proceedings of the 5th NASA Integrated Communications Navigation and Surveillance (ICNS) Conference and Workshop , 2005.Google ScholarGoogle Scholar
  195. Matthew Holliman and Nasir Memon. Counterfeiting attacks on oblivious blockwise independent invisible watermarking schemes. IEEE Trans. on Image Processing , 9(3):432-441, 2000.Google ScholarGoogle Scholar
  196. G. C. Holst. CCD Arrays, Cameras, and Displays, second edition , JCD Publishing & SPIE Press, 1998.Google ScholarGoogle Scholar
  197. L. Holt, B. G. Maufe, and A. Wiener. Encoded marking of a recording signal. UK Patent , GB 2196167A, 1988.Google ScholarGoogle Scholar
  198. C. Honsinger and M. Rabanni. Data embedding using phase dispersion. In Proc. Int. Conf. on Information Technology , 2000.Google ScholarGoogle Scholar
  199. C. W. Honsinger and S. J. Daly. Method for detecting rotation and magnification in images. United States Patent , 5,835,639, 1998.Google ScholarGoogle Scholar
  200. C. W. Honsinger, P. Jones, M. Rabbani, and J. C. Stoffel. Lossless recovery of an original image containing embedded data. U.S. Patent Application, Docket No. 77102/E-D , 1999.Google ScholarGoogle Scholar
  201. N. J. Hopper, J. Langford, and L. von Ahn. Provably secure steganography. In M. Yung, editor, Advances in Cryptology: CRYPTO 2002 , volume 2442 of LNCS , pages 77-92. Springer, 2002. Google ScholarGoogle Scholar
  202. C.-T. Hsu and J.-L. Wu. Hidden digital watermarks in images. IEEE Trans. on Image Processing , 8(1):58-68, 1999.Google ScholarGoogle Scholar
  203. Y. N. Hsu, H. H. Arsenault, and G. April. Rotation-invariant digital pattern recognition using circular harmonic expansion. Applied Optics , 21:4012-4015, 1982.Google ScholarGoogle Scholar
  204. Dard Hunter. Handmade Paper and Its Watermarks: A Bibliography . B. Franklin, New York, 1967.Google ScholarGoogle Scholar
  205. Methodology for the subjective assessment of the quality of television pictures-- Recommendation ITU-R BT.500-10 . ITU Radiocommunication Assembly, 2000.Google ScholarGoogle Scholar
  206. D. W. Jacobs. Grouping for recognition. AI Memo 1177 , MIT, 1989. Google ScholarGoogle Scholar
  207. J. R. Janesick. Scientific Charge-Coupled Devices , volume Monograph PM83. SPIE Press--The International Society for Optical Engineering, January 2001.Google ScholarGoogle Scholar
  208. N. Jayant, J. Johnston, and R. Safranek. Signal compression based on models of human perception. Proc IEEE , 81(10), 1993.Google ScholarGoogle Scholar
  209. N. Johnson, Z. Duric, and S. Jajodia. Information Hiding: Steganography and Watermarking--Attacks and Countermeasures . Kluwer Academic Publishers, 2000.Google ScholarGoogle Scholar
  210. N. Johnson and S. Jajodia. Steganalysis: The investigation of hidden information. In Proceedings of the 1998 IEEE Information Technology Conference, Syracuse, NY, September 1-3, 1998 .Google ScholarGoogle Scholar
  211. N. F. Johnson and S. Jajodia. Steganalysis of images created using current steganography software. In D. Aucsmith, editor, Information Hiding, 2nd International Workshop, Portland, OR, April 1998 , volume 1525 of LNCS , pages 273-289. Springer-Verlag, Berlin, 1998.Google ScholarGoogle Scholar
  212. N. F. Johnson and S. Jajodia. Steganography: Seeing the unseen. IEEE Computer , pages 26-34, February 1998. Google ScholarGoogle Scholar
  213. JTC1/SC29/WG11 MPEG. Information technology--coding of moving pictures and associated audio for digital storage media at up to about 1.5 Mbits/s--part 3: Audio. Technical Report IS11172-3, ISO/IEC, 1992.Google ScholarGoogle Scholar
  214. David Kahn. The Codebreakers--The Story of Secret Writing . Scribner, New York, 1967.Google ScholarGoogle Scholar
  215. A. B. Kahng, S. Mantik, I. L. Markov, M. Potkonjak, P. Tucker, Huijuan Wang, and G. Wolfe. Robust IP watermarking methodologies for physical design. Proceedings 35th Design and Automation Conference , pages 782-787, 1998. Google ScholarGoogle Scholar
  216. T. Kalker and A. J. E. M. Janssen. Analysis of watermark detection using SPOMF. In Proceedings. 1999 International Conference on Image Processing , volume 1, 1999.Google ScholarGoogle Scholar
  217. T. Kalker, J.-P. Linnartz, and M. van Dijk. Watermark estimation through detector analysis. In Proceedings. 1998 International Conference on Image Processing , volume 1, 1998.Google ScholarGoogle Scholar
  218. T. Kalker and F. M. Willems. Capacity bounds and code constructions for reversible data-hiding. In E. Delp III, editor, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V , volume 5020, pages 604-611, January 2003.Google ScholarGoogle Scholar
  219. H. R. Kang. Digital Color Halftoning . IEEE Press, 1999. Google ScholarGoogle Scholar
  220. M. Karahan, U. Topkara, M. Atallah, C. Taskiran, E. Lin, and E. Delp. A hierarchical protocol for increasing the stealthiness of steganographic methods. In Proceedings ACM Multimedia and Security Workshop, Magdeburg, Germany, September 20-21, 2004 , pages 16-24, 2004. Google ScholarGoogle Scholar
  221. S. Katzenbeisser and F. Petitcolas, editors. Information Hiding Techniques for Steganography and Digital Watermarking . Artech House, 2000. Google ScholarGoogle Scholar
  222. S. Katzenbeisser and F. A. P. Petitcolas. On defining security in steganographic systems. In Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IV, San Jose, CA, January 21-24, 2002 , volume 4675, pages 50-56, 2002.Google ScholarGoogle Scholar
  223. D. H. Kelly. Visual responses to time dependent stimuli. I. Amplitude sensitivity measurements. J. Opt. Soc. Am. A , 51:422-429, 1961.Google ScholarGoogle Scholar
  224. A. Ker. Quantitative evaluation of pairs and RS steganalysis. In E. J. Delp III and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, January 19-22, 2004 , volume 5306, pages 83-97, 2004.Google ScholarGoogle Scholar
  225. A. Ker. A general framework for structural analysis of LSB replacement. In M. Barni, et al., editors, Proceedings 7th Information Hiding Workshop, Barcelona, Spain, June 6-8, 2005 , volume 3727, Lecture Notes in Computer Science , pages 276-311. Springer-Verlag, Berlin, 2005.Google ScholarGoogle Scholar
  226. A. Ker. Improved detection of LSB steganography in grayscale images. In J. Fridrich, editor, Preproceedings, Information Hiding, 6th International Workshop, IIH 2004, Toronto, Canada, May 23-25, 2004 , volume 3200 of LNCS , pages 97-115. Springer-Verlag, Berlin, 2005. Google ScholarGoogle Scholar
  227. A. Ker. Resampling and the detection of LSB matching in color bitmaps. In E. Delp, et al., editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, January 16-20, 2005 , volume 5681, pages 1-15, 2005.Google ScholarGoogle Scholar
  228. A. Ker. Optimally weighted least-squares steganalysis. In E. Delp, et al., editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX , volume 6502, pages 06-1-06-16, 2007.Google ScholarGoogle Scholar
  229. A. Ker and R. Boehme. A two-factor error model for quantitative steganalysis. In E. Delp, et al., editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII , volume 6072, pages 06-1-06-16, 2006.Google ScholarGoogle Scholar
  230. A. D. Ker. Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters , 12(6):441-444, June 2005.Google ScholarGoogle Scholar
  231. Aguste Kerckhoff. La cryptographie militaire. Journal des sciences militaires , IX( Jan., Feb.):5-38, 161-191, 1883.Google ScholarGoogle Scholar
  232. Dogan Kesdogan, Jan Egner, and Roland Büschks. Stop-and-Go-MIXes providing probabilistic anonymity in an open system. In Proc. of the 2nd Int. Information Hiding Workshop , pages 83-98, 1998.Google ScholarGoogle Scholar
  233. M. Kharrazi, H. T. Sencar, and N. Memon. Cover selection for steganographic embedding. In IEEE International Conference on Image Processing , 2006.Google ScholarGoogle Scholar
  234. A. Kiayias, Y. Raekow, and A. Russell. Efficient steganography with provable security gurantees. In M. Barni, et al., editors, Proceedings, Information Hiding, 7th International Workshop, IH Barcelona, Spain, June 6-8, 2005 , volume 3727 of LNCS , pages 118-130. Springer-Verlag, Berlin, 2005.Google ScholarGoogle Scholar
  235. David Kilburn. Dirty linen, dark secrets. Adweek , 1997.Google ScholarGoogle Scholar
  236. J. Kilian, F. T. Leighton, L. R. Matheson, T. Shamoon, and R. E. Tarjan. Resistance of watermarked documents to collusional attacks. Technical Report TR 97-167, NEC Research Institute, 1997.Google ScholarGoogle Scholar
  237. E. Koch and J. Zhao. Towards robust and hidden image copyright labeling. In IEEE Workshop on Nonlinear Signal and Image Processing , 1995.Google ScholarGoogle Scholar
  238. N. Komatsu and H. Tominaga. Authentication system using concealed image in telematics. Memoirs of the School of Science and Engineering, Waseda University , 52:45-60, 1988.Google ScholarGoogle Scholar
  239. N. Komatsu and H. Tominaga. A proposal on digital watermark in document image communication and its application to realizing a signature. Electronics and Communications in Japan , 73(5):208-218, 1990.Google ScholarGoogle Scholar
  240. D. Kundur and D. Hatzinakos. Blind image deconvolution. IEEE Signal Processing Magazine , 13(3):43-64, 1996.Google ScholarGoogle Scholar
  241. D. Kundur and D. Hatzinakos. Semi-blind image restoration based on telltale watermarking. In Conference Record of the Thirty-Second Asilomar Conference on Signals, Systems and Computers , volume 2, 1998.Google ScholarGoogle Scholar
  242. D. Kundur and D. Hatzinakos. Digital watermarking for telltale tamper proofing and authentication. Proc. of the IEEE , 87(7), 1999.Google ScholarGoogle Scholar
  243. M. Kutter. Watermarking resisting to translation, rotation and scaling. In Multimedia Systems and Applications , volume Proc. SPIE-3528:423-431, 1998.Google ScholarGoogle Scholar
  244. M. Kutter. Performance improvement of spread spectrum based image watermarking schemes through M-ary modulation. In A. Pfitzmann, editor, Third Int. Workshop on Information Hiding , volume 1768 of Lecture Notes in Computer Science , pages 237-252, 1999. Google ScholarGoogle Scholar
  245. M. Kutter, S. K. Bhattacharjee, and T. Ebrahimi. Towards second generation watermarking systems. In IEEE Int. Conf. on Image Processing , volume 1, pages 320-323, 1999.Google ScholarGoogle Scholar
  246. M. Kutter and F. Hartung. Introduction to watermarking techniques. In S. Katzenbeisser and F. A. P. Petitcolas, editors, Information Hiding: Techniques for Steganography and Digital Watermarking , chapter 5, pages 97-120. Artech House, 2000.Google ScholarGoogle Scholar
  247. M. Kutter and F. A. P. Petitcolas. A fair benchmark for image watermarking systems. Security and Watermarking of Multimedia Contents , Proc. SPIE-3657:226-239, 1999.Google ScholarGoogle Scholar
  248. M. Kutter, S. Voloshynovskiy, and A. Herrigel. The watermark copy attack. Security and Watermarking of Multimedia Contents II , Proc. SPIE-3971:371-380, 2000.Google ScholarGoogle Scholar
  249. J. Lach, W. Mangione-Smith, and M. Potknojak. Fingerprinting digital circuits on programmable hardware. In Proc. of the 2nd Int. Information Hiding Workshop , pages 16-31, 1998.Google ScholarGoogle Scholar
  250. Jean Laroche and Mark Dolson. Improved phase vocoder time-scale modification of audio. IEEE Trans. Speech and Audio Proc. , 7(3):323-332, 1999.Google ScholarGoogle Scholar
  251. J. Le Moigne. Towards a parallel registration of multiple resolution remote sensing data. In Proc. of 1995 International Geoscience and Remote Sensing Symposium , pages 1011-1013, July 1995.Google ScholarGoogle Scholar
  252. Jaejin Lee and Chee Sun Won. Authentication and correction of digital watermarking images. Electronic Letters , 35(11), 1999.Google ScholarGoogle Scholar
  253. Jaejin Lee and Chee Sun Won. Image integrity and correction using parities of error control coding. In IEEE Int. Conf. on Multimedia and Expo, 2000 , volume 3, 2000.Google ScholarGoogle Scholar
  254. K. Lee, D. Kim, T. Kim, and K. Moon, EM estimation of scale factor for quantization-based audio watermarking. Int. Proc 2nd Workshop on Digital Watermarking , LCNS 2939: 316-327, 2003.Google ScholarGoogle Scholar
  255. K. Lee, A. Westfeld, and S. Lee. Category attack for LSB embedding of JPEG images. In Proceedings of the International Workshop on Digital Watermarking, LNCS Springer-Verlag , volume 4283, pages 35-38, 2006.Google ScholarGoogle Scholar
  256. Q. Li and I. J. Cox. Rational dither modulation watermarking using a perceptual model. In IEEE International Workshop on Multimedia Signal Processing (MMSP) , pages 1-4, 2005.Google ScholarGoogle Scholar
  257. Q. Li and I. J. Cox. Using perceptual models to improve fidelity and provide invariance to valumetric scaling for quantization index modulation watermarking. In IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP) , volume 2, pages 1-4, 2005.Google ScholarGoogle Scholar
  258. Te-shen Liang and Jeffrey J. Rodriguez. Robust watermarking using robust coefficients. Security and Watermarking of Multimedia Contents. II , SPIE-3971:326-335, 2000.Google ScholarGoogle Scholar
  259. C.-Y. Lin and S.-F. Chang. Semi-fragile watermarking for authenticating JPEG visual content. In Proc of SPIE, Security and Watermarking in Multimedia Contents II , volume 3971, 2000.Google ScholarGoogle Scholar
  260. C.-Y. Lin and Shih-Fu Chang. A robust image authentication algorithm surviving JPEG compression. Storage and Retireval of Image/Video Databases , SPIE-, 1998.Google ScholarGoogle Scholar
  261. C.-Y. Lin and Shih-Fu Chang. Issues and solutions for authenticating MPEG video. Security amd Watermarking of Multimedia Contents , Proc. SPIE-3657, 1999.Google ScholarGoogle Scholar
  262. C.-Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller, and Y. M. Lui. Rotation, scale and translation resilient public watermarking for images. Security and Watermarking of Multimedia Contents , Proc. SPIE-3971:90-98, 2000.Google ScholarGoogle Scholar
  263. Ching-Yung Lin and Shih-Fu Chang. Distortion modeling and invariant extraction for digital image print-and-scan process. Int. Symp. on Multimedia Information Processing , 1999.Google ScholarGoogle Scholar
  264. E. T. Lin, C. I. Podilchuk, and E. J. Delp. Detection of image alterations using semifragile watermarks. In Proc. SPIE Security and Watermarking of Multimedia Contents III , volume 3971, 152-163, 2000.Google ScholarGoogle Scholar
  265. F. Lin and R. D. Brandt. Towards absolute invariants of images under translation, rotation, and dilation. Pattern Recognition Letters , 14(5):369-379, 1993. Google ScholarGoogle Scholar
  266. T. Lindkvist. Fingerprinting Digital Document . Ph.D. thesis, Linköping University, 1999.Google ScholarGoogle Scholar
  267. J.P.M.G. Linnartz and J. C. Talstra. MPEG PTY-marks: Cheap detection of embedded copyright data in DVD-video. In Proceeding of ESORICS98 5th European Symposium on Research in Computer Security , 1998. Google ScholarGoogle Scholar
  268. J.P.M.G. Linnartz, A. C. C. Kalker, and G. F. Depovere. Modelling the false-alarm and missed detection rate for electronic watermarks. In D. Aucsmith, editor, Workshop on Information Hiding, Portland, OR , volume 1525 of Lecture Notes in Computer Science , pages 329-343. Springer, April, 15-17, 1998.Google ScholarGoogle Scholar
  269. J.P.M.G. Linnartz and Marten van Dijk. Analysis of the sensitivity attack against electronic watermarks in images. In Workshop on Information Hiding, Portland, OR , April, 15-17, 1998.Google ScholarGoogle Scholar
  270. J. Löfvenberg. Random Codes for Digital Fingerprinting . Ph.D. thesis, Linköping University, 1999.Google ScholarGoogle Scholar
  271. S. Low and N. Maxemchuk. Performance comparison of two text marking methods. IEEE Journal of Selected Areas in Communication , 16:561-572, 1998.Google ScholarGoogle Scholar
  272. Chun-Shien Lu, Hong-Yuan Mark Liao, Shih-Kun Huang, and Chwen-Jye Sze. Cocktail watermarking on images. In A. Pfitzmann, editor, Third Int. Workshop on Information Hiding , volume 1768 of Lecture Notes in Computer Science , pages 333-347, 1999. Google ScholarGoogle Scholar
  273. P. Lu, X. Luo, Q. Tang, and L. Shen. An improved sample pairs method for detection of LSB embedding. In J. Fridrich, editor, Information Hiding, 6th International Workshop , volume 3200 of LNCS , pages 116-127. Springer-Verlag, Berlin, 2004. Google ScholarGoogle Scholar
  274. J. Lubin. The use of psychophysical data and models in the analysis of display system performance. In A. B. Watson, editor, Digital Images and Human Vision , pages 163-178. MIT Press, 1993. Google ScholarGoogle Scholar
  275. M. Luby. LT codes. In Proceedings, 43rd Annual IEEE Symposium on Foundations of Computer Science, November 16-19, 2002 , pages 271-282, 2002. Google ScholarGoogle Scholar
  276. Bruce D. Lucas and Takeo Kanade. An iterative image registration technique with an application to stereo vision. Proc. International Joint Conference on Artificial Intelligence , pages 674-679, 1981. Google ScholarGoogle Scholar
  277. N. B. Lucena, S. J. Chapin, J. Pease, and P. Yadollahpour. Syntax and semantics-- preserving application-layer protocol steganography. In J. Fridrich, editor, Information Hiding, 6th International Workshop, Toronto, Canada, May 23-25, 2004 , volume 3200 of LNCS , pages 164-179, 2004. Google ScholarGoogle Scholar
  278. J. Luk¿, J. Fridrich, and M. Goljan. Digital camera identification from sensor noise. IEEE Transactions on Information Security and Forensics , 1(2), 2006.Google ScholarGoogle Scholar
  279. B. M. Macq and J-J. Quisquater. Cryptology for digital TV broadcasting. Proc. of the IEEE , 83(6):944-957, 1995.Google ScholarGoogle Scholar
  280. F. J. MacWilliams and Neil J. A. Sloane. Pseudo-random sequences and arrays. Proc. of the IEEE , 64(12):1715-1729, 1976.Google ScholarGoogle Scholar
  281. M.J.J.J.B. Maes and C.W.A.M. van Overveld. Digital watermarking by geometric warping. In IEEE Int. Conf. on Image Processing , volume 2, pages 424-426, 1998.Google ScholarGoogle Scholar
  282. J. L. Mannos and J. J. Sakrison. The effects of a visual fidelity criterion on the encoding of images. IEEE Trans. Inform. Theory , IT-4:525-536, 1974.Google ScholarGoogle Scholar
  283. Hedy Kiesler Markey and George Antheil. Secret communication system. Technical Report 2,292,387, United States Patent , 1942.Google ScholarGoogle Scholar
  284. L. Marks. Between Silk and Cyanide: A Codemaker's War, 1941-1945 . Free Press, 2000.Google ScholarGoogle Scholar
  285. Mathison. Gentlemen's Magazine , XLIX, 1779.Google ScholarGoogle Scholar
  286. J. Meng and S.-F. Chang. Embedding visible video watermarks in the compressed domain. In IEEE Int. Conf. on Image Processing , volume 1, pages 474-477, 1998.Google ScholarGoogle Scholar
  287. M. K. Mihcak, I. Kozintsev, K. Ramchandran, and P. Moulin. Low-complexity image denoising based on statistical modeling of wavelet coefficients. IEEE Signal Processing Letters , 6(12):300-303, December 1999.Google ScholarGoogle Scholar
  288. G. L. Miller, G. J. Doerr, and I. J. Cox. Dirty-paper trellis codes for watermarking. In IEEE Int. Conf. on Image Processing , volume 2, pages II-129-II-132, 2002.Google ScholarGoogle Scholar
  289. M. L. Miller and J. A. Bloom. Computing the probability of false watermark detection. In Proceedings of the Third International Workshop on Information Hiding , 1999. Google ScholarGoogle Scholar
  290. M. L. Miller, I. J. Cox, and J. A. Bloom. Informed embedding: Exploiting image and detector information during watermark insertion. In IEEE International Conference on Image Processing , September 2000.Google ScholarGoogle Scholar
  291. M. L. Miller, G. Doerr, and I. J. Cox. Applying informed coding and informed embedding to design a robust high capacity watermark. IEEE Trans. on Image Processing , 13(6), 2004.Google ScholarGoogle Scholar
  292. M. L. Miller, M. A. Rodriguez, and I. J. Cox. Audio fingerprinting: Nearest neighbor search in high-dimensional binary spaces. In IEEE Multimedia Signal Processing Workshop , pages 182-185, 2002.Google ScholarGoogle Scholar
  293. M. L. Miller, M. A. Rodriguez, and I. J. Cox. Audio fingerprinting: Nearest neighbor search in high-dimensional binary spaces. J. of VLSI Signal Processing , 2005. Google ScholarGoogle Scholar
  294. F. Mintzer, J. Lotspiech, and N. Morimoto. Safeguarding digital library contents and users: Digital watermarking. D-Lib Magazine , http://www.dlib.org/dlib/december97/ ibm/12lotspiech.html#FM2, 1997.Google ScholarGoogle Scholar
  295. S. P. Mohanty, K. R. Ramakrishnan, and M. S. Kankanhalli. A DCT domain visible watermarking technique for images. In IEEE Int. Conf. on Multimedia and Expo , volume 2, pages 1029-1032, 2000.Google ScholarGoogle Scholar
  296. Warren D. Moon, Richard J. Weiner, Robert A. Hansen, and Robert N. Linde. Broadcast signal identification system. United States Patent , 3,919,479, 1975.Google ScholarGoogle Scholar
  297. T. Moriya, Y. Takashima, T. Nakamura, and N. Iwakami. Digital watermarking schemes based on vector quantization. In Proc. of IEEE Workshop on Speech Coding for Telecommunications , pages 95-96, 1997.Google ScholarGoogle Scholar
  298. Ira S. Moskowitz and Li Wu Chang. An entropy-based framework for database inference. In Proc. of the 3rd Int. Information Hiding Workshop , 1999. Google ScholarGoogle Scholar
  299. P. Moulin and R. Koctter. Data-hiding. Proc. IEEE , 93(12), 2083-2127, 2005.Google ScholarGoogle Scholar
  300. P. Moulin, M. K. Mihcak, and G. I. Lin. An information-theoretic model for image watermarking and data hiding. In Proceedings ICIP'00, IEEE International Conference on Image Processing, Vancouver, Canada, September 2000 , 2000.Google ScholarGoogle Scholar
  301. P. Moulin and J. A. O'Sullivan. Information-theoretic analysis of information hiding. Preprint , available from http://www.ifp.uiuc.edu/moulin/Papers, 1999.Google ScholarGoogle Scholar
  302. P. Moulin, A. K. Cotetr, and Rko¿llcr. "Optimal" spare-QIM codes zero-rate blind watermarking. Proceedings of ICASSP , volume 3, 73-76, 2004.Google ScholarGoogle Scholar
  303. P. Moulin and J. A. O'Sullivan. Information-theoretic analysis of information hiding. IEEE Trans. Inform. Theory , 49(3):563-593, March 2003.Google ScholarGoogle Scholar
  304. P. Moulin and Y. Wang. New results on steganographic capacity. In Proceedings CISS Conference, Princeton, NJ, March 2004 , 2004.Google ScholarGoogle Scholar
  305. F. Müller. Distribution shape of two-dimensional DCT coefficients of natural images. Electronics Letters , 29(22):1935-1936, 1993.Google ScholarGoogle Scholar
  306. H. Murase and S. Nayar. Visual learning and recognition of 3D objects from appearance. Int. J. Computer Vision , 14(1):5-25, 1995. Google ScholarGoogle Scholar
  307. H. Muratani. A collusion-secure fingerprinting code reduced by Chinese remaindering and its random-error resilience. In Proceedings of Int. Workshop on Information Hiding '01 , 2001. Google ScholarGoogle Scholar
  308. National Institute of Standards and Technology. Digital signature standard. Technical Report NIST FIPS PUB 185, U.S. Department of Commerce, May 1994.Google ScholarGoogle Scholar
  309. H. Neuschmied, H. Mayer, and E. Battle. Content-based indentification of audio titles on the Internet. In Proc. Int. Conf. on Web Delivering of Music , 2001. Google ScholarGoogle Scholar
  310. Z. Ni, Y. Q. Shi, N. Ansari, and W. Su. Reversible data hiding. IEEE Transactions on Circuits Systems and Video Technology , 16(3):354-362, March 2006.Google ScholarGoogle Scholar
  311. H. Noda, M. Niimi, and E. Kawaguchi. Application of QIM with dead zone for histogram preserving JPEG steganography. In Proceedings ICIP, Genova, 2005 , 2005.Google ScholarGoogle Scholar
  312. R. Ohbochi, H. Masuda, and M. Aono. Watermarking three-dimensional polygonal models through geometric and topological modifications. IEEE Journal of Selected Areas in Communication , 16(4):551-560, 1998.Google ScholarGoogle Scholar
  313. J. Oostveen, T. Kalker, and J. Haitsma. Feature extraction and a database strategy for video fingerprinting. In 5th Int. Conf. on Visual Information Systems , volume LNCS 2314, pages 117-128. Springer-Verlag, 2002. Google ScholarGoogle Scholar
  314. J. C. Oostveen, A. A. C. Kalker, and M. Staring. Adaptive quantization watermarking. In Proc. of SPIE: Security, Steganography, and Watermarking of Multimedia Contents VI , volume 5306, pages 37-39, San Jose, CA. January 2004.Google ScholarGoogle Scholar
  315. Alan V. Oppenheim and Ronald W. Schafer. Digital Signal Processing . Prentice-Hall, 1975.Google ScholarGoogle Scholar
  316. J. J. K. Ó Ruanaidh, E. M. Boland, and W. J. Dowling. Phase watermarking of digital images. Proc. IEEE Int. Conf. on Image Processing , III:239-242, 1996.Google ScholarGoogle Scholar
  317. J. J. K. Ó Ruanaidh and T. Pun. Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Processing , 66(3):303-317, 1998. Google ScholarGoogle Scholar
  318. Ted Painter and Andreas Spanias. Perceptual coding of digital audio. Proc. IEEE , 88(4):451-513, 2000.Google ScholarGoogle Scholar
  319. H. C. Papadopoulos and C.-E.W. Sundberg. Simultaneous broadcasting of analog FM and digital audio signals by means of precanceling techniques. In IEEE Int. Conf. on Communications, ICC '98 , volume 2, pages 728-732, 1998.Google ScholarGoogle Scholar
  320. Athanasios Papoulis. Probability, Random Variables, and Stochastic Processes, third edition . McGraw-Hill, 1991.Google ScholarGoogle Scholar
  321. A. Patrizio. Why the dvd hack was a cinch. Wired , November 1999.Google ScholarGoogle Scholar
  322. W. B. Pennebaker and J. L. Mitchell. JPEG Still Image Data Compression Standard . Van Nostrand Reinhold, 1993. Google ScholarGoogle Scholar
  323. S. Pereira, J. J. K. Ó Ruanaidh, and T. Pun. Secure robust digital watermarking using the lapped othogonal transform. In SPIE Conf. on Security and Watermarking of Multimedia Content , volume SPIE 3657, pages 21-30, 1999.Google ScholarGoogle Scholar
  324. S. Pereira and T. Pun. Robust template matching for affine resistant image watermarks. IEEE Transactions on Image Processing , 9(6):1123-1129, 2000.Google ScholarGoogle Scholar
  325. S. Pereira, J. J. K. Ó Ruanaidh, F. Deguillaume, G. Csurka, and T. Pun. Template based recovery of Fourier-based watermarks using log-polar and log-log maps. In IEEE International Conference on Multimedia Computing and Systems , volume 1, pages 870-874, 1999. Google ScholarGoogle Scholar
  326. S. Pereira, S. Voloshynovskiy, and T. Pun. Effective channel coding for DCT watermarks. In IEEE Int. Conf. on Image Processing , volume 3, pages 671-673, 2000.Google ScholarGoogle Scholar
  327. F. Perez-Gonzalez, M. Barni, A. Abrardo, and C. Mosquera. Rational dither modulation: A novel data-hiding method robust to value-metric scaling attacks. In IEEE International Workshop on Multimedia Signal Processing , Siena, Italy, Sept. 2004.Google ScholarGoogle Scholar
  328. Fabian A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn. Attacks on copyright marking systems. In Workshop on Information Hiding, Portland, OR , April, 15-17, 1998. Google ScholarGoogle Scholar
  329. Fabien A. P. Petitcolas, Ross Anderson, and Markus G. Kuhn. Information hiding--a survey. Proc. IEEE , 87(7):1062-1077, 1999.Google ScholarGoogle Scholar
  330. T. Pevny and J. Fridrich. Multiclass blind steganalyasis for JPEG images. In E. Delp III and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII , 6072, 01-013, 2006.Google ScholarGoogle Scholar
  331. T. Pevny and J. Fridrich. Merging Markov and DCT features for multi-class JPEG steganalysis. In E. J. Delp and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX , volume 6505, pages 03-1-03-13, January 2007.Google ScholarGoogle Scholar
  332. R. L. Pickholtz, D. L. Schilling, and L. B. Milstein. Theory of spread-spectrum communications--a tutorial. IEEE Trans. on Communications , 30(5):855-884, 1982.Google ScholarGoogle Scholar
  333. S. Pietrobon, R. Deng, A. Lafanechere, G. Ungerboeck, and D. Costello. Trellis-coded multidimensional phase modulation. IEEE Transactions on Information Theory , 36:6389, 1990.Google ScholarGoogle Scholar
  334. Playboy magazine. Playboy Enterprises International, Inc., November 1972.Google ScholarGoogle Scholar
  335. Christine I. Podilchuk and Wenjun Zeng. Image-adaptive watermarking using visual models. IEEE Journal of Selected Areas in Communication , 16(4):525-539, 1998.Google ScholarGoogle Scholar
  336. William H. Press, Saul A. Teukolsky, William T. Vetterling, and Brian P. Flannery. Numerical Recipes in C: The Art of Scientific Computing . Cambridge University Press, 1992. Google ScholarGoogle Scholar
  337. R. D. Preuss, S. E. Roukos, A. W. F. Huggins, H. Gish, M. A. Bergamo, P. M. Peterson, and Derr A. G. Embedded signalling. United States Patent , 5,319,735, 1994.Google ScholarGoogle Scholar
  338. N. Provos. Defending against statistical steganalysis. In 10th USENIX Security Symposium, Washington, DC , 2001. Google ScholarGoogle Scholar
  339. N. Provos and P. Honeyman. Detecting steganographic content on the Internet. Technical Report 01-11, CITI, August 2001.Google ScholarGoogle Scholar
  340. L. Qiao and K. Nahrstedt. Non-invertible watermarking methods for MPEG encoded audio. In Proc. SPIE Conf. on Security and Watermarking of Multimedia Data , volume 3657, pages 194-203, 1999.Google ScholarGoogle Scholar
  341. R. Radhakrishnan, M. Kharrazi, and N. Memon. Data masking a new approach for data hiding? Journal of VLSI Signal Processing Systems , 41(3):293-303, November 2005. Google ScholarGoogle Scholar
  342. H. A. Rahmel. System for determining the listen habits of wave signal receiver users. United States Patent , 2,513,360, 1950.Google ScholarGoogle Scholar
  343. M. Ramkumar. Data Hiding in Multimedia: Theory and Applications . Ph.D. thesis, New Jersey Institute of Technology, 1999.Google ScholarGoogle Scholar
  344. Chris Reidy. Knocking off the knockoff. The Boston Globe , page D1, November 17, 2000.Google ScholarGoogle Scholar
  345. R. C. Reininger and J. D. Gibson. Distribution of the two-dimensional DCT coefficients for images. IEEE Trans. on Comm. , 31(6):835-839, 1983.Google ScholarGoogle Scholar
  346. Christian Rey and Jean-Luc Dugelay. Blind detection of malicious alterations on still images using robust watermarks. IEE Seminar: Secure Images and Image Authentication , pages 7/1-7/6, 2000.Google ScholarGoogle Scholar
  347. Geoffrey B. Rhoads. Image steganography system featuring perceptually adaptive and globally scalable signal embedding. United States Patent , 5,748,763, 1998.Google ScholarGoogle Scholar
  348. Geoffrey B. Rhoads. Steganography system. United States Patent , 5,850,481, 1998.Google ScholarGoogle Scholar
  349. R. L. Rivest. RFC 1321: The MD5 Message-Digest Algorithm. Internet Activities Board , 1992. Google ScholarGoogle Scholar
  350. R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptsystems. Communications of the ACM , 21(2):120-126, 1978. Google ScholarGoogle Scholar
  351. P. M. J. Rongen, M.J.J.J.B. Maes, and C.W.A.M. van Overveld. Digital image watermarking by salient point modification practical results. In SPIE Conf. on Security and Watermarking of Multimedia Content , volume 3657, pages 273-282, 1999.Google ScholarGoogle Scholar
  352. C. B. Rorabaugh. Error Coding Cookbook: Practical C/C++ Routines and Recipes for Error Detection and Correction . McGraw-Hill, 1996. Google ScholarGoogle Scholar
  353. H. L. Royden. Real Analysis . MacMillan Publishing Co., 1968.Google ScholarGoogle Scholar
  354. D. L. Ruderman and W. Bialek. Statistics of natural images: Scaling in the woods. Physics Review Letters , 73:814-817, 1994.Google ScholarGoogle Scholar
  355. J. Ryan. Method and apparatus for preventing the copying of a video program. United States Patent , 4,907,093, 1990.Google ScholarGoogle Scholar
  356. Screen Actors Guild. http://www.sag.org/pressreleases/prla990826spotchecks.html, 1999.Google ScholarGoogle Scholar
  357. P. Sallee. Model-based steganography. In T. Kalker, I. J. Cox, and Y. M. Ro, editors, Digital Watermarking, 2nd International Workshop, IWDW 2003, Seoul, Korea, October 20-20, 2003 , volume 2939 of LNCS , pages 154-167. Springer-Verlag, New York, 2004.Google ScholarGoogle Scholar
  358. D. V. Sarwate and M.-B. Pursley. Cross-correlation properties of pseudo-random and related sequences. Proc. of the IEEE , 688(5):593-619, 1980.Google ScholarGoogle Scholar
  359. K. Sayood. Introduction to Data Compression, second edition . Morgan Kaufmann, 2000. Google ScholarGoogle Scholar
  360. E. Sayrol, J. Vidal, S. Cabanillas, and S. Santamaria. Optimum watermark detection for color images. In IEEE Int. Conf. on Image Processing , volume 2, pages 231-235, 1999.Google ScholarGoogle Scholar
  361. M. Schneider and S.-F. Chang. A robust content based digital signature for image authentication. In IEEE Int. Conf. on Image Processing , volume 3, pages 227-230, 1996.Google ScholarGoogle Scholar
  362. Bruce Schneier. Applied Cryptography . John Wiley & Sons, 1996.Google ScholarGoogle Scholar
  363. Leonard Schuchman. Dither signals and their effect on quantization noise. IEEE Trans. Comm. Tech. , 12:162-165, 1964.Google ScholarGoogle Scholar
  364. SDMI Portable Device Specification--Part 1, Version 1.0. Technical Report pdwg99070802, Secure Digital Music Initiative, 1999.Google ScholarGoogle Scholar
  365. C. E. Shannon. Communications theory of secrecy systems. Bell Systems Technical Journal , 28(4):656-715, October 1949.Google ScholarGoogle Scholar
  366. C. E. Shannon. Channels with side information at the transmitter. IBM Journal of Research and Development , pages 289-293, 1958. Google ScholarGoogle Scholar
  367. T. Sharp. An implementation of key-based digital signal steganography. In I. S. Moskowitz, editor, Information Hiding, 4th International Workshop, IHW 2001, Pittsburgh, PA, April 25-27, 2001 , volume 2137 of LNCS , pages 13-26. Springer-Verlag, New York, 2001. Google ScholarGoogle Scholar
  368. Y. Sheng and H. H. Arsenault. Experiments on pattern recognition using invariant Fourier-Mellin descriptors. J. Opt. Soc. Am. A , 3:771-776, 1986.Google ScholarGoogle Scholar
  369. Y. Sheng and J. Duvernoy. Circular-Fourier-Radial-Mellin transform descriptors for pattern recognition. J. Opt. Soc. Am. A , 3:885-888, 1986.Google ScholarGoogle Scholar
  370. Y. Q. Shi, C. Chen, and W. Chen. A Markov process based approach to effective attacking JPEG steganography. In N. Johnson and J. Camenisch, editors, Information Hiding, 8th International Workshop , volume 4437 of Lecture Notes in Computer Science . Springer-Verlag, New York, 2006. Google ScholarGoogle Scholar
  371. I. D. Shterev and R. L. Legendijk, Amplitude scale estimation for quantization-based water marking. IEEE Trans. on Signal Processing , 54(11):4146-4155, 2006.Google ScholarGoogle Scholar
  372. I. D. Shterev, R. L. Legendijk, and R. Hesdens, Statistical amplitude scale estmation for quantization-based watermarking. Proc. SPIE Security, Steganography and Watermarking of Multimedia Contents VI , volume 5306, 2004.Google ScholarGoogle Scholar
  373. M. Sidorov. Hidden markov models and steganalysis. In Proceedings ACM Multimedia and Security Workshop, Magdeburg, Germany, September 20-21, 2004 , pages 63-67, 2004. Google ScholarGoogle Scholar
  374. G. Simmons. A Survey of information authentication. Contemporary Cyptography, The Science of Information Integrity . IEEE Press, 1992.Google ScholarGoogle Scholar
  375. Gustavus J. Simmons. The prisoner's problem and the subliminal channel. In D. Chaum, editor, Advances in Cryptology--CRYPTO 83 , pages 51-67. Plenum Press, 1983. Google ScholarGoogle Scholar
  376. Gustavus J. Simmons. The history of subliminal channels. In Ross Anderson, editor, Information Hiding: First International Workshop , volume 1174 of Lecture Notes in Computer Science , pages 237-256. Springer, 1996. Google ScholarGoogle Scholar
  377. Eero P. Simoncelli. Statistical models for images: Compression, restoration and synthesis. Thirty-First Asilomar Conf. on Signals, Systems, and Computers , pages 673-678, 1997.Google ScholarGoogle Scholar
  378. J. Simpson and E. Weiner, editors. Oxford English Dictionary . Oxford University Press, 2000.Google ScholarGoogle Scholar
  379. W. D. Smith. Studies in Computational Geometry Motivated by Mesh Generation . Ph.D. thesis, Princeton University, 1988. Google ScholarGoogle Scholar
  380. V. Solachidis, N. Nikolaidis, and I. Pitas. Watermarking polygonal lines using fourier descriptors. IEEE Int. Conf. on Image Processing , 4:1955-1958, 2000. Google ScholarGoogle Scholar
  381. K. Solanki, K. Sullivan, U. Madhow, B. S. Manjunath, and S. Chandrasekaran. Provably secure steganography: Achieving zero K-L divergence using statistical restoration. In Proceedings ICIP, Atlanta, GA , October 2006.Google ScholarGoogle Scholar
  382. D. Soukal, J. Fridrich, and M. Goljan. Maximum likelihood estimation of secret message length embedded using PMK steganography in spatial domain. In Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, January 16-20, 2005 , volume 5681, pages 595-606, 2005.Google ScholarGoogle Scholar
  383. M. R. Spiegel. Schaum's Outline of Theory and Problems of Statistics, third edition . McGraw-Hill, New York, 1961.Google ScholarGoogle Scholar
  384. J. Stach and A. M. Alattar. A high-capacity invertible data-hiding algorithm using a generalized reversible integer transform. In E. Delp III, editor, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI , volume 5306, pages 386-396, January 2003.Google ScholarGoogle Scholar
  385. J. P. Stern, G. Hachez, F. Koeune, and J. J. Quisquater. Robust object watermarking: Application to code. In Proceedings of Info Hiding '99 , volume 1768, Lecture Notes in Computer Science , pages 368-378, 1999. Google ScholarGoogle Scholar
  386. G. W. W. Stevens. Microphotography and Photofabrication at Extreme Resolutions . Chapman & Hall, London, 1968.Google ScholarGoogle Scholar
  387. D. R. Stinson. Cryptography: Theory and Practice . CRC Press, 1995. Google ScholarGoogle Scholar
  388. T. G. Stockham. Image processing in the context of a visual model. Proc. IEEE , 60(7):828-841, 1972.Google ScholarGoogle Scholar
  389. H. S. Stone. Analysis of attacks on image watermarks with randomized coefficients. Technical Report TR 96-045, NEC Research Institute, 1996.Google ScholarGoogle Scholar
  390. H. S. Stone. Progressive wavelet correlation using Fourier methods. IEEE Transactions on Signal Processing , 47(1):97-107, Jan. 1999.Google ScholarGoogle Scholar
  391. D. Storck. A new approach to integrity of digital images. In IFIP Conf. on Mobile Communication , 1996.Google ScholarGoogle Scholar
  392. J. K. Su and B. Girod. On the imperceptibility and robustness of digital fingerprints. Proc. IEEE Int. Conf. Multimedia Computing and Systems , 2:530-535, 1999. Google ScholarGoogle Scholar
  393. J. K. Su and B. Girod. Power-spectrum condition for energy-efficient watermarking. In IEEE Int. Conf. on Image Processing , volume 1, pages 301-305, 1999.Google ScholarGoogle Scholar
  394. K. Sullivan, U. Madhow, B. S. Manjunath, and S. Chandrasekaran. Steganalysis for Markov cover data with applications to images. In IEEE Transactions on Information Security and Forensics , 1(2): 275-287, 2006.Google ScholarGoogle Scholar
  395. M. D. Swanson, B. Zhu, and A. H. Tewfik. Transparent robust image watermarking. In Proc. IEEE Int. Conf. on Image Processing , volume 3, pages 211-214, 1996.Google ScholarGoogle Scholar
  396. M. D. Swanson, B. Zhu, and A. H. Tewfik. Data hiding for video-in-video. In Proc. IEEE Int. Conf. on Image Processing , volume 2, pages 676-679, 1997.Google ScholarGoogle Scholar
  397. M. D. Swanson, B. Zhu, A. H. Tewfik, and L. Boney. Robust audio watermarking using perceptual masking. Signal Processing , 66(3):337-355, 1998. Google ScholarGoogle Scholar
  398. W. Szepanski. A signal theoretic method for creating forgery-proof documents for automatic verification. In J. S. Jackson, editor, 1979 Carnahan Conf. on Crime Countermeasures , pages 101-109, 1979.Google ScholarGoogle Scholar
  399. A. Tacticius. How to Survive Under Siege/Aineas the Tactician . Clarendon ancient history series, 1990.Google ScholarGoogle Scholar
  400. K. Tanaka, Y. Nakamura, and K. Matsui. In Military Communications Conference, 1990. MILCOM '90, Conference Record, A New Era. 1990 IEEE , volume 1, pages 216-220, 1990.Google ScholarGoogle Scholar
  401. G. Tardos, Optimal probabilistic fingerprint codes. Annual ACM Symposium on Theory of Computing STOC , pages 116-125, 2003. Google ScholarGoogle Scholar
  402. J. Taylor. DVD Demystified . McGraw-Hill, 1998. Google ScholarGoogle Scholar
  403. M. M. Taylor. Visual discrimination and orientation. J. Opt. Soc. Am. A , 53:763-765, 1963.Google ScholarGoogle Scholar
  404. A. Tefas and I. Pitas. Multi-bit image watermarking robust to geometric distortions. In IEEE Int. Conf. on Image Processing , volume 3, pages 710-713, 2000.Google ScholarGoogle Scholar
  405. Telecommunications Act of 1996, Implementation of Section 305.Google ScholarGoogle Scholar
  406. Telecommunications Act of 1996, United States Public Law 104-104.Google ScholarGoogle Scholar
  407. E. Terhardt. Calculating virtual pitch. Hearing Research , 1:155-182, 1979.Google ScholarGoogle Scholar
  408. J. Tian. Wavelet-based reversible date-embedding using a difference expansion. IEEE Transactions on Circuit Systems and Video Technology , 13(8):890-896, August 2003.Google ScholarGoogle Scholar
  409. A. Z. Tirkel, C. F. Osbourne, and T. E. Hall. Image and watermark registration. Signal Processing , 66(3):373-383, 1998. Google ScholarGoogle Scholar
  410. W. Trappe, M. Wu, Z. J. Wang and K. J. R. Liu. Anti-collusion fingerprinting for multimedia. IEEE Transactions Signal Processing , 51(4):1069-1087, 2003.Google ScholarGoogle Scholar
  411. William M. Tomberlin, Louis G. MacKenzie, and Paul K. Bennett. System for transmitting and receiving coded entertainment programs. United States Patent , 2,630,525, 1953.Google ScholarGoogle Scholar
  412. B. S. Tsybakov. Defect and error correction. Probl. Pered. Inform. , 11:21-30, July-September 1975. Translated from Russian.Google ScholarGoogle Scholar
  413. R. Tzschoppe, R. Buml, J. B. Huber, and A. Kaup. Steganographic system based on higher-order statistics. In E. Delp, et al., editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, 2003 , volume 5020, pages 156-166, 2003.Google ScholarGoogle Scholar
  414. S. Ullman and R. Basri. Recognition by linear combinations of models. IEEE Trans. Pattern Analysis and Machine Intelligence , 13(10):992-1006, 1991. Google ScholarGoogle Scholar
  415. G. Ungerboeck. Channel coding with multilevel/phase signals. IEEE Transactions on Information Theory , IT-28:55-67, 1982.Google ScholarGoogle Scholar
  416. United States Code, Title 17.Google ScholarGoogle Scholar
  417. Christian J. van den Branden Lambrecht and Joyce E. Farrell. Perceptual quality metric for digitally coded color images. Proc. EUSIPCO , pages 1175-1178, 1996.Google ScholarGoogle Scholar
  418. M. van der Veen, A. van Leest, and F. Bruekers. High capacity reversible watermarking for audio. In E. Delp, et al., editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V , volume 5020, pages 1-11, January 2003.Google ScholarGoogle Scholar
  419. M. van Dijik and F. Willems. Embedding information in grayscale images. In Proceedings of the 22nd Symposium on Information and Communication Theory in the Benelux, Enschede, The Netherlands, May 15-16, 2001 , pages 147-154, 2001.Google ScholarGoogle Scholar
  420. A. van Leest, M. van der Veen, and F. Bruekers. Reversible watermarking for images. In E. Delp, et al., editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI , volume 5306, pages 374-385, January 2003.Google ScholarGoogle Scholar
  421. R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne. A digital watermark. In Int. Conf. on Image Processing , volume 2, pages 86-90. IEEE, 1994.Google ScholarGoogle Scholar
  422. R. G. van Schyndel, A. Z. Tirkel, and I. D. Svalbe. Key independent watermark detection. In Proc. International Conference on Multimedia Computing and Systems , pages 580-585. IEEE, 1999. Google ScholarGoogle Scholar
  423. R. G. van Schyndel, A. Z. Tirkel, I. D. Svalbe, T. E. Hall, and C. F. Osborne. Algebraic construction of a new class of quasi-orthogonal arrays in steganography. In Proc. of SPIE on Security and Watermarking of Multimedia Contents , volume 3657, pages 354-364, 1999.Google ScholarGoogle Scholar
  424. V. N. Vapnik. The Nature of Statistical Learning Theory . Springer-Verlag, New York, 1995. Google ScholarGoogle Scholar
  425. Paul Viola and William M. Wells III. Alignment by maximization of mutual information. Int. J. Computer Vision , 24(2):137-154, 1997. Google ScholarGoogle Scholar
  426. B. Vasudev and V. Ratnakar, Fragile watermarks for detecting tampering in images. United States Patent , 6,064,764, 2000.Google ScholarGoogle Scholar
  427. A. J. Viterbi. CDMA: Principles of Spread Spectrum Communications . Addison Wesley Longman Inc., 1995. Google ScholarGoogle Scholar
  428. C. D. Vleeschouwer, J. F. Delaigle, and B. Macq. Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Transactions on Multimedia , 5(1):97-105, March 2003.Google ScholarGoogle Scholar
  429. S. Voloshynovskiy, A. Herrigel, N. Baumgaetner, and T. Pun. A stochastic approach to content adaptive digital image watermarking. In Third International Workshop on Information Hiding , 1999. Google ScholarGoogle Scholar
  430. L. von Ahn and N. Hopper. Public-key steganography. In Advances in Cryptology: Proceedings of EUROCRYPT, Interlaken, Switzerland, May 2-6 , volume 3027 of LNCS , pages 323-341. Springer-Verlag, Heidelberg, 2004.Google ScholarGoogle Scholar
  431. Martin J. Wainwright and Eero P. Simoncelli. Scale mixtures of Gaussians and the statistics of natural images. In S. A. Solla, T. K. Leen, and K. R. Müller, editors, Advances in Neural Information Processing Systems 12 , pages 855-861. MIT Press, 2000.Google ScholarGoogle Scholar
  432. C. Walker. Personal communication, June 2000.Google ScholarGoogle Scholar
  433. C. Wang, G. Doerr, and I. J. Cox. Trellis coded modulation to improve dirty paper trellis watermarking. In SPIE Proceedings on Security, Steganography and Watermarking of Multimedia Contents IX , 2007.Google ScholarGoogle Scholar
  434. S.-G. Wang and K. T. Knox. Embedding digital watermarks in halftone screens. In Proc. SPIE Conf. on Security and Watermarking of Multimedia Data , volume 3971, pages 218-227, 2000.Google ScholarGoogle Scholar
  435. X. Wang, S. Chen, and S. Jajodia. Tracking anonymous peer-to-peer VoIP calls on the Internet. In 12th ACM Conf. on Computer and Communications Security , pages 81-91, 2005. Google ScholarGoogle Scholar
  436. Y. Wang and P. Moulin. Steganalysis of block-structured stegotext. In Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Content VI, San Jose, CA, January 19-22, 2004 , volume 5306, pages 477-488, 2004.Google ScholarGoogle Scholar
  437. A. B. Watson, G. Y. Yang, J. A. Solomon, and J. Villasenor. Visual thresholds for wavelet quantization error. Human Vision and Electronic Imaging , SPIE-2657:381-392, 1996.Google ScholarGoogle Scholar
  438. Andrew B. Watson. DCT quantization matrices optimized for individual images. Human Vision, Visual Processing, and Digital Display IV , SPIE-1913:202-216, 1993.Google ScholarGoogle Scholar
  439. Andrew B. Watson, editor. Digital Images and Human Vision . MIT Press, 1993. Google ScholarGoogle Scholar
  440. P. Wayner. Mimic functions. CRYPTOLOGIA , 16(3):193-214, July 1992. Google ScholarGoogle Scholar
  441. P. Wayner. Disappearing Cryptology , second edition . Morgan Kaufmann, San Francisco, 2002.Google ScholarGoogle Scholar
  442. A. Westfeld. High capacity despite better steganalysis (F5--a steganographic algorithm). In I. S. Moskowitz, editor, Information Hiding, 4th International Workshop , volume 2137 of LNCS , pages 289-302. Springer-Verlag, New York, 2001. Google ScholarGoogle Scholar
  443. A. Westfeld. Detecting low embedding rates. In F. A. P. Petitcolas, editor, Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002 , volume 2578 of LNCS , pages 324-339. Springer-Verlag, Berlin, 2002. Google ScholarGoogle Scholar
  444. A. Westfeld and A. Pfitzmann. Attacks on steganographic systems. In A. Pfitzmann, editor, Information Hiding, 3rd International Workshop, IH'99, Dresden, Germany, September 29-October 1, 1999 , volume 1768 of LNCS , pages 61-75. Springer-Verlag, New York, 2000. Google ScholarGoogle Scholar
  445. B. Widrow. Statistical analysis of amplitude-quantized sample-data systems. Trans. AIEE (Applications and Industry) , 79:555-568, 1960 (Jan. 1961 section).Google ScholarGoogle Scholar
  446. E. H. Wilkins. A History of Italian Literature . Oxford University Press, London, 1954.Google ScholarGoogle Scholar
  447. Raymond B. Wolfgang and Edward J. Delp. A watermark for digital images. In Proceedings of the 1996 International Conference on Image Processing , volume 3, pages 219-222, 1996.Google ScholarGoogle Scholar
  448. Raymond B. Wolfgang, C. I. Podilchuk, and E. J. Delp. Perceptual watermarks for digital images and video. Proc. of the IEEE , 87(7):1108-1126, 1999.Google ScholarGoogle Scholar
  449. Ping Wah Wong. A public key watermark for image verification and authentication. In IEEE Int. Conf. on Image Processing , volume 1, 1998.Google ScholarGoogle Scholar
  450. Ping Wah Wong and Edward J. Delp, editors. Security and Watermarking of Multimedia Contents , volume 3657. Society of Photo-optical Instrumentation Engineers, 1999.Google ScholarGoogle Scholar
  451. Ping Wah Wong and Edward J. Delp, editors. Security and Watermarking of Multimedia Contents II , volume 3971. Society of Photo-optical Instrumentation Engineers, 2000. Google ScholarGoogle Scholar
  452. Chung-Ping Wu, Po-Chyi Su, and C.-C. Jay Kuo. Robust and efficient digital audio watermarking using audio content analysis. Security and Watermarking of Multimedia Contents , Proc. SPIE-3971:382-392, 2000.Google ScholarGoogle Scholar
  453. M. Wu, E. Tang, and B. Liu. Data hiding in digital binary images. IEEE International Conference on Multimedia & Expo (ICME) , 2000.Google ScholarGoogle Scholar
  454. Min Wu and Bede Liu. Watermarking for image authentication. In IEEE Int. Conf. on Image Processing , volume 2, pages 437-441, 1998.Google ScholarGoogle Scholar
  455. R. Wu and H. Stark. Rotation-invarint pattern recognition suing optimum feature extraction. Applied Optics , 24:179-184, 1985.Google ScholarGoogle Scholar
  456. A. D. Wyner and J. Ziff. The rate distortion function for source coding with side information at the decoder. IEEE Trans. Inform. Theory , 22:1-10, 1976.Google ScholarGoogle Scholar
  457. Changsheng Xu, Jiankang Wu, and Qibin Sun. Audio registration and its application to digital watermarking. Security and Watermarking of Multimedia Contents , Proc. SPIE-3971:393-401, 2000.Google ScholarGoogle Scholar
  458. G. Xuan, Y. Q. Shi, J. Gao, D. Zou, C. Yang, Z. Zhang, P. Chai, C. Chen, and W. Chen. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In Proceedings 7th Information Hiding Workshop, Barcelona, Spain, June 6-8, 2005 , 2005.Google ScholarGoogle Scholar
  459. G. Xuan, Q. Yao, C. Yang, J. Gao, P. Chai, Y. Q. Shi, and Z. Ni. Lossless data hiding using histogram shifting method based on integer wavelets. Proc. Int. Workshop on Digital Watermarking, volume 4283, pages 323-332, November 2006.Google ScholarGoogle Scholar
  460. W. S. E. Yang and W. Sun. On information embedding when watermarks and covertexts are correlated. In IEEE International Symposium on Information Theory , pages 346-350, 2006.Google ScholarGoogle Scholar
  461. Nakajima Yasumasa, Ichihara Shintaro, and Mogami Kazuto. Digital camera and image authentication system using the same. Japanese Patent , JP 11215452, 1999.Google ScholarGoogle Scholar
  462. B.-L. Yeo and M. M. Yeung. Watermarking 3D objects for verification. IEEE Computer Graphics and Applications , 19(1):36-45, 1999. Google ScholarGoogle Scholar
  463. M. Yeung and F. Mintzer. An invisible watermarking technique for image verification. In Proc. Int. Conf. Image Processing , volume 1, pages 680-683, 1997.Google ScholarGoogle Scholar
  464. Gwo-Jong Yu, Chun-Shien Lu, H. Y. M. Liao, and Jang-Ping Sheu. Mean quantization blind watermarking for image authentication. In IEEE Int. Conf. on Image Processing , volume 3, pages 706-709, 2000.Google ScholarGoogle Scholar
  465. X. Yu, Y. Wang, and T. Tan. On estimation of secret message length in J-steg-like steganography. In Proceedings, International Conference on Pattern Recognition, Cambridge, UK, August 23-26, 2004 , volume 4, pages 673-676, 2004. Google ScholarGoogle Scholar
  466. R. Zamir, S. Shamai, and U. Erez. Nested linear/lattice codes for structured multiterminal binning. IEEE Transactions on Information Theory , 48(6):1250-1276, 2002.Google ScholarGoogle Scholar
  467. Q. Zhang and N. Boston. Quantization index modulation using E8 lattice. In Proceedings of the Annual Allerton Conference on Communication Control and Computing , volume 41, pages 488-489, 2003.Google ScholarGoogle Scholar
  468. T. Zhang and X. Ping. A fast and effective steganalytic technique against jsteg-like algorithms. In Proceedings, Symposium on Applied Computing, Melbourne, FL , pages 307-311, 2003. Google ScholarGoogle Scholar
  469. T. Zhang and X. Ping. A new approach to reliable detection of LSB steganography in natural images. Signal Processing , 83(10):2085-2094, 2003. Google ScholarGoogle Scholar
  470. Bin Zhu and A. H. Tewfik. Media compression via data hiding. Thirty-First Asilomar Conf. on Signals, Systems, and Computers , pages 647-651, 1997.Google ScholarGoogle Scholar

Cited By

  1. Qi S, Zhang Y, Wang C, Xiang T, Cao X and Xiang Y (2024). Representing Noisy Image Without Denoising, IEEE Transactions on Pattern Analysis and Machine Intelligence, 46:10, (6713-6730), Online publication date: 1-Oct-2024.
  2. Abdulla A (2024). Digital image steganography: challenges, investigation, and recommendation for the future direction, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 28:15-16, (8963-8976), Online publication date: 1-Aug-2024.
  3. ACM
    Kong W, Zhou L, Chen Y, Dong Z and Wu H Reducing Embedding Distortion for Palette Steganography by Dynamic Programming Proceedings of the 2024 12th International Conference on Communications and Broadband Networking, (115-122)
  4. Luo Y, Zhou T, Cui S, Ye Y, Liu F and Cai Z (2024). Fixing the Double Agent Vulnerability of Deep Watermarking: A Patch-Level Solution Against Artwork Plagiarism, IEEE Transactions on Circuits and Systems for Video Technology, 34:3, (1670-1683), Online publication date: 1-Mar-2024.
  5. Zhang X, Chen K, Ding J, Yang Y, Zhang W and Yu N (2024). Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography, IEEE Transactions on Information Forensics and Security, 19, (3148-3163), Online publication date: 1-Jan-2024.
  6. Xue Y, Wu J, Ji R, Zhong P, Wen J and Peng W (2024). Adaptive Domain-Invariant Feature Extraction for Cross-Domain Linguistic Steganalysis, IEEE Transactions on Information Forensics and Security, 19, (920-933), Online publication date: 1-Jan-2024.
  7. Yu J, Zhang X, Xu Y and Zhang J CRoSS Proceedings of the 37th International Conference on Neural Information Processing Systems, (80730-80743)
  8. Wen Y, Kirchenbauer J, Geiping J and Goldstein T Tree-rings watermarks Proceedings of the 37th International Conference on Neural Information Processing Systems, (58047-58063)
  9. Chen S, Malik A, Zhang X, Feng G and Wu H (2023). A Fast Method for Robust Video Watermarking Based on Zernike Moments, IEEE Transactions on Circuits and Systems for Video Technology, 33:12, (7342-7353), Online publication date: 1-Dec-2023.
  10. ACM
    van Rensburg B, Puteaux P, Puech W and Pedeboy J (2023). 3D Object Watermarking from Data Hiding in the Homomorphic Encrypted Domain, ACM Transactions on Multimedia Computing, Communications, and Applications, 19:5s, (1-20), Online publication date: 31-Oct-2023.
  11. Ge S, Xia Z, Fei J, Tong Y, Weng J and Li M (2023). A robust document image watermarking scheme using deep neural network, Multimedia Tools and Applications, 82:25, (38589-38612), Online publication date: 1-Oct-2023.
  12. Qi S, Zhang Y, Wang C, Zhou J and Cao X (2023). A Principled Design of Image Representation: Towards Forensic Tasks, IEEE Transactions on Pattern Analysis and Machine Intelligence, 45:5, (5337-5354), Online publication date: 1-May-2023.
  13. ACM
    Xiao M, Li X, Zhao Y, Ma B and Guo G (2022). A Novel Reversible Data Hiding Scheme Based on Pixel-Residual Histogram, ACM Transactions on Multimedia Computing, Communications, and Applications, 19:1s, (1-19), Online publication date: 28-Feb-2023.
  14. Zhou H, Zhang W, Chen K, Li W and Yu N (2022). Three-Dimensional Mesh Steganography and Steganalysis: A Review, IEEE Transactions on Visualization and Computer Graphics, 28:12, (5006-5025), Online publication date: 1-Dec-2022.
  15. Chen H, Song L, Qian Z, Zhang X and Ma K Hiding images in deep probabilistic models Proceedings of the 36th International Conference on Neural Information Processing Systems, (36776-36788)
  16. Tang L, Xie J and Wu D (2022). An interval type-2 fuzzy edge detection and matrix coding approach for color image adaptive steganography, Multimedia Tools and Applications, 81:27, (39145-39167), Online publication date: 1-Nov-2022.
  17. Maiti C and Dhara B (2022). A blind audio watermarking based on singular value decomposition and quantization, International Journal of Speech Technology, 25:3, (759-771), Online publication date: 1-Sep-2022.
  18. Sinhal R and Ansari I (2022). Multipurpose Image Watermarking: Ownership Check, Tamper Detection and Self-recovery, Circuits, Systems, and Signal Processing, 41:6, (3199-3221), Online publication date: 1-Jun-2022.
  19. Abdelwahab K, El-atty S, Brisha A and Abd El-Samie F (2022). Efficient cancelable speaker identification system based on a hybrid structure of DWT and SVD, International Journal of Speech Technology, 25:1, (279-288), Online publication date: 1-Mar-2022.
  20. Li C, Zhang P and Wang C (2022). Harmonious Textual Layout Generation Over Natural Images via Deep Aesthetics Learning, IEEE Transactions on Multimedia, 24, (3416-3428), Online publication date: 1-Jan-2022.
  21. Kuznetsov A and Kononchenko A Message Concealing in Vector Images 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), (465-470)
  22. Li S, Xue M, Zhao B, Zhu H and Zhang X (2021). Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization, IEEE Transactions on Dependable and Secure Computing, 18:5, (2088-2105), Online publication date: 1-Sep-2021.
  23. Tang L, Wu D, Wang H, Chen M and Xie J (2021). An adaptive fuzzy inference approach for color image steganography, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 25:16, (10987-11004), Online publication date: 1-Aug-2021.
  24. Liu G, Wu H and Zhang X Covert Communication via Modulating Soft Label of Neural Network Artificial Intelligence and Security, (349-359)
  25. ACM
    Tran V, Jayatilaka G, Ashok A and Misra A DeepLight Proceedings of the 20th International Conference on Information Processing in Sensor Networks (co-located with CPS-IoT Week 2021), (238-253)
  26. Begum M and Uddin M (2021). Implementation of Secured and Robust DFT-Based Image Watermark Through Hybridization with Decomposition Algorithm, SN Computer Science, 2:3, Online publication date: 1-May-2021.
  27. Mosleh M, Setayeshi S, Barekatain B and Mosleh M (2021). A novel audio watermarking scheme based on fuzzy inference system in DCT domain, Multimedia Tools and Applications, 80:13, (20423-20447), Online publication date: 1-May-2021.
  28. Geetha R and Geetha S (2021). A multi-layered “plus-minus one” reversible data embedding scheme, Multimedia Tools and Applications, 80:9, (14123-14136), Online publication date: 1-Apr-2021.
  29. Mastorakis S, Zhong X, Huang P and Tourani R DLWIoT: Deep Learning-based Watermarking for Authorized IoT Onboarding 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), (1-7)
  30. Hu R and Xiang S (2020). Cover-Lossless Robust Image Watermarking Against Geometric Deformations, IEEE Transactions on Image Processing, 30, (318-331), Online publication date: 1-Jan-2021.
  31. Khare P and Srivastava V (2021). A reliable and secure image watermarking algorithm using homomorphic transform in DWT domain, Multidimensional Systems and Signal Processing, 32:1, (131-160), Online publication date: 1-Jan-2021.
  32. Su A, He X and Zhao X (2020). JPEG steganalysis based on ResNeXt with Gauss partial derivative filters, Multimedia Tools and Applications, 80:3, (3349-3366), Online publication date: 1-Jan-2021.
  33. Zhang C, Benz P, Karjauv A, Sun G and Kweon I UDH Proceedings of the 34th International Conference on Neural Information Processing Systems, (10223-10234)
  34. Gruber S, Neumayr B, Fabianek C, Gringinger E, Schuetz C and Schrefl M Towards Informed Watermarking of Personal Health Sensor Data for Data Leakage Detection Digital Forensics and Watermarking, (109-124)
  35. Meenakshi K, Swaraja K and Kora P (2020). A hybrid matrix factorization technique to free the watermarking scheme from false positive and negative problems, Multimedia Tools and Applications, 79:39-40, (29865-29900), Online publication date: 1-Oct-2020.
  36. Wang H, Ho A and Li S OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework Computer Security, (243-260)
  37. ACM
    Tundis A, Mukherjee G and Mühlhäuser M Mixed-code text analysis for the detection of online hidden propaganda Proceedings of the 15th International Conference on Availability, Reliability and Security, (1-7)
  38. Yin Z, Ji Y and Luo B (2020). Reversible Data Hiding in JPEG Images With Multi-Objective Optimization, IEEE Transactions on Circuits and Systems for Video Technology, 30:8, (2343-2352), Online publication date: 1-Aug-2020.
  39. Qi W, Li X, Zhang T and Guo Z (2020). Optimal Reversible Data Hiding Scheme Based on Multiple Histograms Modification, IEEE Transactions on Circuits and Systems for Video Technology, 30:8, (2300-2312), Online publication date: 1-Aug-2020.
  40. Roy A and Chakraborty R (2020). Toward Optimal Prediction Error Expansion-Based Reversible Image Watermarking, IEEE Transactions on Circuits and Systems for Video Technology, 30:8, (2377-2390), Online publication date: 1-Aug-2020.
  41. Hurrah N, Parah S and Sheikh J (2020). Embedding in medical images: an efficient scheme for authentication and tamper localization, Multimedia Tools and Applications, 79:29-30, (21441-21470), Online publication date: 1-Aug-2020.
  42. Gaj S, Sur A and Bora P (2020). Prediction mode based H.265/HEVC video watermarking resisting re-compression attack, Multimedia Tools and Applications, 79:25-26, (18089-18119), Online publication date: 1-Jul-2020.
  43. Gourrame K, Douzi H, Harba R, Rabia R, Ros F and ElHajji M Image Watermarking Based on Fourier-Mellin Transform Image and Signal Processing, (348-356)
  44. Geetha R and Geetha S (2020). Embedding electronic patient information in clinical images: an improved and efficient reversible data hiding technique, Multimedia Tools and Applications, 79:19-20, (12869-12890), Online publication date: 1-May-2020.
  45. Feng B, Li X, Jie Y, Guo C and Fu H (2019). A Novel Semi-fragile Digital Watermarking Scheme for Scrambled Image Authentication and Restoration, Mobile Networks and Applications, 25:1, (82-94), Online publication date: 1-Feb-2020.
  46. Ferreira F and Lima J (2019). A robust 3D point cloud watermarking method based on the graph Fourier transform, Multimedia Tools and Applications, 79:3-4, (1921-1950), Online publication date: 1-Jan-2020.
  47. Hatoum M, Darazi R and Couchot J (2019). Normalized blind STDM watermarking scheme for images and PDF documents robust against fixed gain attack, Multimedia Tools and Applications, 79:3-4, (1887-1919), Online publication date: 1-Jan-2020.
  48. Jafari Barani M, Ayubi P, Yousefi Valandar M and Yosefnezhad Irani B (2019). A blind video watermarking algorithm robust to lossy video compression attacks based on generalized Newton complex map and contourlet transform, Multimedia Tools and Applications, 79:3-4, (2127-2159), Online publication date: 1-Jan-2020.
  49. Yang R, Au M, Lai J, Xu Q and Yu Z Collusion Resistant Watermarking Schemes for Cryptographic Functionalities Advances in Cryptology – ASIACRYPT 2019, (371-398)
  50. Bertini F, Rizzo S and Montesi D (2019). Can Information Hiding in Social Media Posts Represent a Threat?, Computer, 52:10, (52-60), Online publication date: 1-Oct-2019.
  51. Deljavan Amiri M, Amiri A and Meghdadi M (2019). HVS-based scalable video watermarking, Multimedia Systems, 25:4, (273-291), Online publication date: 1-Aug-2019.
  52. Belferdi W, Behloul A and Noui L (2019). A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration, Multidimensional Systems and Signal Processing, 30:3, (1093-1112), Online publication date: 1-Jul-2019.
  53. Fakhredanesh M, Rahmati M and Safabakhsh R (2019). Steganography in discrete wavelet transform based on human visual system and cover model, Multimedia Tools and Applications, 78:13, (18475-18502), Online publication date: 1-Jul-2019.
  54. Abdulla A, Sellahewa H and Jassim S (2019). Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images, Multimedia Tools and Applications, 78:13, (17799-17823), Online publication date: 1-Jul-2019.
  55. Chen C, Lu W and Chou C (2019). Rotational copy-move forgery detection using SIFT and region growing strategies, Multimedia Tools and Applications, 78:13, (18293-18308), Online publication date: 1-Jul-2019.
  56. Dhargupta S, Chakraborty A, Ghosal S, Saha S and Sarkar R (2019). Fuzzy edge detection based steganography using modified Gaussian distribution, Multimedia Tools and Applications, 78:13, (17589-17606), Online publication date: 1-Jul-2019.
  57. ACM
    Burimas R, Kumpuak T, Intarauksorn M, Galajit K, Aimmanee P and Karnjana J Framework for Hiding Information in Audio Sub-signals by Using Singular Spectrum Analysis with Psychoacoustic Model Proceedings of the 3rd International Conference on Graphics and Signal Processing, (67-74)
  58. Tang Z, Xu S, Ye D, Wang J, Zhang X and Yu C (2019). Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image, Journal of Real-Time Image Processing, 16:3, (709-724), Online publication date: 1-Jun-2019.
  59. Kim W, Nam S, Kang J and Lee H (2019). Robust watermarking in curvelet domain for preserving cleanness of high-quality images, Multimedia Tools and Applications, 78:12, (16887-16906), Online publication date: 1-Jun-2019.
  60. Rhayma H, Makhloufi A, Hamam H and Hamida A (2019). Semi-fragile self-recovery watermarking scheme based on data representation through combination, Multimedia Tools and Applications, 78:10, (14067-14089), Online publication date: 1-May-2019.
  61. Wahed M and Nyeem H (2019). Reversible data hiding with interpolation and adaptive embedding, Multimedia Tools and Applications, 78:8, (10795-10819), Online publication date: 1-Apr-2019.
  62. ACM
    Sabbane F, Aherrahrou N and Tairi H A new region based watermarking scheme for medical images Proceedings of the New Challenges in Data Sciences: Acts of the Second Conference of the Moroccan Classification Society, (1-6)
  63. Allili M, Casemajor N and Talbi A (2019). Multiple image copy detection and evolution visualisation using tree graphs, Multimedia Tools and Applications, 78:5, (6253-6275), Online publication date: 1-Mar-2019.
  64. Singh D and Singh S (2019). Block Truncation Coding based effective watermarking scheme for image authentication with recovery capability, Multimedia Tools and Applications, 78:4, (4197-4215), Online publication date: 1-Feb-2019.
  65. Molaei A and Ebrahimzadeh A (2019). Optimal steganography with blind detection based on Bayesian optimization algorithm, Pattern Analysis & Applications, 22:1, (205-219), Online publication date: 1-Feb-2019.
  66. (2019). A cryptographic data hiding algorithm with high cover text capacity, International Journal of Electronic Security and Digital Forensics, 11:2, (225-244), Online publication date: 1-Jan-2019.
  67. Li L, Chang C, Chen H and Jung K (2019). An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy, Security and Communication Networks, 2019, Online publication date: 1-Jan-2019.
  68. Al-Otum H (2019). Wavelet packets-based watermarking with preserved high color image quality and enhanced robustness for copyright protection applications, Multimedia Tools and Applications, 78:2, (2199-2225), Online publication date: 1-Jan-2019.
  69. Gourrame K, Douzi H, Harba R, Riad R, Ros F, Amar M and Elhajji M (2019). A zero-bit Fourier image watermarking for print-cam process, Multimedia Tools and Applications, 78:2, (2621-2638), Online publication date: 1-Jan-2019.
  70. Hsiao C, Tsai M and Yang C (2018). Simple and robust watermarking scheme based on square-root-modulus technique, Multimedia Tools and Applications, 77:23, (30419-30435), Online publication date: 1-Dec-2018.
  71. Bideh P, Mahdavi M, Borujeni S and Arasteh S (2018). Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications, Multimedia Tools and Applications, 77:24, (31713-31735), Online publication date: 1-Dec-2018.
  72. Guo J and Potkonjak M Watermarking Deep Neural Networks for Embedded Systems 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), (1-8)
  73. Muhammad N, Bibi N, Qasim I, Jahangir A and Mahmood Z (2018). Digital watermarking using Hall property image decomposition method, Pattern Analysis & Applications, 21:4, (997-1012), Online publication date: 1-Nov-2018.
  74. Lipuš B and ?Alik B (2018). Robust watermarking of airborne LiDAR data, Multimedia Tools and Applications, 77:21, (29077-29097), Online publication date: 1-Nov-2018.
  75. Abdelhakim A, Saad M, Sayed M and Saleh H (2018). Optimized SVD-based robust watermarking in the fractional Fourier domain, Multimedia Tools and Applications, 77:21, (27895-27917), Online publication date: 1-Nov-2018.
  76. Chen C, Zhou B and Mow W (2018). RA Code: A Robust and Aesthetic Code for Resolution-Constrained Applications, IEEE Transactions on Circuits and Systems for Video Technology, 28:11, (3300-3312), Online publication date: 1-Nov-2018.
  77. ACM
    Yu H, Lim J, Kim K and Lee S Pinto Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (1089-1101)
  78. Hamidi M, Haziti M, Cherifi H and Hassouni M (2018). Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform, Multimedia Tools and Applications, 77:20, (27181-27214), Online publication date: 1-Oct-2018.
  79. Hu H and Chang J (2018). Dual image watermarking by exploiting the properties of selected DCT coefficients with JND modeling, Multimedia Tools and Applications, 77:20, (26965-26990), Online publication date: 1-Oct-2018.
  80. Hosny K and Darwish M (2018). Robust color image watermarking using invariant quaternion Legendre-Fourier moments, Multimedia Tools and Applications, 77:19, (24727-24750), Online publication date: 1-Oct-2018.
  81. Frattolillo F (2018). Watermarking protocols, International Journal of Information Security, 17:5, (587-601), Online publication date: 1-Oct-2018.
  82. Yang R, Au M, Lai J, Xu Q and Yu Z Unforgeable Watermarking Schemes with Public Extraction Security and Cryptography for Networks, (63-80)
  83. Zebbiche K, Khelifi F and Loukhaoukha K (2018). Robust additive watermarking in the DTCWT domain based on perceptual masking, Multimedia Tools and Applications, 77:16, (21281-21304), Online publication date: 1-Aug-2018.
  84. Douglas M, Bailey K, Leeney M and Curran K (2018). An overview of steganography techniques applied to the protection of biometric data, Multimedia Tools and Applications, 77:13, (17333-17373), Online publication date: 1-Jul-2018.
  85. Abdelhakim A and Abdelhakim M (2018). A time-efficient optimization for robust image watermarking using machine learning, Expert Systems with Applications: An International Journal, 100:C, (197-210), Online publication date: 15-Jun-2018.
  86. Kumar R, Chand S and Singh S (2018). An Improved Histogram-Shifting-Imitated reversible data hiding based on HVS characteristics, Multimedia Tools and Applications, 77:11, (13445-13457), Online publication date: 1-Jun-2018.
  87. ACM
    Zhang J, Gu Z, Jang J, Wu H, Stoecklin M, Huang H and Molloy I Protecting Intellectual Property of Deep Neural Networks with Watermarking Proceedings of the 2018 on Asia Conference on Computer and Communications Security, (159-172)
  88. Tsai M and Yuadi I (2018). Digital forensics of microscopic images for printed source identification, Multimedia Tools and Applications, 77:7, (8729-8758), Online publication date: 1-Apr-2018.
  89. Himeur Y and Boukabou A (2018). A robust and secure key-frames based video watermarking system using chaotic encryption, Multimedia Tools and Applications, 77:7, (8603-8627), Online publication date: 1-Apr-2018.
  90. Borjian N, Kabir E, Seyedin S and Masehian E (2018). A query-by-example music retrieval system using feature and decision fusion, Multimedia Tools and Applications, 77:5, (6165-6189), Online publication date: 1-Mar-2018.
  91. Kumar C, Singh A and Kumar P (2018). A recent survey on image watermarking techniques and its application in e-governance, Multimedia Tools and Applications, 77:3, (3597-3622), Online publication date: 1-Feb-2018.
  92. Etemad E, Samavi S, Reza Soroushmehr S, Karimi N, Etemad M, Shirani S and Najarian K (2018). Robust image watermarking scheme using bit-plane of hadamard coefficients, Multimedia Tools and Applications, 77:2, (2033-2055), Online publication date: 1-Jan-2018.
  93. ACM
    Abura'ed N, Khan F and Bhaskar H (2017). Advances in the Quantum Theoretical Approach to Image Processing Applications, ACM Computing Surveys, 49:4, (1-49), Online publication date: 31-Dec-2018.
  94. Chen C, Wang H and Lin C (2017). An efficiency enhanced cluster expanding block algorithm for copy-move forgery detection, Multimedia Tools and Applications, 76:24, (26503-26522), Online publication date: 1-Dec-2017.
  95. Dey N, Parah S, Sheikh J and Bhat G (2017). Realization of a New Robust and Secure Watermarking Technique Using DC Coefficient Modification in Pixel Domain and Chaotic Encryption, Journal of Global Information Management, 25:4, (80-102), Online publication date: 1-Oct-2017.
  96. Głowacz A and Pietroń M (2017). Implementation of Digital Watermarking Algorithms in Parallel Hardware Accelerators, International Journal of Parallel Programming, 45:5, (1108-1127), Online publication date: 1-Oct-2017.
  97. ACM
    Mairgiotis A, Koliopanos C and Kondi L Rao based watermark detector through two-level hierarchical prior in transform domain Proceedings of the 21st Pan-Hellenic Conference on Informatics, (1-6)
  98. Chang C and Shen J (2017). Features Classification Forest: A Novel Development that is Adaptable to Robust Blind Watermarking Techniques, IEEE Transactions on Image Processing, 26:8, (3921-3935), Online publication date: 1-Aug-2017.
  99. Soltani Panah A, van Schyndel R and Sellis T (2017). Towards an asynchronous aggregation-capable watermark for end-to-end protection of big data streams, Future Generation Computer Systems, 72:C, (288-304), Online publication date: 1-Jul-2017.
  100. ACM
    Pérez Gort M, Feregrino Uribe C and Nummenmaa J A Minimum Distortion Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, (111-121)
  101. ACM
    Uchida Y, Nagai Y, Sakazawa S and Satoh S Embedding Watermarks into Deep Neural Networks Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval, (269-277)
  102. Nadeau A and Sharma G (2017). An Audio Watermark Designed for Efficient and Robust Resynchronization After Analog Playback, IEEE Transactions on Information Forensics and Security, 12:6, (1393-1405), Online publication date: 1-Jun-2017.
  103. Roy D and Sengupta A (2017). Low overhead symmetrical protection of reusable IP core using robust fingerprinting and watermarking during high level synthesis, Future Generation Computer Systems, 71:C, (89-101), Online publication date: 1-Jun-2017.
  104. Malik A, Sikka G and Verma H (2017). A high payload data hiding scheme based on modified AMBTC technique, Multimedia Tools and Applications, 76:12, (14151-14167), Online publication date: 1-Jun-2017.
  105. Xue B, Li X, Wang J and Guo Z (2017). Improved reversible data hiding based on two-dimensional difference-histogram modification, Multimedia Tools and Applications, 76:11, (13473-13491), Online publication date: 1-Jun-2017.
  106. Sathish Shet K, Aswath A, Hanumantharaju M and Gao X (2017). Design and development of new reconfigurable architectures for LSB/multi-bit image steganography system, Multimedia Tools and Applications, 76:11, (13197-13219), Online publication date: 1-Jun-2017.
  107. Malik A, Sikka G and Verma H (2017). An image interpolation based reversible data hiding scheme using pixel value adjusting feature, Multimedia Tools and Applications, 76:11, (13025-13046), Online publication date: 1-Jun-2017.
  108. Chen W, Wu K and Wang C (2017). A novel message embedding algorithm using the optimal weighted modulus, Information Sciences: an International Journal, 388:C, (17-36), Online publication date: 1-May-2017.
  109. Makarov A and Shabunin A On Design of Secure E-Services for Public Authority in the Russian Federation Proceedings of the 20th Conference of Open Innovations Association FRUCT, (260-267)
  110. ACM
    Ouazzane H, Mahersia H and Hamrouni K How to extend the use of the discrete orthogonal stockwell transform to image watermarking Proceedings of the Symposium on Applied Computing, (101-107)
  111. Piotrowski Z and Lenarczyk P (2017). Blind image counterwatermarking --- hidden data filter, Multimedia Tools and Applications, 76:7, (10119-10131), Online publication date: 1-Apr-2017.
  112. Kandi H, Mishra D and Gorthi S (2017). Exploring the learning capabilities of convolutional neural networks for robust image watermarking, Computers and Security, 65:C, (247-268), Online publication date: 1-Mar-2017.
  113. Nouri R and Mansouri A (2017). Digital image steganalysis based on the reciprocal singular value curve, Multimedia Tools and Applications, 76:6, (8745-8756), Online publication date: 1-Mar-2017.
  114. Munib S and Khan A (2017). Robust image watermarking technique using triangular regions and Zernike moments for quantization based embedding, Multimedia Tools and Applications, 76:6, (8695-8710), Online publication date: 1-Mar-2017.
  115. Singh P and Agarwal S (2017). A self recoverable dual watermarking scheme for copyright protection and integrity verification, Multimedia Tools and Applications, 76:5, (6389-6428), Online publication date: 1-Mar-2017.
  116. Saleem A, Beghdadi A and Boashash B (2017). A distortion-free contrast enhancement technique based on a perceptual fusion scheme, Neurocomputing, 226:C, (161-167), Online publication date: 22-Feb-2017.
  117. Soleymani S and Taherinia A (2017). Double expanding robust image watermarking based on Spread Spectrum technique and BCH coding, Multimedia Tools and Applications, 76:3, (3485-3503), Online publication date: 1-Feb-2017.
  118. ACM
    Dutta T and Gupta H (2017). An Efficient Framework for Compressed Domain Watermarking in P Frames of High-Efficiency Video Coding (HEVC)--Encoded Video, ACM Transactions on Multimedia Computing, Communications, and Applications, 13:1, (1-24), Online publication date: 17-Jan-2017.
  119. Zhang G, Kou L, Zhang L, Liu C, Da Q, Sun J and Lu R (2017). A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT, Security and Communication Networks, 2017, Online publication date: 1-Jan-2017.
  120. Su P, Kuo T and Li M (2017). A practical design of digital watermarking for video streaming services, Journal of Visual Communication and Image Representation, 42:C, (161-172), Online publication date: 1-Jan-2017.
  121. Yang C (2017). Robust high-capacity watermarking scheme based on Euclidean norms and quick coefficient alignment, Multimedia Tools and Applications, 76:1, (1455-1477), Online publication date: 1-Jan-2017.
  122. Bitar A, Darazi R, Couchot J and Couturier R (2017). Blind digital watermarking in PDF documents using Spread Transform Dither Modulation, Multimedia Tools and Applications, 76:1, (143-161), Online publication date: 1-Jan-2017.
  123. Singh D and Singh S (2017). DCT based efficient fragile watermarking scheme for image authentication and restoration, Multimedia Tools and Applications, 76:1, (953-977), Online publication date: 1-Jan-2017.
  124. Kumar M and Agrawal S (2016). Reversible data hiding based on prediction error expansion using adjacent pixels, Security and Communication Networks, 9:16, (3703-3712), Online publication date: 10-Nov-2016.
  125. Yan B, Liu X and Yang H (2016). Structure compliant local warping of images with applications to watermarking attack, Multimedia Tools and Applications, 75:21, (13451-13479), Online publication date: 1-Nov-2016.
  126. Kieu T and Rudder A (2016). A reversible steganographic scheme for VQ indices based on joint neighboring and predictive coding, Multimedia Tools and Applications, 75:21, (13705-13731), Online publication date: 1-Nov-2016.
  127. ACM
    Luo C, Fylakis A, Partala J, Klakegg S, Goncalves J, Liang K, Seppänen T and Kostakos V A data hiding approach for sensitive smartphone data Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, (557-568)
  128. Chen W, Liao Y, Lin Y and Wang C (2016). A novel general multiple-base data embedding algorithm, Information Sciences: an International Journal, 358:C, (164-190), Online publication date: 1-Sep-2016.
  129. Neuner S, Voyiatzis A, Schmiedecker M, Brunthaler S, Katzenbeisser S and Weippl E (2016). Time is on my side, Digital Investigation: The International Journal of Digital Forensics & Incident Response, 18:S, (S76-S86), Online publication date: 7-Aug-2016.
  130. Ou B, Li X and Wang J (2016). High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion, Journal of Visual Communication and Image Representation, 39:C, (12-23), Online publication date: 1-Aug-2016.
  131. Singh D and Singh S (2016). Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability, Journal of Visual Communication and Image Representation, 38:C, (775-789), Online publication date: 1-Jul-2016.
  132. Wójtowicz W and Ogiela M (2016). Digital images authentication scheme based on bimodal biometric watermarking in an independent domain, Journal of Visual Communication and Image Representation, 38:C, (1-10), Online publication date: 1-Jul-2016.
  133. Agilandeeswari L and Ganesan K (2016). A robust color video watermarking scheme based on hybrid embedding techniques, Multimedia Tools and Applications, 75:14, (8745-8780), Online publication date: 1-Jul-2016.
  134. Lima J and Da Silva Neto E (2016). Audio encryption based on the cosine number transform, Multimedia Tools and Applications, 75:14, (8403-8418), Online publication date: 1-Jul-2016.
  135. Tsai Y (2016). An efficient 3D information hiding algorithm based on sampling concepts, Multimedia Tools and Applications, 75:13, (7891-7907), Online publication date: 1-Jul-2016.
  136. Agarwal H, Sen D, Raman B and Kankanhalli M (2016). Visible watermarking based on importance and just noticeable distortion of image regions, Multimedia Tools and Applications, 75:13, (7605-7629), Online publication date: 1-Jul-2016.
  137. ACM
    Hou J, Kim D, Song H and Lee H Secure Image Display through Visual Cryptography Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, (169-174)
  138. Tsai Y (2016). A Distortion-Free Data Hiding Scheme for Triangular Meshes Based on Recursive Subdivision, Advances in Multimedia, 2016, (1), Online publication date: 1-Jun-2016.
  139. Doğan Ş (2016). A new data hiding method based on chaos embedded genetic algorithm for color image, Artificial Intelligence Review, 46:1, (129-143), Online publication date: 1-Jun-2016.
  140. ACM
    Kasana S and Garg P Interpolation based Reversible Data Hiding Scheme for Digital Images Proceedings of the 21st Western Canadian Conference on Computing Education, (1-6)
  141. Voloshina N, Bezzateev S, Prudanov A, Vasilev M and Gorbunov A Effectiveness of LSB and MLSB information embedding for BMP images Proceedings of the 18th Conference of Open Innovations Association FRUCT, (378-384)
  142. Makarov A and Yakovleva E Comparative analysis of halftoning algorithms for digital watermarking Proceedings of the 18th Conference of Open Innovations Association FRUCT, (193-199)
  143. Davarzani R, Mozaffari S and Yaghmaie K (2016). Perceptual image hashing using center-symmetric local binary patterns, Multimedia Tools and Applications, 75:8, (4639-4667), Online publication date: 1-Apr-2016.
  144. Khandare S and Shrawankar U (2016). Image Bit Depth Plane Digital Watermarking for Secured Classified Image Data Transmission, Procedia Computer Science, 78:C, (698-705), Online publication date: 1-Mar-2016.
  145. Zolotavkin Y and Juhola M (2016). A new Scalar Quantization method for Digital Image Watermarking, Journal of Electrical and Computer Engineering, 2016, (1-1), Online publication date: 1-Jan-2016.
  146. Roy A, Chakraborty R and Naskar R Reversible Color Image Watermarking in the YCoCg-R Color Space Proceedings of the 11th International Conference on Information Systems Security - Volume 9478, (480-498)
  147. ACM
    Hao L, Feng J and Zhou B Gradient domain binary image hiding using color difference metric SIGGRAPH Asia 2015 Technical Briefs, (1-4)
  148. Conotter V, Comesana P and Perez-Gonzalez F (2015). Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images, IEEE Transactions on Information Forensics and Security, 10:11, (2257-2269), Online publication date: 1-Nov-2015.
  149. Feng B, Lu W and Sun W (2015). Novel steganographic method based on generalized K-distance N-dimensional pixel matching, Multimedia Tools and Applications, 74:21, (9623-9646), Online publication date: 1-Nov-2015.
  150. ACM
    Dharwadkar N, Parane K and Poojara S A Novel Scheme of Data Hiding for Color Images in Spatial Domain with High Capacity of Embedding Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, (403-407)
  151. ACM
    Srivastava A Performance Comparison of Various Particle Swarm Optimizers in DWT-SVD watermarking for RGB Images Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, (244-250)
  152. Fujiyoshi M and Kiya H Histogram-Based Near-Lossless Data Hiding and Its Application to Image Compression Proceedings, Part II, of the 16th Pacific-Rim Conference on Advances in Multimedia Information Processing -- PCM 2015 - Volume 9315, (225-235)
  153. ACM
    Hajj-Ahmad A, Baudry S, Chupeau B and Doërr G Flicker Forensics for Pirate Device Identification Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, (75-84)
  154. ACM
    Hou J, Kim D, Choi S and Lee H 3D Print-Scan Resilient Watermarking Using a Histogram-Based Circular Shift Coding Structure Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, (115-121)
  155. Huang Y and Tsai Y (2015). A Reversible Data Hiding Scheme for 3D Polygonal Models Based on Histogram Shifting with High Embedding Capacity, 3D Research, 6:2, (1-12), Online publication date: 1-Jun-2015.
  156. Liu S, Hennelly B, Guo C and Sheridan J (2015). Robustness of Double Random Phase Encoding spread-space spread-spectrum watermarking technique, Signal Processing, 109:C, (345-361), Online publication date: 1-Apr-2015.
  157. Kieu T and Ramroach S (2015). A reversible steganographic scheme for VQ indices based on joint neighboring coding, Expert Systems with Applications: An International Journal, 42:2, (713-722), Online publication date: 1-Feb-2015.
  158. Hernaez I, Saratxaga I, Ye J, Sanchez J, Erro D and Navas E Speech Watermarking Based on Coding of the Harmonic Phase Proceedings of the Second International Conference on Advances in Speech and Language Technologies for Iberian Languages - Volume 8854, (259-268)
  159. ACM
    Subhedar M and Mankar V High Capacity Image Steganography based on Discrete Wavelet Transform and Singular Value Decomposition Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, (1-7)
  160. ACM
    Kim D, Lee G and Yoo K A reversible data hiding scheme based on histogram shifting using edge direction predictor Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, (126-131)
  161. Chang C, Nguyen T and Lin C (2014). Reversible data embedding for indices based on histogram analysis, Journal of Visual Communication and Image Representation, 25:7, (1704-1716), Online publication date: 1-Oct-2014.
  162. Naderahmadian Y and Hosseini-Khayat S (2014). Fast and robust watermarking in still images based on QR decomposition, Multimedia Tools and Applications, 72:3, (2597-2618), Online publication date: 1-Oct-2014.
  163. Yang Z, Chiou S and Lee J (2014). Watermark design based on Steiner triple systems, Multimedia Tools and Applications, 72:3, (2177-2194), Online publication date: 1-Oct-2014.
  164. ACM
    Behloul A A blind robust image watermarking using interest points and IWT Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems, (139-145)
  165. ACM
    Xu S and Lai S An Optimal Least Significant Bit Based Image Steganography Algorithm Proceedings of International Conference on Internet Multimedia Computing and Service, (42-45)
  166. ACM
    Carnein M, Schöttle P and Böhme R Predictable rain? Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, (97-108)
  167. ACM
    Quiring E and Schöttle P On the combination of randomized thresholds and non-parametric boundaries to protect digital watermarks against sensitivity attacks Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, (41-48)
  168. ACM
    Zhang H, Cao Y, Zhao X, Zhang W and Yu N Video steganography with perturbed macroblock partition Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, (115-122)
  169. ACM
    Urvoy M and Autrusseau F Application of Grubbs' test for outliers to the detection of watermarks Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, (49-60)
  170. ACM
    Hirata N and Kawamura M Digital watermarking method using LDPC code for clipped image Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation, (25-30)
  171. ACM
    Hou J, Park J, Kim D, Nam S and Lee H Robust video watermarking for MPEG compression and DA-AD conversion Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation, (2-8)
  172. Wang J, Guan L, Liu L and Zha D Implementing a Covert Timing Channel Based on Mimic Function Proceedings of the 10th International Conference on Information Security Practice and Experience - Volume 8434, (247-261)
  173. ACM
    Botta M, Cavagnino D and Pomponiu V (2014). Protecting the Content Integrity of Digital Imagery with Fidelity Preservation, ACM Transactions on Multimedia Computing, Communications, and Applications, 10:3, (1-5), Online publication date: 1-Apr-2014.
  174. ACM
    Zielińska E, Mazurczyk W and Szczypiorski K (2014). Trends in steganography, Communications of the ACM, 57:3, (86-95), Online publication date: 1-Mar-2014.
  175. Daraee F and Mozaffari S (2014). Watermarking in binary document images using fractal codes, Pattern Recognition Letters, 35:C, (120-129), Online publication date: 1-Jan-2014.
  176. Minamoto T and Ohura R (2014). A blind digital image watermarking method based on the dyadic wavelet transform and interval arithmetic, Applied Mathematics and Computation, 226, (306-319), Online publication date: 1-Jan-2014.
  177. Kanduri Y and Midatala M Digital Watermarking Using Modified Techniques in Spectral Domain of Images Proceedings of the First International Conference on Mining Intelligence and Knowledge Exploration - Volume 8284, (310-315)
  178. ACM
    Kim D, Park G and Yoo K An Improved Reversible Data Hiding Scheme Based On Neighboring Pixel Differences Proceedings of International Conference on Advances in Mobile Computing & Multimedia, (282-285)
  179. Gujjunoori S and Amberker B (2013). DCT based reversible data embedding for MPEG-4 video using HVS characteristics, Journal of Information Security and Applications, 18:4, (157-166), Online publication date: 1-Dec-2013.
  180. Cho S, Cha B, Gawecki M and Jay Kuo C (2013). Block-based image steganalysis, Journal of Visual Communication and Image Representation, 24:7, (846-856), Online publication date: 1-Oct-2013.
  181. ACM
    Bouzidi I, Ouled Zaid A, Hachani M and Puech W Joint watermarking and progressive geometric compression of 3D meshes Proceedings of the first ACM workshop on Information hiding and multimedia security, (209-214)
  182. ACM
    Naskar R and Chakraborty R (2013). A generalized tamper localization approach for reversible watermarking algorithms, ACM Transactions on Multimedia Computing, Communications, and Applications, 9:3, (1-22), Online publication date: 1-Jun-2013.
  183. Lusson F, Bailey K, Leeney M and Curran K (2013). A novel approach to digital watermarking, exploiting colour spaces, Signal Processing, 93:5, (1268-1294), Online publication date: 1-May-2013.
  184. Domingo-Ferrer J and MegíAs D (2013). Distributed multicast of fingerprinted content based on a rational peer-to-peer community, Computer Communications, 36:5, (542-550), Online publication date: 1-Mar-2013.
  185. Hong W (2013). Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique, Information Sciences: an International Journal, 221, (473-489), Online publication date: 1-Feb-2013.
  186. ACM
    Gujjunoori S and Amberker B A DCT based reversible data embedding scheme for MPEG-4 video using HVS characteristics Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing, (1-7)
  187. Yershov A, Zabiniako V and Semenchuk P (2012). Using Concatenated Steganography for Visual Analysis in GIS SOA, Applied Computer Systems, 13:1, (74-82), Online publication date: 1-Nov-2012.
  188. ACM
    Choudhary A, Chauhan S, Alam M and Tanveer S Schur decomposition and dither modulation Proceedings of the CUBE International Information Technology Conference, (744-748)
  189. ACM
    Pandian N and Thangavel R A hybrid embedded steganography technique Proceedings of the International Conference on Advances in Computing, Communications and Informatics, (1123-1130)
  190. Liao X, Wen Q, Zhao Z and Zhang J (2012). A Novel Steganographic Method with Four-Pixel Differencing and Modulus Function, Fundamenta Informaticae, 118:3, (281-289), Online publication date: 1-Aug-2012.
  191. Di Martino F and Sessa S (2012). Fragile watermarking tamper detection with images compressed by fuzzy transform, Information Sciences: an International Journal, 195, (62-90), Online publication date: 1-Jul-2012.
  192. ACM
    Ilchev S and Ilchev V Modular data hiding for improved web-portal security Proceedings of the 13th International Conference on Computer Systems and Technologies, (187-194)
  193. Cogranne R, Zitzmann C, Retraint F, Nikiforov I, Fillatre L and Cornu P Statistical detection of LSB matching using hypothesis testing theory Proceedings of the 14th international conference on Information Hiding, (46-62)
  194. Song C, Sudirman S and Merabti M (2012). A robust region-adaptive dual image watermarking technique, Journal of Visual Communication and Image Representation, 23:3, (549-568), Online publication date: 1-Apr-2012.
  195. Yang L, Chen Q, Tian J and Wu D (2012). Robust track-and-trace video watermarking, Security and Communication Networks, 5:4, (353-363), Online publication date: 1-Apr-2012.
  196. Yamada T, Echizen I and Yoshiura H PC-based real-time video watermark embedding system independent of platform for parallel computing Transactions on Data Hiding and Multimedia Security VII, (15-33)
  197. Yang C (2012). Reversible data hiding using two marked images based on adaptive coefficient-shifting algorithm, Advances in Multimedia, 2012, (19-19), Online publication date: 1-Jan-2012.
  198. Mulvaney D, Woodward B, Datta S, Harvey P, Vyas A, Thakker B, Farooq O and Istepanian R (2012). Monitoring heart disease and diabetes with mobile internet communications, International Journal of Telemedicine and Applications, 2012, (12-12), Online publication date: 1-Jan-2012.
  199. Blasco J, Hernandez-Castro J, de Fuentes J and Ramos B (2012). A framework for avoiding steganography usage over HTTP, Journal of Network and Computer Applications, 35:1, (491-501), Online publication date: 1-Jan-2012.
  200. Aguilar J and Anderson J (2011). A Neural Watermark Approach, Electronic Notes in Theoretical Computer Science (ENTCS), 281:C, (35-50), Online publication date: 29-Dec-2011.
  201. Naskar R and Chakraborty R Reversible image watermarking through coordinate logic operation based prediction Proceedings of the 7th international conference on Information Systems Security, (190-203)
  202. Minamoto T and Ohura R A blind digital image watermarking method based on the dual-tree complex discrete wavelet transform and interval arithmetic Proceedings of the 14th international conference on Information Security and Cryptology, (437-449)
  203. ACM
    Poh G and Z'aba M On the security and practicality of a buyer seller watermarking protocol for DRM Proceedings of the 4th international conference on Security of information and networks, (251-254)
  204. Di Crescenzo G and Arce G Data forensics constructions from cryptographic hashing and coding Proceedings of the 10th international conference on Digital-Forensics and Watermarking, (494-509)
  205. Yamada T and Takahashi Y Use of "emergable watermarks" as copy indicators for securing video content Proceedings of the 10th international conference on Digital-Forensics and Watermarking, (181-195)
  206. Bandyopadhyay S, Naskar R and Chakraborty R Reversible watermarking using priority embedding through repeated application of integer wavelet transform Proceedings of the First international conference on Security aspects in information technology, (45-56)
  207. ACM
    Rocha A, Scheirer W, Boult T and Goldenstein S (2011). Vision of the unseen, ACM Computing Surveys, 43:4, (1-42), Online publication date: 1-Oct-2011.
  208. Bhat K V, Sengupta I and Das A (2011). A New Audio Watermarking Scheme Based on Singular Value Decomposition and Quantization, Circuits, Systems, and Signal Processing, 30:5, (915-927), Online publication date: 1-Oct-2011.
  209. Bravo-Solorio S and Nandi A (2011). Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics, Signal Processing, 91:8, (1759-1770), Online publication date: 1-Aug-2011.
  210. Kieu T and Chang C (2011). A steganographic scheme by fully exploiting modification directions, Expert Systems with Applications: An International Journal, 38:8, (10648-10657), Online publication date: 1-Aug-2011.
  211. Mairgiotis A and Stylios G Transform based additive data hiding based on a hierarchical prior Proceedings of the 5th European conference on European computing conference, (301-305)
  212. ACM
    Domingo-Ferrer J Rational enforcement of digital oblivion Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society, (1-8)
  213. ACM
    Kim S, Kyung K and Kwon D Haptic annotation for an interactive image Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, (1-10)
  214. ACM
    Das S, Bandyopadhyay P, Banerjee M and Chaudhuri A A chip-based watermarking framework for color image authentication Proceedings of the 2011 International Conference on Communication, Computing & Security, (178-183)
  215. ACM
    Bandyopadhyay P, Das S, Banerjee M and Chaudhuri A A fragile color image watermarking framework focusing a new invisible domain Proceedings of the 2011 International Conference on Communication, Computing & Security, (172-177)
  216. Liu S, Yao H, Zhang S and Gao W A progressive quality hiding strategy based on equivalence partitions of hiding units Transactions on data hiding and multimedia security VI, (58-82)
  217. ACM
    Borse R and Chaudhuri S Computation of embedding capacity in reversible watermarking schemes Proceedings of the Seventh Indian Conference on Computer Vision, Graphics and Image Processing, (472-478)
  218. ACM
    Tsai M and Liu J A game-theoretic system security design for the visible watermarking Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence, (19-24)
  219. Muttoo S and Kumar V (2010). Hiding Message in Map Along Pre-Hamiltonian Path, International Journal of Information Security and Privacy, 4:4, (21-34), Online publication date: 1-Oct-2010.
  220. ACM
    Meerwald P and Uhl A Watermark detection on quantized transform coefficients using product bernoulli distributions Proceedings of the 12th ACM workshop on Multimedia and security, (175-180)
  221. ACM
    Feng X and Doërr G FLD-based detection of re-compressed speech signals Proceedings of the 12th ACM workshop on Multimedia and security, (43-48)
  222. Jia L, Shin S and Yoo K A reversible data hiding scheme using even-odd embedding method Proceedings of the Advanced intelligent computing theories and applications, and 6th international conference on Intelligent computing, (213-220)
  223. ACM
    Li W, Liu Y and Xue X Robust audio identification for MP3 popular music Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval, (627-634)
  224. Meerwald P and Uhl A Watermark detection for video bookmarking using mobile phone camera Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security, (64-74)
  225. Song C, Sudirman S, Merabti M and Llewellyn-Jones D Analysis of digital image watermark attacks Proceedings of the 7th IEEE conference on Consumer communications and networking conference, (941-945)
  226. Naoe K, Sasaki H and Takefuji Y (2010). Secure Key Generation for Static Visual Watermarking by Machine Learning in Intelligent Systems and Services, International Journal of Systems and Service-Oriented Engineering, 1:1, (46-61), Online publication date: 1-Jan-2010.
  227. Wang X, Yang Y and Yang H (2010). Invariant image watermarking using multi-scale Harris detector and wavelet moments, Computers and Electrical Engineering, 36:1, (31-44), Online publication date: 1-Jan-2010.
  228. Turner C A steganographic computational paradigm for wireless sensor networks Proceedings of the 6th international conference on Innovations in information technology, (270-274)
  229. Wang X, Ma T and Niu P Digital Audio Watermarking Technique Using Pseudo-Zernike Moments Information and Communications Security, (459-473)
  230. Senda K and Kawamura M Statistical-mechanical approach for multiple watermarks using spectrum spreading Proceedings of the 4th international conference on Information theoretic security, (231-247)
  231. Tsai M, Wang C and Liu J A hybrid model for digital camera source identification Proceedings of the 16th IEEE international conference on Image processing, (2865-2868)
  232. Braci S, Boyer R and Delpha C Security evaluation of informed watermarking schemes Proceedings of the 16th IEEE international conference on Image processing, (117-120)
  233. Gao Y, Li X, Zeng T and Yang B Improving embedding efficiency via matrix embedding Proceedings of the 16th IEEE international conference on Image processing, (109-112)
  234. Kim K, Lee M, Lee H and Lee H (2009). Reversible data hiding exploiting spatial correlation between sub-sampled images, Pattern Recognition, 42:11, (3083-3096), Online publication date: 1-Nov-2009.
  235. ACM
    Meerwald P and Uhl A Additive spread-spectrum watermark detection in demosaicked images Proceedings of the 11th ACM workshop on Multimedia and security, (25-32)
  236. Belet P, Dams T, Bardyn D and Dooms A Comparison of perceptual shaping techniques for digital image watermarking Proceedings of the 16th international conference on Digital Signal Processing, (387-392)
  237. Candido S and Hutchinson S Detecting intrusion faults in remotely controlled systems Proceedings of the 2009 conference on American Control Conference, (4968-4973)
  238. Huang C, Chuang S, Huang Y and Wu J (2009). Unseen visible watermarking, IEEE Transactions on Information Forensics and Security, 4:2, (193-206), Online publication date: 1-Jun-2009.
  239. Wohlgemuth S, Müller G, Sonehara N and Echizen I On observable delegation of personal data by watermarking Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, (1143-1147)
  240. Acriçmez O, Seifert J and Zhang X A secure DVB set-top box via trusting computing technologies Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, (1048-1055)
  241. Bhat K. V, Sengupta I and Das A Audio Watermarking Based on Quantization in Wavelet Domain Proceedings of the 4th International Conference on Information Systems Security, (235-242)
  242. Wayner P (2008). Disappearing Cryptography, 10.5555/1523275, Online publication date: 3-Dec-2008.
  243. ACM
    Schaathun H A key-recovery attack on authentication watermarking by li and yuan Proceedings of the 10th ACM workshop on Multimedia and security, (221-226)
  244. ACM
    Muñoz A, Gallardo J and García S Detection of distributed steganographic information in social networks Proceedings of the 2008 Euro American Conference on Telematics and Information Systems, (1-9)
  245. ACM
    Lenders V, Koukoumidis E, Zhang P and Martonosi M Location-based trust for mobile user-generated content Proceedings of the 9th workshop on Mobile computing systems and applications, (60-64)
  246. Park J and Doherty J A steganographic approach for covert waveform design MILCOM 2016 - 2016 IEEE Military Communications Conference, (180-185)
  247. Blicq R Extended abstract: Capturing the right flavo(u)r 2015 IEEE International Professional Communication Conference (IPCC), (1-2)
Contributors
  • University of Copenhagen
  • NEC Laboratories America, Inc.
  • Sarnoff Corporation
  • Binghamton University State University of New York
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations