Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession. *This new edition now contains essential information on steganalysis and steganography *New concepts and new applications including QIM introduced *Digital watermark embedding is given a complete update with new processes and applications
- http://www.usatoday.com/tech/news/2001-02-05-binladen.htm.Google Scholar
- http://www.vernace.com.Google Scholar
- http://www.aacsla.com.Google Scholar
- http://www.tektronix.com/Measurement/App_Notes/25_14225/eng/25W_14225 2.pdf.Google Scholar
- Personal communication.Google Scholar
- http://www.research.att.com/njas/lattices/.Google Scholar
- http://forum.doom9.org/showthread.php?t=119871.Google Scholar
- Anonimity 0: Scientology 1, 1995. http://www.wired.com/wired/archive/3.05/eword. html?pg=7.Google Scholar
- In P. P. Ewald, editor. 50 Years of X-Ray Diffraction . Reprinted in pdf format for the IUCr XVIII Congress, Glasgow, Scotland, Copyright 1962, 1999 International Union of Crystallography, 1999.Google Scholar
- Epson introduces revolutionary image authentication system for Epson digital cameras. Business Wire , April 5, 1999.Google Scholar
- J. Abbate. Inventing the Web. Proc. of the IEEE , 87(11):1999-2002, 1999.Google Scholar
- A. Abrardo, M. Barni. Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding. IEEE Trans. on signal Processing , 53(2): 824-833, 2005.Google Scholar
- A. Abrardo, M. Barni, F. Perez-Gonzalez, and C. Mosquera. Trellis-coded rational dither modulation for digital watermarking. In Proceedings of the 4th International Workshop on Digital Watermarking , volume LNCS 3710, pages 351-360. Springer Lecture Notes in Computer Science, 2005. Google Scholar
- A. J. Ahumada and H. A. Peterson. Luminance-model-based DCT quantization for color image compression. Proceedings of the SPIE , 1666:365-374, 1992.Google Scholar
- A. M. Alattar. Reversible watermark using difference expansion of quads. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing , volume 3, pages 377-380, May 2004.Google Scholar
- A. M. Alattar. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Transactions on Image Processing , 13(8):1147-1156, August 2004.Google Scholar
- Masoud Alghoniemy and Ahmed H. Tewfik. Geometric distortion correction through image normalization. Proc. of the International Conference on Multimedia and Expo , 2000.Google Scholar
- E. Allamanche, J. Herre, O. Hellmuth, B. Bernhard Frobach, and M. Cremer. AudioID: Towards content-based identification of audio material. In Proc. of the Int. Conf. on Web Delivering of Music , 2001.Google Scholar
- O. Altun, G. Sharma, U. Celik, and F. Bocko. A set theoretic framework for watermarking and its application to semifragile tamper detection. IEEE Trans. on Information Forensics and Security , 1(4):479-492, 2006.Google Scholar
- R. Anderson, editor. Information Hiding , volume 1174 of Lecture Notes in Computer Science . Springer-Verlag, 1996.Google Scholar
- R. J. Anderson. Stretching the limits of steganography. In Ross Anderson, editor, Information Hiding: First International Workshop , volume 1174 of Lecture Notes in Computer Science , pages 39-48. Springer-Verlag, 1996. Google Scholar
- R. J. Anderson and F. A. P. Petitcolas. On the limits of steganography. IEEE Journal of Selected Areas in Communications, Special Issue on Copyright and Privacy Protection , 16(4):474-481, 1998.Google Scholar
- Daniel Augot, Jean-Marc Boucqueau, Jean-Francois Delaigle, Caroline Fontaine, and Eddie Goray. Secure delivery of images over open networks. Proceedings of the IEEE , 87(7):1251-1266, 1999.Google Scholar
- I. Avcibas, M. Kharrazi, N. Memon, and B. Sankur. Image steganalysis with binary similarity measures. EURASIP Journal on Applied Signal Processing , 17:2749-2757, 2005. Google Scholar
- I. Avcibas, N. D. Memon, and B. Sankur. Steganalysis using image quality metrics. In E. Delp, et al., editors, Proceedings SPIE, Electronic Imaging, Security, and Watermarking of Multimedia Contents III , San Jose, CA, 2001, volume 4314, pages 523-531, 2001.Google Scholar
- M. Backes and C. Cachin. Public-key steganography with active attacks. In J. Kilian, editor, 2nd Theory of Cryptography Conference TCC , volume 3378 of LNCS , pages 210-226. Springer-Verlag, Heidelberg, 2005.Google Scholar
- F. Bacon. Of the advancement and proficiencies of learning or the partitions of sciences , volume VI. Leon Lichfield, Oxford, for R. Young and E. Forest, 1640.Google Scholar
- Z. Bahrav and D. Shaked. Watermarking of dithered halftoned images. In Proc. of the SPIE Conf. on Security and Watermarking of Multimedia Data , volume 3657, pages 307-316, 1999.Google Scholar
- M. Barni, F. Bartolini, V. Cappellini, and A. Piva. A DCT-domain system for robust image watermarking. Signal Processing , 66(3):357-372, 1998. Google Scholar
- James M. Barton. Method and apparatus for embedding authentication information within digital data. United States Patent , 5,646,997, 1997.Google Scholar
- P. Bas, J.-M. Chassery, and F. Davoine. A geometrical and frequential watermarking scheme using similarities. In SPIE Conf. on Security and Watermarking of Multimedia Contents , volume 3657, pages 264-272, 1999.Google Scholar
- P. Bas, J.-M. Chassery, and B. Macq. Robust watermarking based on the warping of predefined triangular patterns. Security and Watermarking of Multimedia Contents II , SPIE-3971:99-109, 2000.Google Scholar
- J. G. Beerends. Audion quality determination based on perceptual measurement techniques. In M. Kahrs and K. Brandenburg, editors, Applications of Digital Signal Processing to Audio and Acoustics , pages 1-38. Kluwer Academic Press, 1998.Google Scholar
- Alan E. Bell. The dynamic digital disk. IEEE Spectrum , 36(10):28-35, 1999. Google Scholar
- W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for data hiding. IBM Systems Journal , 35(3/4):313-336, 1996. Google Scholar
- O. Benedens. Geometry-based watermarking of 3D models. IEEE Computer Graphics and Applications , 19:46-55, 1999. Google Scholar
- C. Berrou and A. Glavieux. Near optimum error correcting and decoding: turbo-codes. IEEE Trans. on Communications , 44(10):1261-1271, 1996.Google Scholar
- S. Bhattacharjee and M. Kutter. Compression tolerant image authentication. In IEEE Int. Conf. on Image Processing , volume 1, pages 435-439, 1998.Google Scholar
- J. Bierbrauer. On Crandall's problem. Personal communication, 1998.Google Scholar
- J. Bierbrauer. Introduction to Coding Theory . Chapman & Hall/CRC, 2004.Google Scholar
- K. A. Birney and T. R. Fischer. On modeling of DCT and subband image data for compression. IEEE Trans. on Image Processing , 4(2):186-193, 1995.Google Scholar
- J. A. Bloom, I. J. Cox, T. Kalker, J-P Linnartz, M. L. Miller, and B. Traw. Copy protection for DVD video. Proc. of IEEE , 87(7):1267-1276, 1999.Google Scholar
- J. Boeuf and J. P. Stern. An analysis of one of the SDMI candidates. In Proceedings of Info Hiding '01 , 2001. Google Scholar
- B. P. Bogert, M. J. R. Healy, and J. W. Tukey. The frequency analysis of time series for echos: Cepstrum, pseudo-autocovariance, cross-cepstrum, and saphe cracking. Proc. of the Symp. Time Series Analysis , pages 209-243, 1963.Google Scholar
- D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. In Proceedings of Advances in Cryptology--CRYPTO'95 , volume Lecture Notes in Computer Science 963, pages 452-465, 1995. Google Scholar
- L. Boney, A. H. Tewfik, and K. N. Hamdy. Digital watermarks for audio signals. In Proc. Third IEEE Int. Conf. on Multimedia Computing and Systems , pages 473-480, 1996. Google Scholar
- A. Borodin, R. Ostrovsky, and Y. Rabani. Lower bounds for high dimensional nearest neighbor search and related problems. In Proc. 31st ACM STOC , pages 312-321, 1999. Google Scholar
- R. N. Bracewell. The Fourier Transform and Its Applications . McGraw-Hill, 1986.Google Scholar
- J. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman. Electronic marking and identification techniques to discourage document copying. In Proc. IEEE Infocom'94 , volume 3, pages 1278-1287, 1994.Google Scholar
- J. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman. Electronic marking and identification techniques to discourage document copying. IEEE Journal of Selected Areas in Communication , 13:1495-1504, 1995.Google Scholar
- J. Brassil, S. Low, N. F. Maxemchuk, and L. O'Gorman. Electronic marking and identification techniques to discourage document copying. In Proceedings, Infocom '94, pages 1278-1287, 1994.Google Scholar
- G. W. Braudaway, K. A. Magerlein, and F. Mintzer. Protecting publicly available images with a visible image watermark. In SPIE Conf. on Optical Security and Conterfeit Deterrence Techniques , volume 2659, pages 126-133, 1996.Google Scholar
- Hans-Joachim Braun. Advanced weaponry of the stars. American Heritage of Invention & Technology , 12(4):10-16, 1997.Google Scholar
- D. Brewster. Microscope , volume XIV. Encyclopedia Britannica or the Dictionary of Arts, Sciences, and General Literature, Edinburgh, IX-Application of photography to the microscope, 8th edition, 1857.Google Scholar
- R. S. Broughton and W. C. Laumeister. Interactive video method and apparatus. United States Patent , 4,807,031, 1989.Google Scholar
- Janelle Brown. Playmate meets geeks who made her a net star. Wired News Web Site, May 1997. http://www.wired.com/news/culture/0,1284,4000,00.html.Google Scholar
- Lisa Gottesfeld Brown. A survey of image registration techniques. ACM Computing Surveys , 24(4):325-376, 1992. Google Scholar
- Redmond A. Burke. The most beautiful book of the fifteenth century: Hypnerotomachia poliphili. Bulletin of the New York Public Library , 58(9):419-428, 1954.Google Scholar
- Pierre Buser and Michel Imbert. Audition . MIT Press, 1992. Translated by R. H. Kay.Google Scholar
- C. Cachin. An information-theoretic model for steganography. In D. Aucsmith, editor, Information Hiding, 2nd International Workshop , volume 1525 of LNCS , pages 306-318. Springer-Verlag, New York, 1998.Google Scholar
- F. W. Campbell and J. J. Kulikowski. Orientation selectivity of the human visual system. J. Physiol. , 187:437-445, 1966.Google Scholar
- F. W. Campbell, J. J. Kulikowski, and J. Levinson. The effect of orientation on the visual resolution of gratings. J. Physiol. , 187:427-436, 1966.Google Scholar
- Carol Carr and Patricia E. O'Neill. Adding INSPEC to your chemical search strategy-- let's get physical. Database , 18(2):99-102, 1995. Google Scholar
- D. Casasent and D. Psaltis. Position, rotation, and scale invariant optical correlation. Applied Optics , 15(7):1795-1799, 1976.Google Scholar
- D. Casasent and D. Psaltis. New optical transforms for pattern recognition. Proc. of the IEEE , 65(1):77-84, 1977.Google Scholar
- F. Cayre, C. Fontaine, and T. Furon. Watermarking security: Theory and practice. IEEE Trans. on Signal Processing , 53(10):3976-3987, 2003.Google Scholar
- F. Cayre, C. Fontaine, and T. Furon. A theoretical study of watermarking security. Proceedings International Symposium on Information Theory (ISIT) , pages 1868-1872, 2005.Google Scholar
- M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber. Lossless generalized LSB data embedding. IEEE Transactions on Image Processing , 14(2):253-266, February 2005.Google Scholar
- A. Chakrabarti, B. Chazelle, B. Gum, and A. Lvov. A lower bound on the complexity of approximate nearest neighbor searching on the Hamming cube. In Proc. 31st ACM STOC , pages 305-311, 1999. Google Scholar
- R. Chandramouli, M. Kharrazi, and N. Memon. Image steganography and steganalysis: Concepts and practice. In T. Kalker, Y. M. Ro, and I. Cox, editors, Digital Watermarking, 2nd International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 , volume 2939 of LNCS , pages 35-49. Springer-Verlag, New York, 2004.Google Scholar
- R. Chandramouli, G. Li, and N. Memon. Adaptive steganography. In Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IV, San Jose, CA, January 21-24, 2002 , pages 69-78, 2002.Google Scholar
- R. Chandramouli and N. D. Memon. Analysis of LSB based image steganography techniques. In Proceedings ICIP 2001, Thessaloniki, Greece, October 7-10, 2001 , 2001. CD Version.Google Scholar
- Ee-Chien Chang and M. Orchard. Geometric properties of watermarking schemes. IEEE Int. Conf. on Image Processing , 3:714-717, 2000.Google Scholar
- D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM , 24(2):84-88, 1981. Google Scholar
- B. Chen and C.-E. Sundberg. Digital audio broadcasting in the FM band by means of contiguous band insertion and precanceling techniques. IEEE Trans. on Communications , 48(10):1634-1637, 2000.Google Scholar
- B. Chen and G. Wornell. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory , 47(4):1423-1443, 2001.Google Scholar
- B. Chen and G. W. Wornell. Digital watermarking and information embedding using dither modulation. In IEEE Second Workshop on Multimedia Signal Processing , pages 273-278, 1998.Google Scholar
- B. Chen and G. W. Wornell. An information-theoretic approach to the design of robust digital watermarking systems. IEEE Transactions on Acoustics, Speech, and Signal Processing , 1999. Google Scholar
- B. Chen and G. W. Wornell. Preprocessed and postprocessed quantization index modulation methods for digital watermarking. In Security and Watermarking of Multimedia Contents II , volume SPIE-3971, pages 48-59, 2000.Google Scholar
- Q. Cheng and T. S. Huang. Blind digital watermarking for images and videos and performance analysis. In IEEE Int. Conf. on Multimedia and Expo , volume 1, pages 389-392, 2000.Google Scholar
- Y. Cheng. Music database retrieval based on spectral similarity. In Int. Symp. on Music Information Retrieval , 2001.Google Scholar
- Jim Chou, S. Sandeep Pradhan, and Kannan Ramchandran. On the duality between distributed source coding and data hiding. Thirty-third Asilomar Conference on Signals, Systems, and Computers , 2:1503-1507, 1999.Google Scholar
- D. Coltuc and J.-M. Chassery. Distortion-free robust watermarking: A case study. In E. Delp III, editor, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX , volume 6505, January 2007.Google Scholar
- J. H. Conway and N. J. A. Sloane. Sphere Packings, Lattices, and Groups . Springer-Verlag, 1988. Google Scholar
- D. Coppersmith, F. Mintzer, C. Tresser, C. W. Wu, and M. M. Yeung. Fragile imperceptible digital watermark with privacy control. In Security and Watermarking of Multimedia Contents , volume SPIE-3657, pages 79-84, 1999.Google Scholar
- Corel Stock Photo Library 3, Corel Corporation, Ontario, Canada.Google Scholar
- Tom N. Cornsweet. Visual Perception . Academic Press, 1970.Google Scholar
- M. Costa. Writing on dirty paper. IEEE Trans. Inform. Theory , 29:439-441, 1983.Google Scholar
- Thomas M. Cover and Joy A. Thomas. Elements of Information Theory . John Wiley & Sons, 1991. Google Scholar
- I. J. Cox. Spread spectrum watermark for embedded signalling. United States Patent , 5,848,155, 1998.Google Scholar
- I. J. Cox. Watermarking of image data using mpeg/jpeg coefficients. United States Patent , 6,069,914, 2000.Google Scholar
- I. J. Cox, T. Kalker, G. Pakura, and M. Scheel. Information transmission and steganography. In Int. Workshop on Digital Watermarking , 2005. Google Scholar
- I. J. Cox and J-P. M.G. Linnartz. Public watermarks and resistance to tampering. IEEE Int. Conference on Image Processing , 3, 1997.Google Scholar
- I. J. Cox and M. L. Miller. Counteracting geometric distortions for DCT based watermarking. United States Patent , 6,108,434, 2000.Google Scholar
- I. J. Cox, M. L. Miller, and A. McKellips. Watermarking as communications with side information. Proc. IEEE , 87(7):1127-1141, 1999.Google Scholar
- I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Trans. on Image Processing , 6(12):1673-1687, 1997.Google Scholar
- I. J. Cox and M. L. Miller. A review of watermarking and the importance of perceptual modeling. In Proceedings of SPIE, Human Vision & Electronic Imaging II , volume 3016, pages 92-99, 1997.Google Scholar
- I. J. Cox, G. Doerr, and T. Furon. Watermarking is not cryptography. Int. Workshop on Digital Watermarking , 2006.Google Scholar
- S. Craver. On public-key steganography in the presence of an active warden. Technical Report RC 20931, IBM, 1997.Google Scholar
- S. Craver. On public-key steganography in the presence of an active warden. In Proceedings 2nd Information Hiding Workshop , pages 355-368, 1998.Google Scholar
- S. Craver, N. Memon, B.-L. Yeo, and M. M. Yeung. Can invisible watermarks solve rightful ownerships? IBM Technical Report RC 20509, IBM Research, July 1996. IBM CyberJournal: http://www.research.ibm.Google Scholar
- S. Craver, N. Memon, B.-L. Yeo, and M. M. Yeung. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications. IEEE Journal of Selected Areas in Communication , 16(4):573-586, 1998.Google Scholar
- G. Csurka, F. Deguillaume, J. J. K. O'Ruanaidh, and T. Pun. A Bayesian approach to affine transformation resistant image and video watermarking. In Proc. of the 3rd Int. Information Hiding Workshop , pages 315-330, 1999. Google Scholar
- O. Dabeer, K. Sullivan, U. Madhow, S. Chandrasekaran, and B. S. Manjunath. Detection of hiding in the least significant bit. IEEE Transactions on Signal Processing , 52:3046-3058, 2004.Google Scholar
- Scott Daly. The Visible Difference Predictor: An algorithm for the assessment of image fidelity. In A. B. Watson, editor, Digital Images and Human Vision , chapter 14, pages 179-206. MIT Press, 1993. Google Scholar
- G. Danezsis, R. Dingledine, and N. Mathewson. Mixminion: Design of a type iii anonymous remailer protocol. In IEEE Proc. of the 2003 Symposium on Security and Privacy , pages 2-15, 2003. Google Scholar
- Steve Decker. Engineering considerations in commercial watermarking. IEEE Communications Magazine , 39(8):128-133, 2001.Google Scholar
- J. F. Delaigle, C. De Vleeschouwer, and B. Macq. Watermarking algorithm based on a human visual model. Signal Processing , 66(3):319-335, 1998. Google Scholar
- D. Delannay and B. Macq. Generalized 2D cyclic patterns for secret watermark generation. In IEEE Int. Conf. on Image Processing , volume 2, pages 77-79, 2000.Google Scholar
- G. Depovere, T. Kalker, J. Haitsma, M. Maes, L. de Strycker, P. Termont, J. Vandewege, A. Langell, C. Alm, P. Norman, B. O'Reilly, G. Howes, H. Vaanholt, R. Hintzen, P. Donnelly, and A. Hudson. The VIVA project: Digital watermarking for broadcast monitoring. IEEE Int. Conf. on Image Processing , 2:202-205, 1999.Google Scholar
- Geert Depovere, Ton Kalker, and Jean-Paul Linnartz. Improved watermark detection using filtering before correlation. In IEEE Int. Conf. on Image Processing , volume 1, pages 430-434, Chicago, October 1998.Google Scholar
- Y. Desmedt. Subliminal-free authentication and signature. In Advances in Cryptology, Proc. of EUROCRYPT '88 , volume 330 of Lecture Notes in Computer Science , pages 22-33. Springer, 1988. Google Scholar
- Jana Dittmann, Thomas Fiebig, and Ralf Steinmetz. A new approach for transformation invariant image and video watermarking in the spatial domain: SSP self-spanning patterns. Security and Watermarking of Multimedia Contents II , SPIE-3971:176-185, 2000.Google Scholar
- Ray Dolby. Apparatus and method for the identification of specially encoded FM stereophonic broadcasts. United States Patent , 4,281,217, 1981.Google Scholar
- M. Dolson. The phase vocoder: A tutorial. Comput. Music J. , 10:14-27, 1986.Google Scholar
- R. O. Duda, P. E. Hart, and D. G. Stork. Pattern Classification, second edition . John Wiley & Sons, Inc., 2001. Google Scholar
- R. O. Duda, P. E. Hart, and D. H. Stork. Pattern Classification . Wiley Interscience, New York, 2000. Google Scholar
- J.-L. Dugelay and F. A. P. Petitcolas. Possible counter-attacks against random geometric distortions. In Proc. SPIE Conf. on Security and Watermarking of Multimedia Content II , volume 3971, pages 338-345, 2000.Google Scholar
- I. Dumer. Concatenated codes and their multilevel generalizations. In V. S. Pless, W. C. Huffman, and R. A. Brualdi, editors, Handbook of Coding Theory: Volume II , chapter 23, pages 1911-1988. Elsevier Science, Amsterdam, 1998.Google Scholar
- S. Dumitrescu and X. Wu. LSB steganalysis based on higher-order statistics. In Proceedings ACM Multimedia and Security Workshop, New York, NY, August 1-2 , 2005. Google Scholar
- S. Dumitrescu, X. Wu, and N. Memon. On steganalysis of random LSB embedding in continuous-tone images. In Proceedings ICIP, Rochester, NY, September 22-25, 2002 , pages 324-339, 2002.Google Scholar
- S. Dumitrescu, X. Wu, and Z. Wang. Detection of LSB steganography via sample pair analysis. In F. A. P. Petitcolas, editor, Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002 , volume 2578 of LNCS , pages 355-372. Springer-Verlag, New York, 2003. Google Scholar
- J. Eggers, R. Buml, and B. Girod. A communications approach to steganography. In Proceedings SPIE, Electronic Imaging, Security, and Watermarking of Multimedia Contents IV, San Jose, CA, January 21-24, 2002 , volume 4675, pages 26-37, 2002.Google Scholar
- J. J. Eggers, J. K. Su, and B. Girod. Robustness of a blind image watermarking scheme. In IEEE Int. Conf. on Image Processing , volume 3, pages 17-20, 2000.Google Scholar
- Joachim J. Eggers, Robert Buml, Roman Tzschoppe, and Bernd Girod. Scalar costa scheme for information embedding. IEEE Transactions on Signal Processing , 51(4):1003-1019, April 2003.Google Scholar
- Joachim J. Eggers and Bernd Girod. Watermark detection after quantization attacks. In A. Pfitzmann, editor, Third Int. Workshop on Information Hiding , volume 1768 of Lecture Notes in Computer Science , pages 172-186, 1999. Google Scholar
- Joachim J. Eggers and Bernd Girod. Quantization effects on digital watermarks. Signal Processing , 81(3), 2001. Google Scholar
- Joachim J. Eggers, Jonathan K. Su, and Bernd Girod. Public key watermarking by eigenvectors of linear transforms. In EUSIPCO , Tampere, Finland, Sept. 2000.Google Scholar
- J. Eggers, R. Baumi, and B. Girod. Estimation of amplitude modifications before SCS water mark detection. Proc. SPIE Security, Steganography and Watermarking of Mutlimedia Contents , 387-398, 2002.Google Scholar
- F. Ergun, J. Kilian, and R. Kumar. A note on the limits of collusion-resistant watermarks. In Advances in Cryptology--EUROCRYPT '99 , pages 140-149. Springer-Verlag, 1999. Google Scholar
- J. M. Ettinger. Steganalysis and game equilibria. In D. Aucsmith, editor, Information Hiding, 2nd International Workshop, IH 1998, Portland, Oregon, April 1998 , volume 1525 of LNCS , pages 319-328. Springer-Verlag, New York, 1998.Google Scholar
- H. Farid and L. Siwei. Detecting hidden messages using higher-order statistics and support vector machines. In F. A. P. Petitcolas, editor, Information Hiding, 5th International Workshop, IW 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002 , volume 2578 of LNCS , pages 340-354. Springer-Verlag, New York, 2002. Google Scholar
- Aníbal J. S. Ferreira. An odd-DFT based approach to time-scale expansion of audio signals. IEEE Trans. Speech and Audio Proc. , 7(4):441-453, 1999.Google Scholar
- David J. Field. Relations between the statistics of natural images and the response properties of cortical cells. J. Opt. Soc. Am. A , 4(12):2379-2394, 1987.Google Scholar
- D. Fragoulis, G. Rousopoulos, T. Panagopoulos, C. Alexiou, and C. Papaodysseus. On the automated recognition of seriously distorted musical recordings. IEEE Trans. on Signal Processing , 49(4):898-908, 2001.Google Scholar
- E. Franz. Steganography preserving statistical properties. In F. A. P. Petitcolas, editor, Information Hiding, 5th International Workshop , volume 2578 of LNCS , pages 278- 294. Springer-Verlag, New York, 2002. Google Scholar
- J. Fridrich. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In J. Fridrich, editor, Information Hiding, 6th International Workshop, IW 2004, Toronto, Canada, May 23-25, 2004 , volume 3200 of LNCS , pages 67-81. Springer-Verlag, New York, 2005. Google Scholar
- J. Fridrich and M. Goljan. Images with self-correcting capabilities. In Proc. IEEE Int. Conf. on Image Processing , volume 3, 1999.Google Scholar
- J. Fridrich and M. Goljan. On estimation of secret message length in LSB steganography in spatial domain. In Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, January 19-22, 2004 , volume 5306, pages 23-34, 2004.Google Scholar
- J. Fridrich, M. Goljan, and M. Du. Invertible authentication. In Proc. of SPIE, Security and Watermarking of Multimedia Contents , 2001.Google Scholar
- J. Fridrich, M. Goljan, and R. Du. Detecting LSB steganography in color and grayscale images. IEEE Multimedia, Special Issue on Security , 8(4):22-28, October-December 2001. Google Scholar
- J. Fridrich, M. Goljan, and R. Du. Reliabile detection of LSB steganography in grayscale and color images. In J. Dittmann, K. Nahrstedt, and P. Wohlmacher, editors, Proceedings of the ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, October 5, 2001 , pages 27-30, 2001. Google Scholar
- J. Fridrich, M. Goljan, and R. Du. Steganalysis based on JPEG compatibility. In A. G. Tescher, editor, Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia Systems and Applications IV, Denver, CO, August 20-24, 2001 , volume 4518, pages 275-280, 2001.Google Scholar
- J. Fridrich, M. Goljan, and D. Hogea. Steganalysis of JPEG images: Breaking the F5 algorithm. In 5th International Workshop on Information Hiding, Noordwijkerhout, The Netherlands, October 7-9, 2002 , volume 2578 of LNCS , pages 310-323. Springer, New York, 2002. Google Scholar
- J. Fridrich, M. Goljan, D. Hogea, and D. Soukal. Quantitative steganalysis of digital images: Estimating the secret message length. ACM Multimedia Systems Journal, Special Issue on Multimedia Security , 9(3):288-302, 2003.Google Scholar
- J. Fridrich, M. Goljan, and D. Soukal. Higher-order statistical steganalysis of palette images. In Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, Santa Clara, CA, January 21-24, 2003 , pages 178-190, 2003.Google Scholar
- J. Fridrich, M. Goljan, and D. Soukal. Perturbed quantization steganography using wet paper codes. In J. Dittman and J. Fridrich, editors, Proceedings ACM Multimedia and Security Workshop, Magdeburg, Germany, September 20-21, 2004 , pages 4-15. ACM Press, New York, 2004. Google Scholar
- J. Fridrich, M. Goljan, and D. Soukal. Perturbed quantization steganography. ACM Multimedia and Security Journal , 11(2):98-107, 2005.Google Scholar
- J. Fridrich, M. Goljan, and D. Soukal. Steganography via codes for memory with defective cells. In 43rd Conference on Coding, Communication, and Control, September 28-30, 2005 , 2005.Google Scholar
- J. Fridrich, M. Goljan, and D. Soukal. Efficient wet paper codes. In M. Barni, editor, Proceedings, Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005 , LNCS. Springer, Berlin, 2006.Google Scholar
- J. Fridrich, M. Goljan, D. Soukal, and T. Holotyak. Forensic steganalysis: Determining the stego key in spatial domain steganography. In Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, January 17-20, 2005 , volume 5681, pages 631-642, 2005.Google Scholar
- J. Fridrich and D. Soukal. Matrix embedding for large payloads. IEEE Trans on Information Security and Forensics , 1(3):390-394, 2006.Google Scholar
- J. Fridrich, R. Du, and M. Long. Steganalysis of LSB encoding in color images. IEEE International Conference on Multimedia and Expo , 2000.Google Scholar
- G. L. Friedman. The trustworthy camera: Restoring credibility to the photographic image. IEEE Trans. on Consumer Electronics , 39(4):905-910, 1993.Google Scholar
- G. L. Friedman. Digital camera with apparatus for authentication of images produced from an image file. United States Patent , 5,499,294, 1996.Google Scholar
- M. S. Fu and O. C. Au. Data hiding for halftone images. In Proc. SPIE Conf. on Security and Watermarking of Multimedia Data , volume 3971, pages 228-236, 2000.Google Scholar
- T. Furon and P. Duhamel. An asymmetric public detection watermarking technique. In Proc. of the 3rd Int. Information Hiding Workshop , pages 88-100, Dresden, Germany, Sept. 1999. Google Scholar
- T. Furon and P. Duhamel. Robustness of an asymmetric watermarking technique. IEEE Int. Conference on Image Processing , 3:21-24, 2000.Google Scholar
- F. Galand and G. Kabatiansky. Information hiding by coverings. In Proceedings ITW2003, Paris, France, 2003 , pages 151-154, 2003.Google Scholar
- R. A. Garcia. Digital watermarking of audio signals using a psychoacoustic auditory model and spread spectrum theory. Proc. 107th AES Convertion , 1999.Google Scholar
- S. I. Gel'fand and M. S. Pinsker. Coding for channel with random parameters. Problems of Control and Information Theory , 9(1):19-31, 1980.Google Scholar
- Bernd Girod. What's wrong with mean-squared error? In A. B. Watson, editor, Digital Images and Human Vision , chapter 15, pages 207-220. MIT Press, 1993. Google Scholar
- R. D. Gitlin, J. F. Hayes, and S. B. Weinstein. Data Communications Principles . Plenum Press, 1992. Google Scholar
- H. M. Gladney, F. C. Mintzer, and F. Schiattarella. Safeguarding digital library contents and users: Digital images of treasured antiquities. D-Lib Magazine , 1997.Google Scholar
- M. Goljan, J. Fridrich, and R. Du. Distortion-free data embedding for images. In 4th Int. Information Hiding Workshop , 2001. Google Scholar
- M. Goljan, J. Fridrich, and T. Holotyak. New blind steganalysis and its implications. In E. Delp III and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII , volume 6072, 1-13, 2006.Google Scholar
- R. C. Gonzalez and R. E. Woods. Digital Image Processing . Addison-Wesley, 1992. Google Scholar
- David M. Green and John A. Swets. Signal Detection Theory and Psychophysics . Robert E. Krieger Publishing Co., 1973.Google Scholar
- J. Haitsma and T. Kalker. A highly robust audio fingerprinting system. In 3rd Int. Conf. on Music Information Retrieval ISMIR 2002 , 2002.Google Scholar
- J. Haitsma, T. Kalker, and J. Oostveen. Robust audio hashing for content identification. In Content Based Multimedia Indexing , 2001.Google Scholar
- C. F. Hall and E. L. Hall. A nonlinear model for the spatial characteristics of the human visual system. IEEE Trans. Systems Man and Cybernetics , 7(3):161-170, 1977.Google Scholar
- Khaled N. Hamdy, Ahmed H. Tewfik, Ting Chen, and Satoshi Takagi. Time-scale modification of audio signals with combined harmonic and wavelet representations. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing , 1:439-442, 1997. Google Scholar
- A. Hanjalic, G. C. Langelaar, P. M. B. van Roosmalen, J. Biemond, and R. L. Lagendijk. Image and Video Databases: Restoration, Watermarking and Retrieval . Elsevier, 2000. Google Scholar
- J. J. Harmsen and W. A. Pearlman. Steganalysis of additive noise modelable information hiding. In E. Delp III and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, Santa Clara, CA, January 21-24, 2003 , volume 5020, pages 131-142, 2003.Google Scholar
- J. J. Harmsen and W. A. Pearlman. Capacity of steganalysis channels. In Proceedings ACM Multimedia and Security Workshop, New York, NY, August 1-2, 2005 , pages 11-24, 2005. Google Scholar
- Fredric J. Harris. On the use of windows for harmonic analysis with the Discrete Fourier Transform. Proc. IEEE , 66(1):51-83, 1978.Google Scholar
- F. Hartung, P. Eisert, and B. Girod. Digital watermarking of MPEG-4 facial animation parameters. Comput. and Graphics , 22(4):425-435, 1998.Google Scholar
- F. Hartung and B. Girod. Watermarking of uncompressed and compressed video. Signal Processing , 66(3):283-301, 1998. Google Scholar
- F. Hartung, J. K. Su, and B. Girod. Spread spectrum watermarking: Malicious attacks and counterattacks. In SPIE Conf. on Security and Watermarking of Multimedia Content , volume 3657, pages 147-158, 1999.Google Scholar
- Frank Hartung and Martin Kutter. Multimedia watermarking techniques. Proc. IEEE , 87(7):1079-1107, 1999.Google Scholar
- G. E. Healey and R. Kondepudy. Radiometric CCD camera calibration and noise estimation. IEEE Transactions on Pattern Analysis and Machine Intelligence , 16(3):267-276, March 1994. Google Scholar
- C. Heegard and A. El-Gamal. On the capacity of computer memory with defects. IEEE Trans. on Inform. Theory , 29:731-739, 1983.Google Scholar
- H. Heijmans and L. Kamstra. Reversible data embedding based on the Haar wavelet decomposition. In Proceedings of the Seventh International Conference on Digital Image Computing: Techniques and Applications (DICTA) , pages 5-13, 2003.Google Scholar
- C. W. Helstrom. Statistical Theory of Signal Detection . Pergamon Press, 1960.Google Scholar
- Emil Frank Hembrooke. Identification of sound and like signals. United States Patent , 3,004,104, 1961.Google Scholar
- H. Hering, M. Hagmüller, A. Kröpfl, and G. Kubin. Speech watermarking for air traffic control. In Proceedings of the XII European Signal Processing Conference (EUSIPCO) , pages 1653-1656, 2004.Google Scholar
- H. Hering, M. Hagmüller, and G. Kubin. Safety and security increase for air traffic management through unnoticeable watermark aircraft identification tag transmitted with the VHF voice communication. In Proceedings of the 22nd Digital Avionics Systems Conference , pages 4E2,1-10, 2003.Google Scholar
- J. J. Hernandez, F. Perez-Gonzalez, J. M. Rodriguez, and G. Nieto. Performance analysis of a 2D multipulse amplitude modulation scheme for data hiding and watermarking still images. IEEE Journal of Selected Areas in Communication , 16(4):510-524, 1998.Google Scholar
- J. R. Hernandez, M. Amado, and F. Perez-Gonzalez. DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Transactions on Image Processing , 9(1):55-68, 2000.Google Scholar
- J. R. Hernandez, J.-F. Delaigle, and B. Macq. Improving data hiding by using convolutional codes and soft-decision decoding. In Proc. SPIE Conf. on Security and Watermarking of Multimedia Content II , volume 3971, pages 24-47, 2000.Google Scholar
- J. R. Hernandez and F. Perez-Gonzalez. Statistical analysis of watermarking schemes for copyright protection of images. Proceedings of the IEEE , 87(7):1142-1166, 1999.Google Scholar
- Herodotus. The Histories . Penguin Books, London, 1996. Translated by Aubrey de Sélincourt.Google Scholar
- S. Hetzl and P. Mutzel. A graph-theoretic approach to steganography. In J. Dittmann et al., editor, Communications and Multimedia Security. 9th IFIP TC-6 TC-11 International Conference, CMS 2005 , volume 3677 of LNCS , pages 119-128, Salzburg, Austria, September 19-21, 2005. Google Scholar
- K. Hofbauer and H. Hering. Digital signatures for the analogue radio. In Proceedings of the 5th NASA Integrated Communications Navigation and Surveillance (ICNS) Conference and Workshop , 2005.Google Scholar
- Matthew Holliman and Nasir Memon. Counterfeiting attacks on oblivious blockwise independent invisible watermarking schemes. IEEE Trans. on Image Processing , 9(3):432-441, 2000.Google Scholar
- G. C. Holst. CCD Arrays, Cameras, and Displays, second edition , JCD Publishing & SPIE Press, 1998.Google Scholar
- L. Holt, B. G. Maufe, and A. Wiener. Encoded marking of a recording signal. UK Patent , GB 2196167A, 1988.Google Scholar
- C. Honsinger and M. Rabanni. Data embedding using phase dispersion. In Proc. Int. Conf. on Information Technology , 2000.Google Scholar
- C. W. Honsinger and S. J. Daly. Method for detecting rotation and magnification in images. United States Patent , 5,835,639, 1998.Google Scholar
- C. W. Honsinger, P. Jones, M. Rabbani, and J. C. Stoffel. Lossless recovery of an original image containing embedded data. U.S. Patent Application, Docket No. 77102/E-D , 1999.Google Scholar
- N. J. Hopper, J. Langford, and L. von Ahn. Provably secure steganography. In M. Yung, editor, Advances in Cryptology: CRYPTO 2002 , volume 2442 of LNCS , pages 77-92. Springer, 2002. Google Scholar
- C.-T. Hsu and J.-L. Wu. Hidden digital watermarks in images. IEEE Trans. on Image Processing , 8(1):58-68, 1999.Google Scholar
- Y. N. Hsu, H. H. Arsenault, and G. April. Rotation-invariant digital pattern recognition using circular harmonic expansion. Applied Optics , 21:4012-4015, 1982.Google Scholar
- Dard Hunter. Handmade Paper and Its Watermarks: A Bibliography . B. Franklin, New York, 1967.Google Scholar
- Methodology for the subjective assessment of the quality of television pictures-- Recommendation ITU-R BT.500-10 . ITU Radiocommunication Assembly, 2000.Google Scholar
- D. W. Jacobs. Grouping for recognition. AI Memo 1177 , MIT, 1989. Google Scholar
- J. R. Janesick. Scientific Charge-Coupled Devices , volume Monograph PM83. SPIE Press--The International Society for Optical Engineering, January 2001.Google Scholar
- N. Jayant, J. Johnston, and R. Safranek. Signal compression based on models of human perception. Proc IEEE , 81(10), 1993.Google Scholar
- N. Johnson, Z. Duric, and S. Jajodia. Information Hiding: Steganography and Watermarking--Attacks and Countermeasures . Kluwer Academic Publishers, 2000.Google Scholar
- N. Johnson and S. Jajodia. Steganalysis: The investigation of hidden information. In Proceedings of the 1998 IEEE Information Technology Conference, Syracuse, NY, September 1-3, 1998 .Google Scholar
- N. F. Johnson and S. Jajodia. Steganalysis of images created using current steganography software. In D. Aucsmith, editor, Information Hiding, 2nd International Workshop, Portland, OR, April 1998 , volume 1525 of LNCS , pages 273-289. Springer-Verlag, Berlin, 1998.Google Scholar
- N. F. Johnson and S. Jajodia. Steganography: Seeing the unseen. IEEE Computer , pages 26-34, February 1998. Google Scholar
- JTC1/SC29/WG11 MPEG. Information technology--coding of moving pictures and associated audio for digital storage media at up to about 1.5 Mbits/s--part 3: Audio. Technical Report IS11172-3, ISO/IEC, 1992.Google Scholar
- David Kahn. The Codebreakers--The Story of Secret Writing . Scribner, New York, 1967.Google Scholar
- A. B. Kahng, S. Mantik, I. L. Markov, M. Potkonjak, P. Tucker, Huijuan Wang, and G. Wolfe. Robust IP watermarking methodologies for physical design. Proceedings 35th Design and Automation Conference , pages 782-787, 1998. Google Scholar
- T. Kalker and A. J. E. M. Janssen. Analysis of watermark detection using SPOMF. In Proceedings. 1999 International Conference on Image Processing , volume 1, 1999.Google Scholar
- T. Kalker, J.-P. Linnartz, and M. van Dijk. Watermark estimation through detector analysis. In Proceedings. 1998 International Conference on Image Processing , volume 1, 1998.Google Scholar
- T. Kalker and F. M. Willems. Capacity bounds and code constructions for reversible data-hiding. In E. Delp III, editor, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V , volume 5020, pages 604-611, January 2003.Google Scholar
- H. R. Kang. Digital Color Halftoning . IEEE Press, 1999. Google Scholar
- M. Karahan, U. Topkara, M. Atallah, C. Taskiran, E. Lin, and E. Delp. A hierarchical protocol for increasing the stealthiness of steganographic methods. In Proceedings ACM Multimedia and Security Workshop, Magdeburg, Germany, September 20-21, 2004 , pages 16-24, 2004. Google Scholar
- S. Katzenbeisser and F. Petitcolas, editors. Information Hiding Techniques for Steganography and Digital Watermarking . Artech House, 2000. Google Scholar
- S. Katzenbeisser and F. A. P. Petitcolas. On defining security in steganographic systems. In Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IV, San Jose, CA, January 21-24, 2002 , volume 4675, pages 50-56, 2002.Google Scholar
- D. H. Kelly. Visual responses to time dependent stimuli. I. Amplitude sensitivity measurements. J. Opt. Soc. Am. A , 51:422-429, 1961.Google Scholar
- A. Ker. Quantitative evaluation of pairs and RS steganalysis. In E. J. Delp III and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, January 19-22, 2004 , volume 5306, pages 83-97, 2004.Google Scholar
- A. Ker. A general framework for structural analysis of LSB replacement. In M. Barni, et al., editors, Proceedings 7th Information Hiding Workshop, Barcelona, Spain, June 6-8, 2005 , volume 3727, Lecture Notes in Computer Science , pages 276-311. Springer-Verlag, Berlin, 2005.Google Scholar
- A. Ker. Improved detection of LSB steganography in grayscale images. In J. Fridrich, editor, Preproceedings, Information Hiding, 6th International Workshop, IIH 2004, Toronto, Canada, May 23-25, 2004 , volume 3200 of LNCS , pages 97-115. Springer-Verlag, Berlin, 2005. Google Scholar
- A. Ker. Resampling and the detection of LSB matching in color bitmaps. In E. Delp, et al., editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, January 16-20, 2005 , volume 5681, pages 1-15, 2005.Google Scholar
- A. Ker. Optimally weighted least-squares steganalysis. In E. Delp, et al., editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX , volume 6502, pages 06-1-06-16, 2007.Google Scholar
- A. Ker and R. Boehme. A two-factor error model for quantitative steganalysis. In E. Delp, et al., editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII , volume 6072, pages 06-1-06-16, 2006.Google Scholar
- A. D. Ker. Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters , 12(6):441-444, June 2005.Google Scholar
- Aguste Kerckhoff. La cryptographie militaire. Journal des sciences militaires , IX( Jan., Feb.):5-38, 161-191, 1883.Google Scholar
- Dogan Kesdogan, Jan Egner, and Roland Büschks. Stop-and-Go-MIXes providing probabilistic anonymity in an open system. In Proc. of the 2nd Int. Information Hiding Workshop , pages 83-98, 1998.Google Scholar
- M. Kharrazi, H. T. Sencar, and N. Memon. Cover selection for steganographic embedding. In IEEE International Conference on Image Processing , 2006.Google Scholar
- A. Kiayias, Y. Raekow, and A. Russell. Efficient steganography with provable security gurantees. In M. Barni, et al., editors, Proceedings, Information Hiding, 7th International Workshop, IH Barcelona, Spain, June 6-8, 2005 , volume 3727 of LNCS , pages 118-130. Springer-Verlag, Berlin, 2005.Google Scholar
- David Kilburn. Dirty linen, dark secrets. Adweek , 1997.Google Scholar
- J. Kilian, F. T. Leighton, L. R. Matheson, T. Shamoon, and R. E. Tarjan. Resistance of watermarked documents to collusional attacks. Technical Report TR 97-167, NEC Research Institute, 1997.Google Scholar
- E. Koch and J. Zhao. Towards robust and hidden image copyright labeling. In IEEE Workshop on Nonlinear Signal and Image Processing , 1995.Google Scholar
- N. Komatsu and H. Tominaga. Authentication system using concealed image in telematics. Memoirs of the School of Science and Engineering, Waseda University , 52:45-60, 1988.Google Scholar
- N. Komatsu and H. Tominaga. A proposal on digital watermark in document image communication and its application to realizing a signature. Electronics and Communications in Japan , 73(5):208-218, 1990.Google Scholar
- D. Kundur and D. Hatzinakos. Blind image deconvolution. IEEE Signal Processing Magazine , 13(3):43-64, 1996.Google Scholar
- D. Kundur and D. Hatzinakos. Semi-blind image restoration based on telltale watermarking. In Conference Record of the Thirty-Second Asilomar Conference on Signals, Systems and Computers , volume 2, 1998.Google Scholar
- D. Kundur and D. Hatzinakos. Digital watermarking for telltale tamper proofing and authentication. Proc. of the IEEE , 87(7), 1999.Google Scholar
- M. Kutter. Watermarking resisting to translation, rotation and scaling. In Multimedia Systems and Applications , volume Proc. SPIE-3528:423-431, 1998.Google Scholar
- M. Kutter. Performance improvement of spread spectrum based image watermarking schemes through M-ary modulation. In A. Pfitzmann, editor, Third Int. Workshop on Information Hiding , volume 1768 of Lecture Notes in Computer Science , pages 237-252, 1999. Google Scholar
- M. Kutter, S. K. Bhattacharjee, and T. Ebrahimi. Towards second generation watermarking systems. In IEEE Int. Conf. on Image Processing , volume 1, pages 320-323, 1999.Google Scholar
- M. Kutter and F. Hartung. Introduction to watermarking techniques. In S. Katzenbeisser and F. A. P. Petitcolas, editors, Information Hiding: Techniques for Steganography and Digital Watermarking , chapter 5, pages 97-120. Artech House, 2000.Google Scholar
- M. Kutter and F. A. P. Petitcolas. A fair benchmark for image watermarking systems. Security and Watermarking of Multimedia Contents , Proc. SPIE-3657:226-239, 1999.Google Scholar
- M. Kutter, S. Voloshynovskiy, and A. Herrigel. The watermark copy attack. Security and Watermarking of Multimedia Contents II , Proc. SPIE-3971:371-380, 2000.Google Scholar
- J. Lach, W. Mangione-Smith, and M. Potknojak. Fingerprinting digital circuits on programmable hardware. In Proc. of the 2nd Int. Information Hiding Workshop , pages 16-31, 1998.Google Scholar
- Jean Laroche and Mark Dolson. Improved phase vocoder time-scale modification of audio. IEEE Trans. Speech and Audio Proc. , 7(3):323-332, 1999.Google Scholar
- J. Le Moigne. Towards a parallel registration of multiple resolution remote sensing data. In Proc. of 1995 International Geoscience and Remote Sensing Symposium , pages 1011-1013, July 1995.Google Scholar
- Jaejin Lee and Chee Sun Won. Authentication and correction of digital watermarking images. Electronic Letters , 35(11), 1999.Google Scholar
- Jaejin Lee and Chee Sun Won. Image integrity and correction using parities of error control coding. In IEEE Int. Conf. on Multimedia and Expo, 2000 , volume 3, 2000.Google Scholar
- K. Lee, D. Kim, T. Kim, and K. Moon, EM estimation of scale factor for quantization-based audio watermarking. Int. Proc 2nd Workshop on Digital Watermarking , LCNS 2939: 316-327, 2003.Google Scholar
- K. Lee, A. Westfeld, and S. Lee. Category attack for LSB embedding of JPEG images. In Proceedings of the International Workshop on Digital Watermarking, LNCS Springer-Verlag , volume 4283, pages 35-38, 2006.Google Scholar
- Q. Li and I. J. Cox. Rational dither modulation watermarking using a perceptual model. In IEEE International Workshop on Multimedia Signal Processing (MMSP) , pages 1-4, 2005.Google Scholar
- Q. Li and I. J. Cox. Using perceptual models to improve fidelity and provide invariance to valumetric scaling for quantization index modulation watermarking. In IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP) , volume 2, pages 1-4, 2005.Google Scholar
- Te-shen Liang and Jeffrey J. Rodriguez. Robust watermarking using robust coefficients. Security and Watermarking of Multimedia Contents. II , SPIE-3971:326-335, 2000.Google Scholar
- C.-Y. Lin and S.-F. Chang. Semi-fragile watermarking for authenticating JPEG visual content. In Proc of SPIE, Security and Watermarking in Multimedia Contents II , volume 3971, 2000.Google Scholar
- C.-Y. Lin and Shih-Fu Chang. A robust image authentication algorithm surviving JPEG compression. Storage and Retireval of Image/Video Databases , SPIE-, 1998.Google Scholar
- C.-Y. Lin and Shih-Fu Chang. Issues and solutions for authenticating MPEG video. Security amd Watermarking of Multimedia Contents , Proc. SPIE-3657, 1999.Google Scholar
- C.-Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller, and Y. M. Lui. Rotation, scale and translation resilient public watermarking for images. Security and Watermarking of Multimedia Contents , Proc. SPIE-3971:90-98, 2000.Google Scholar
- Ching-Yung Lin and Shih-Fu Chang. Distortion modeling and invariant extraction for digital image print-and-scan process. Int. Symp. on Multimedia Information Processing , 1999.Google Scholar
- E. T. Lin, C. I. Podilchuk, and E. J. Delp. Detection of image alterations using semifragile watermarks. In Proc. SPIE Security and Watermarking of Multimedia Contents III , volume 3971, 152-163, 2000.Google Scholar
- F. Lin and R. D. Brandt. Towards absolute invariants of images under translation, rotation, and dilation. Pattern Recognition Letters , 14(5):369-379, 1993. Google Scholar
- T. Lindkvist. Fingerprinting Digital Document . Ph.D. thesis, Linköping University, 1999.Google Scholar
- J.P.M.G. Linnartz and J. C. Talstra. MPEG PTY-marks: Cheap detection of embedded copyright data in DVD-video. In Proceeding of ESORICS98 5th European Symposium on Research in Computer Security , 1998. Google Scholar
- J.P.M.G. Linnartz, A. C. C. Kalker, and G. F. Depovere. Modelling the false-alarm and missed detection rate for electronic watermarks. In D. Aucsmith, editor, Workshop on Information Hiding, Portland, OR , volume 1525 of Lecture Notes in Computer Science , pages 329-343. Springer, April, 15-17, 1998.Google Scholar
- J.P.M.G. Linnartz and Marten van Dijk. Analysis of the sensitivity attack against electronic watermarks in images. In Workshop on Information Hiding, Portland, OR , April, 15-17, 1998.Google Scholar
- J. Löfvenberg. Random Codes for Digital Fingerprinting . Ph.D. thesis, Linköping University, 1999.Google Scholar
- S. Low and N. Maxemchuk. Performance comparison of two text marking methods. IEEE Journal of Selected Areas in Communication , 16:561-572, 1998.Google Scholar
- Chun-Shien Lu, Hong-Yuan Mark Liao, Shih-Kun Huang, and Chwen-Jye Sze. Cocktail watermarking on images. In A. Pfitzmann, editor, Third Int. Workshop on Information Hiding , volume 1768 of Lecture Notes in Computer Science , pages 333-347, 1999. Google Scholar
- P. Lu, X. Luo, Q. Tang, and L. Shen. An improved sample pairs method for detection of LSB embedding. In J. Fridrich, editor, Information Hiding, 6th International Workshop , volume 3200 of LNCS , pages 116-127. Springer-Verlag, Berlin, 2004. Google Scholar
- J. Lubin. The use of psychophysical data and models in the analysis of display system performance. In A. B. Watson, editor, Digital Images and Human Vision , pages 163-178. MIT Press, 1993. Google Scholar
- M. Luby. LT codes. In Proceedings, 43rd Annual IEEE Symposium on Foundations of Computer Science, November 16-19, 2002 , pages 271-282, 2002. Google Scholar
- Bruce D. Lucas and Takeo Kanade. An iterative image registration technique with an application to stereo vision. Proc. International Joint Conference on Artificial Intelligence , pages 674-679, 1981. Google Scholar
- N. B. Lucena, S. J. Chapin, J. Pease, and P. Yadollahpour. Syntax and semantics-- preserving application-layer protocol steganography. In J. Fridrich, editor, Information Hiding, 6th International Workshop, Toronto, Canada, May 23-25, 2004 , volume 3200 of LNCS , pages 164-179, 2004. Google Scholar
- J. Luk¿, J. Fridrich, and M. Goljan. Digital camera identification from sensor noise. IEEE Transactions on Information Security and Forensics , 1(2), 2006.Google Scholar
- B. M. Macq and J-J. Quisquater. Cryptology for digital TV broadcasting. Proc. of the IEEE , 83(6):944-957, 1995.Google Scholar
- F. J. MacWilliams and Neil J. A. Sloane. Pseudo-random sequences and arrays. Proc. of the IEEE , 64(12):1715-1729, 1976.Google Scholar
- M.J.J.J.B. Maes and C.W.A.M. van Overveld. Digital watermarking by geometric warping. In IEEE Int. Conf. on Image Processing , volume 2, pages 424-426, 1998.Google Scholar
- J. L. Mannos and J. J. Sakrison. The effects of a visual fidelity criterion on the encoding of images. IEEE Trans. Inform. Theory , IT-4:525-536, 1974.Google Scholar
- Hedy Kiesler Markey and George Antheil. Secret communication system. Technical Report 2,292,387, United States Patent , 1942.Google Scholar
- L. Marks. Between Silk and Cyanide: A Codemaker's War, 1941-1945 . Free Press, 2000.Google Scholar
- Mathison. Gentlemen's Magazine , XLIX, 1779.Google Scholar
- J. Meng and S.-F. Chang. Embedding visible video watermarks in the compressed domain. In IEEE Int. Conf. on Image Processing , volume 1, pages 474-477, 1998.Google Scholar
- M. K. Mihcak, I. Kozintsev, K. Ramchandran, and P. Moulin. Low-complexity image denoising based on statistical modeling of wavelet coefficients. IEEE Signal Processing Letters , 6(12):300-303, December 1999.Google Scholar
- G. L. Miller, G. J. Doerr, and I. J. Cox. Dirty-paper trellis codes for watermarking. In IEEE Int. Conf. on Image Processing , volume 2, pages II-129-II-132, 2002.Google Scholar
- M. L. Miller and J. A. Bloom. Computing the probability of false watermark detection. In Proceedings of the Third International Workshop on Information Hiding , 1999. Google Scholar
- M. L. Miller, I. J. Cox, and J. A. Bloom. Informed embedding: Exploiting image and detector information during watermark insertion. In IEEE International Conference on Image Processing , September 2000.Google Scholar
- M. L. Miller, G. Doerr, and I. J. Cox. Applying informed coding and informed embedding to design a robust high capacity watermark. IEEE Trans. on Image Processing , 13(6), 2004.Google Scholar
- M. L. Miller, M. A. Rodriguez, and I. J. Cox. Audio fingerprinting: Nearest neighbor search in high-dimensional binary spaces. In IEEE Multimedia Signal Processing Workshop , pages 182-185, 2002.Google Scholar
- M. L. Miller, M. A. Rodriguez, and I. J. Cox. Audio fingerprinting: Nearest neighbor search in high-dimensional binary spaces. J. of VLSI Signal Processing , 2005. Google Scholar
- F. Mintzer, J. Lotspiech, and N. Morimoto. Safeguarding digital library contents and users: Digital watermarking. D-Lib Magazine , http://www.dlib.org/dlib/december97/ ibm/12lotspiech.html#FM2, 1997.Google Scholar
- S. P. Mohanty, K. R. Ramakrishnan, and M. S. Kankanhalli. A DCT domain visible watermarking technique for images. In IEEE Int. Conf. on Multimedia and Expo , volume 2, pages 1029-1032, 2000.Google Scholar
- Warren D. Moon, Richard J. Weiner, Robert A. Hansen, and Robert N. Linde. Broadcast signal identification system. United States Patent , 3,919,479, 1975.Google Scholar
- T. Moriya, Y. Takashima, T. Nakamura, and N. Iwakami. Digital watermarking schemes based on vector quantization. In Proc. of IEEE Workshop on Speech Coding for Telecommunications , pages 95-96, 1997.Google Scholar
- Ira S. Moskowitz and Li Wu Chang. An entropy-based framework for database inference. In Proc. of the 3rd Int. Information Hiding Workshop , 1999. Google Scholar
- P. Moulin and R. Koctter. Data-hiding. Proc. IEEE , 93(12), 2083-2127, 2005.Google Scholar
- P. Moulin, M. K. Mihcak, and G. I. Lin. An information-theoretic model for image watermarking and data hiding. In Proceedings ICIP'00, IEEE International Conference on Image Processing, Vancouver, Canada, September 2000 , 2000.Google Scholar
- P. Moulin and J. A. O'Sullivan. Information-theoretic analysis of information hiding. Preprint , available from http://www.ifp.uiuc.edu/moulin/Papers, 1999.Google Scholar
- P. Moulin, A. K. Cotetr, and Rko¿llcr. "Optimal" spare-QIM codes zero-rate blind watermarking. Proceedings of ICASSP , volume 3, 73-76, 2004.Google Scholar
- P. Moulin and J. A. O'Sullivan. Information-theoretic analysis of information hiding. IEEE Trans. Inform. Theory , 49(3):563-593, March 2003.Google Scholar
- P. Moulin and Y. Wang. New results on steganographic capacity. In Proceedings CISS Conference, Princeton, NJ, March 2004 , 2004.Google Scholar
- F. Müller. Distribution shape of two-dimensional DCT coefficients of natural images. Electronics Letters , 29(22):1935-1936, 1993.Google Scholar
- H. Murase and S. Nayar. Visual learning and recognition of 3D objects from appearance. Int. J. Computer Vision , 14(1):5-25, 1995. Google Scholar
- H. Muratani. A collusion-secure fingerprinting code reduced by Chinese remaindering and its random-error resilience. In Proceedings of Int. Workshop on Information Hiding '01 , 2001. Google Scholar
- National Institute of Standards and Technology. Digital signature standard. Technical Report NIST FIPS PUB 185, U.S. Department of Commerce, May 1994.Google Scholar
- H. Neuschmied, H. Mayer, and E. Battle. Content-based indentification of audio titles on the Internet. In Proc. Int. Conf. on Web Delivering of Music , 2001. Google Scholar
- Z. Ni, Y. Q. Shi, N. Ansari, and W. Su. Reversible data hiding. IEEE Transactions on Circuits Systems and Video Technology , 16(3):354-362, March 2006.Google Scholar
- H. Noda, M. Niimi, and E. Kawaguchi. Application of QIM with dead zone for histogram preserving JPEG steganography. In Proceedings ICIP, Genova, 2005 , 2005.Google Scholar
- R. Ohbochi, H. Masuda, and M. Aono. Watermarking three-dimensional polygonal models through geometric and topological modifications. IEEE Journal of Selected Areas in Communication , 16(4):551-560, 1998.Google Scholar
- J. Oostveen, T. Kalker, and J. Haitsma. Feature extraction and a database strategy for video fingerprinting. In 5th Int. Conf. on Visual Information Systems , volume LNCS 2314, pages 117-128. Springer-Verlag, 2002. Google Scholar
- J. C. Oostveen, A. A. C. Kalker, and M. Staring. Adaptive quantization watermarking. In Proc. of SPIE: Security, Steganography, and Watermarking of Multimedia Contents VI , volume 5306, pages 37-39, San Jose, CA. January 2004.Google Scholar
- Alan V. Oppenheim and Ronald W. Schafer. Digital Signal Processing . Prentice-Hall, 1975.Google Scholar
- J. J. K. Ó Ruanaidh, E. M. Boland, and W. J. Dowling. Phase watermarking of digital images. Proc. IEEE Int. Conf. on Image Processing , III:239-242, 1996.Google Scholar
- J. J. K. Ó Ruanaidh and T. Pun. Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Processing , 66(3):303-317, 1998. Google Scholar
- Ted Painter and Andreas Spanias. Perceptual coding of digital audio. Proc. IEEE , 88(4):451-513, 2000.Google Scholar
- H. C. Papadopoulos and C.-E.W. Sundberg. Simultaneous broadcasting of analog FM and digital audio signals by means of precanceling techniques. In IEEE Int. Conf. on Communications, ICC '98 , volume 2, pages 728-732, 1998.Google Scholar
- Athanasios Papoulis. Probability, Random Variables, and Stochastic Processes, third edition . McGraw-Hill, 1991.Google Scholar
- A. Patrizio. Why the dvd hack was a cinch. Wired , November 1999.Google Scholar
- W. B. Pennebaker and J. L. Mitchell. JPEG Still Image Data Compression Standard . Van Nostrand Reinhold, 1993. Google Scholar
- S. Pereira, J. J. K. Ó Ruanaidh, and T. Pun. Secure robust digital watermarking using the lapped othogonal transform. In SPIE Conf. on Security and Watermarking of Multimedia Content , volume SPIE 3657, pages 21-30, 1999.Google Scholar
- S. Pereira and T. Pun. Robust template matching for affine resistant image watermarks. IEEE Transactions on Image Processing , 9(6):1123-1129, 2000.Google Scholar
- S. Pereira, J. J. K. Ó Ruanaidh, F. Deguillaume, G. Csurka, and T. Pun. Template based recovery of Fourier-based watermarks using log-polar and log-log maps. In IEEE International Conference on Multimedia Computing and Systems , volume 1, pages 870-874, 1999. Google Scholar
- S. Pereira, S. Voloshynovskiy, and T. Pun. Effective channel coding for DCT watermarks. In IEEE Int. Conf. on Image Processing , volume 3, pages 671-673, 2000.Google Scholar
- F. Perez-Gonzalez, M. Barni, A. Abrardo, and C. Mosquera. Rational dither modulation: A novel data-hiding method robust to value-metric scaling attacks. In IEEE International Workshop on Multimedia Signal Processing , Siena, Italy, Sept. 2004.Google Scholar
- Fabian A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn. Attacks on copyright marking systems. In Workshop on Information Hiding, Portland, OR , April, 15-17, 1998. Google Scholar
- Fabien A. P. Petitcolas, Ross Anderson, and Markus G. Kuhn. Information hiding--a survey. Proc. IEEE , 87(7):1062-1077, 1999.Google Scholar
- T. Pevny and J. Fridrich. Multiclass blind steganalyasis for JPEG images. In E. Delp III and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII , 6072, 01-013, 2006.Google Scholar
- T. Pevny and J. Fridrich. Merging Markov and DCT features for multi-class JPEG steganalysis. In E. J. Delp and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX , volume 6505, pages 03-1-03-13, January 2007.Google Scholar
- R. L. Pickholtz, D. L. Schilling, and L. B. Milstein. Theory of spread-spectrum communications--a tutorial. IEEE Trans. on Communications , 30(5):855-884, 1982.Google Scholar
- S. Pietrobon, R. Deng, A. Lafanechere, G. Ungerboeck, and D. Costello. Trellis-coded multidimensional phase modulation. IEEE Transactions on Information Theory , 36:6389, 1990.Google Scholar
- Playboy magazine. Playboy Enterprises International, Inc., November 1972.Google Scholar
- Christine I. Podilchuk and Wenjun Zeng. Image-adaptive watermarking using visual models. IEEE Journal of Selected Areas in Communication , 16(4):525-539, 1998.Google Scholar
- William H. Press, Saul A. Teukolsky, William T. Vetterling, and Brian P. Flannery. Numerical Recipes in C: The Art of Scientific Computing . Cambridge University Press, 1992. Google Scholar
- R. D. Preuss, S. E. Roukos, A. W. F. Huggins, H. Gish, M. A. Bergamo, P. M. Peterson, and Derr A. G. Embedded signalling. United States Patent , 5,319,735, 1994.Google Scholar
- N. Provos. Defending against statistical steganalysis. In 10th USENIX Security Symposium, Washington, DC , 2001. Google Scholar
- N. Provos and P. Honeyman. Detecting steganographic content on the Internet. Technical Report 01-11, CITI, August 2001.Google Scholar
- L. Qiao and K. Nahrstedt. Non-invertible watermarking methods for MPEG encoded audio. In Proc. SPIE Conf. on Security and Watermarking of Multimedia Data , volume 3657, pages 194-203, 1999.Google Scholar
- R. Radhakrishnan, M. Kharrazi, and N. Memon. Data masking a new approach for data hiding? Journal of VLSI Signal Processing Systems , 41(3):293-303, November 2005. Google Scholar
- H. A. Rahmel. System for determining the listen habits of wave signal receiver users. United States Patent , 2,513,360, 1950.Google Scholar
- M. Ramkumar. Data Hiding in Multimedia: Theory and Applications . Ph.D. thesis, New Jersey Institute of Technology, 1999.Google Scholar
- Chris Reidy. Knocking off the knockoff. The Boston Globe , page D1, November 17, 2000.Google Scholar
- R. C. Reininger and J. D. Gibson. Distribution of the two-dimensional DCT coefficients for images. IEEE Trans. on Comm. , 31(6):835-839, 1983.Google Scholar
- Christian Rey and Jean-Luc Dugelay. Blind detection of malicious alterations on still images using robust watermarks. IEE Seminar: Secure Images and Image Authentication , pages 7/1-7/6, 2000.Google Scholar
- Geoffrey B. Rhoads. Image steganography system featuring perceptually adaptive and globally scalable signal embedding. United States Patent , 5,748,763, 1998.Google Scholar
- Geoffrey B. Rhoads. Steganography system. United States Patent , 5,850,481, 1998.Google Scholar
- R. L. Rivest. RFC 1321: The MD5 Message-Digest Algorithm. Internet Activities Board , 1992. Google Scholar
- R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptsystems. Communications of the ACM , 21(2):120-126, 1978. Google Scholar
- P. M. J. Rongen, M.J.J.J.B. Maes, and C.W.A.M. van Overveld. Digital image watermarking by salient point modification practical results. In SPIE Conf. on Security and Watermarking of Multimedia Content , volume 3657, pages 273-282, 1999.Google Scholar
- C. B. Rorabaugh. Error Coding Cookbook: Practical C/C++ Routines and Recipes for Error Detection and Correction . McGraw-Hill, 1996. Google Scholar
- H. L. Royden. Real Analysis . MacMillan Publishing Co., 1968.Google Scholar
- D. L. Ruderman and W. Bialek. Statistics of natural images: Scaling in the woods. Physics Review Letters , 73:814-817, 1994.Google Scholar
- J. Ryan. Method and apparatus for preventing the copying of a video program. United States Patent , 4,907,093, 1990.Google Scholar
- Screen Actors Guild. http://www.sag.org/pressreleases/prla990826spotchecks.html, 1999.Google Scholar
- P. Sallee. Model-based steganography. In T. Kalker, I. J. Cox, and Y. M. Ro, editors, Digital Watermarking, 2nd International Workshop, IWDW 2003, Seoul, Korea, October 20-20, 2003 , volume 2939 of LNCS , pages 154-167. Springer-Verlag, New York, 2004.Google Scholar
- D. V. Sarwate and M.-B. Pursley. Cross-correlation properties of pseudo-random and related sequences. Proc. of the IEEE , 688(5):593-619, 1980.Google Scholar
- K. Sayood. Introduction to Data Compression, second edition . Morgan Kaufmann, 2000. Google Scholar
- E. Sayrol, J. Vidal, S. Cabanillas, and S. Santamaria. Optimum watermark detection for color images. In IEEE Int. Conf. on Image Processing , volume 2, pages 231-235, 1999.Google Scholar
- M. Schneider and S.-F. Chang. A robust content based digital signature for image authentication. In IEEE Int. Conf. on Image Processing , volume 3, pages 227-230, 1996.Google Scholar
- Bruce Schneier. Applied Cryptography . John Wiley & Sons, 1996.Google Scholar
- Leonard Schuchman. Dither signals and their effect on quantization noise. IEEE Trans. Comm. Tech. , 12:162-165, 1964.Google Scholar
- SDMI Portable Device Specification--Part 1, Version 1.0. Technical Report pdwg99070802, Secure Digital Music Initiative, 1999.Google Scholar
- C. E. Shannon. Communications theory of secrecy systems. Bell Systems Technical Journal , 28(4):656-715, October 1949.Google Scholar
- C. E. Shannon. Channels with side information at the transmitter. IBM Journal of Research and Development , pages 289-293, 1958. Google Scholar
- T. Sharp. An implementation of key-based digital signal steganography. In I. S. Moskowitz, editor, Information Hiding, 4th International Workshop, IHW 2001, Pittsburgh, PA, April 25-27, 2001 , volume 2137 of LNCS , pages 13-26. Springer-Verlag, New York, 2001. Google Scholar
- Y. Sheng and H. H. Arsenault. Experiments on pattern recognition using invariant Fourier-Mellin descriptors. J. Opt. Soc. Am. A , 3:771-776, 1986.Google Scholar
- Y. Sheng and J. Duvernoy. Circular-Fourier-Radial-Mellin transform descriptors for pattern recognition. J. Opt. Soc. Am. A , 3:885-888, 1986.Google Scholar
- Y. Q. Shi, C. Chen, and W. Chen. A Markov process based approach to effective attacking JPEG steganography. In N. Johnson and J. Camenisch, editors, Information Hiding, 8th International Workshop , volume 4437 of Lecture Notes in Computer Science . Springer-Verlag, New York, 2006. Google Scholar
- I. D. Shterev and R. L. Legendijk, Amplitude scale estimation for quantization-based water marking. IEEE Trans. on Signal Processing , 54(11):4146-4155, 2006.Google Scholar
- I. D. Shterev, R. L. Legendijk, and R. Hesdens, Statistical amplitude scale estmation for quantization-based watermarking. Proc. SPIE Security, Steganography and Watermarking of Multimedia Contents VI , volume 5306, 2004.Google Scholar
- M. Sidorov. Hidden markov models and steganalysis. In Proceedings ACM Multimedia and Security Workshop, Magdeburg, Germany, September 20-21, 2004 , pages 63-67, 2004. Google Scholar
- G. Simmons. A Survey of information authentication. Contemporary Cyptography, The Science of Information Integrity . IEEE Press, 1992.Google Scholar
- Gustavus J. Simmons. The prisoner's problem and the subliminal channel. In D. Chaum, editor, Advances in Cryptology--CRYPTO 83 , pages 51-67. Plenum Press, 1983. Google Scholar
- Gustavus J. Simmons. The history of subliminal channels. In Ross Anderson, editor, Information Hiding: First International Workshop , volume 1174 of Lecture Notes in Computer Science , pages 237-256. Springer, 1996. Google Scholar
- Eero P. Simoncelli. Statistical models for images: Compression, restoration and synthesis. Thirty-First Asilomar Conf. on Signals, Systems, and Computers , pages 673-678, 1997.Google Scholar
- J. Simpson and E. Weiner, editors. Oxford English Dictionary . Oxford University Press, 2000.Google Scholar
- W. D. Smith. Studies in Computational Geometry Motivated by Mesh Generation . Ph.D. thesis, Princeton University, 1988. Google Scholar
- V. Solachidis, N. Nikolaidis, and I. Pitas. Watermarking polygonal lines using fourier descriptors. IEEE Int. Conf. on Image Processing , 4:1955-1958, 2000. Google Scholar
- K. Solanki, K. Sullivan, U. Madhow, B. S. Manjunath, and S. Chandrasekaran. Provably secure steganography: Achieving zero K-L divergence using statistical restoration. In Proceedings ICIP, Atlanta, GA , October 2006.Google Scholar
- D. Soukal, J. Fridrich, and M. Goljan. Maximum likelihood estimation of secret message length embedded using PMK steganography in spatial domain. In Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, January 16-20, 2005 , volume 5681, pages 595-606, 2005.Google Scholar
- M. R. Spiegel. Schaum's Outline of Theory and Problems of Statistics, third edition . McGraw-Hill, New York, 1961.Google Scholar
- J. Stach and A. M. Alattar. A high-capacity invertible data-hiding algorithm using a generalized reversible integer transform. In E. Delp III, editor, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI , volume 5306, pages 386-396, January 2003.Google Scholar
- J. P. Stern, G. Hachez, F. Koeune, and J. J. Quisquater. Robust object watermarking: Application to code. In Proceedings of Info Hiding '99 , volume 1768, Lecture Notes in Computer Science , pages 368-378, 1999. Google Scholar
- G. W. W. Stevens. Microphotography and Photofabrication at Extreme Resolutions . Chapman & Hall, London, 1968.Google Scholar
- D. R. Stinson. Cryptography: Theory and Practice . CRC Press, 1995. Google Scholar
- T. G. Stockham. Image processing in the context of a visual model. Proc. IEEE , 60(7):828-841, 1972.Google Scholar
- H. S. Stone. Analysis of attacks on image watermarks with randomized coefficients. Technical Report TR 96-045, NEC Research Institute, 1996.Google Scholar
- H. S. Stone. Progressive wavelet correlation using Fourier methods. IEEE Transactions on Signal Processing , 47(1):97-107, Jan. 1999.Google Scholar
- D. Storck. A new approach to integrity of digital images. In IFIP Conf. on Mobile Communication , 1996.Google Scholar
- J. K. Su and B. Girod. On the imperceptibility and robustness of digital fingerprints. Proc. IEEE Int. Conf. Multimedia Computing and Systems , 2:530-535, 1999. Google Scholar
- J. K. Su and B. Girod. Power-spectrum condition for energy-efficient watermarking. In IEEE Int. Conf. on Image Processing , volume 1, pages 301-305, 1999.Google Scholar
- K. Sullivan, U. Madhow, B. S. Manjunath, and S. Chandrasekaran. Steganalysis for Markov cover data with applications to images. In IEEE Transactions on Information Security and Forensics , 1(2): 275-287, 2006.Google Scholar
- M. D. Swanson, B. Zhu, and A. H. Tewfik. Transparent robust image watermarking. In Proc. IEEE Int. Conf. on Image Processing , volume 3, pages 211-214, 1996.Google Scholar
- M. D. Swanson, B. Zhu, and A. H. Tewfik. Data hiding for video-in-video. In Proc. IEEE Int. Conf. on Image Processing , volume 2, pages 676-679, 1997.Google Scholar
- M. D. Swanson, B. Zhu, A. H. Tewfik, and L. Boney. Robust audio watermarking using perceptual masking. Signal Processing , 66(3):337-355, 1998. Google Scholar
- W. Szepanski. A signal theoretic method for creating forgery-proof documents for automatic verification. In J. S. Jackson, editor, 1979 Carnahan Conf. on Crime Countermeasures , pages 101-109, 1979.Google Scholar
- A. Tacticius. How to Survive Under Siege/Aineas the Tactician . Clarendon ancient history series, 1990.Google Scholar
- K. Tanaka, Y. Nakamura, and K. Matsui. In Military Communications Conference, 1990. MILCOM '90, Conference Record, A New Era. 1990 IEEE , volume 1, pages 216-220, 1990.Google Scholar
- G. Tardos, Optimal probabilistic fingerprint codes. Annual ACM Symposium on Theory of Computing STOC , pages 116-125, 2003. Google Scholar
- J. Taylor. DVD Demystified . McGraw-Hill, 1998. Google Scholar
- M. M. Taylor. Visual discrimination and orientation. J. Opt. Soc. Am. A , 53:763-765, 1963.Google Scholar
- A. Tefas and I. Pitas. Multi-bit image watermarking robust to geometric distortions. In IEEE Int. Conf. on Image Processing , volume 3, pages 710-713, 2000.Google Scholar
- Telecommunications Act of 1996, Implementation of Section 305.Google Scholar
- Telecommunications Act of 1996, United States Public Law 104-104.Google Scholar
- E. Terhardt. Calculating virtual pitch. Hearing Research , 1:155-182, 1979.Google Scholar
- J. Tian. Wavelet-based reversible date-embedding using a difference expansion. IEEE Transactions on Circuit Systems and Video Technology , 13(8):890-896, August 2003.Google Scholar
- A. Z. Tirkel, C. F. Osbourne, and T. E. Hall. Image and watermark registration. Signal Processing , 66(3):373-383, 1998. Google Scholar
- W. Trappe, M. Wu, Z. J. Wang and K. J. R. Liu. Anti-collusion fingerprinting for multimedia. IEEE Transactions Signal Processing , 51(4):1069-1087, 2003.Google Scholar
- William M. Tomberlin, Louis G. MacKenzie, and Paul K. Bennett. System for transmitting and receiving coded entertainment programs. United States Patent , 2,630,525, 1953.Google Scholar
- B. S. Tsybakov. Defect and error correction. Probl. Pered. Inform. , 11:21-30, July-September 1975. Translated from Russian.Google Scholar
- R. Tzschoppe, R. Buml, J. B. Huber, and A. Kaup. Steganographic system based on higher-order statistics. In E. Delp, et al., editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, 2003 , volume 5020, pages 156-166, 2003.Google Scholar
- S. Ullman and R. Basri. Recognition by linear combinations of models. IEEE Trans. Pattern Analysis and Machine Intelligence , 13(10):992-1006, 1991. Google Scholar
- G. Ungerboeck. Channel coding with multilevel/phase signals. IEEE Transactions on Information Theory , IT-28:55-67, 1982.Google Scholar
- United States Code, Title 17.Google Scholar
- Christian J. van den Branden Lambrecht and Joyce E. Farrell. Perceptual quality metric for digitally coded color images. Proc. EUSIPCO , pages 1175-1178, 1996.Google Scholar
- M. van der Veen, A. van Leest, and F. Bruekers. High capacity reversible watermarking for audio. In E. Delp, et al., editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V , volume 5020, pages 1-11, January 2003.Google Scholar
- M. van Dijik and F. Willems. Embedding information in grayscale images. In Proceedings of the 22nd Symposium on Information and Communication Theory in the Benelux, Enschede, The Netherlands, May 15-16, 2001 , pages 147-154, 2001.Google Scholar
- A. van Leest, M. van der Veen, and F. Bruekers. Reversible watermarking for images. In E. Delp, et al., editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI , volume 5306, pages 374-385, January 2003.Google Scholar
- R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne. A digital watermark. In Int. Conf. on Image Processing , volume 2, pages 86-90. IEEE, 1994.Google Scholar
- R. G. van Schyndel, A. Z. Tirkel, and I. D. Svalbe. Key independent watermark detection. In Proc. International Conference on Multimedia Computing and Systems , pages 580-585. IEEE, 1999. Google Scholar
- R. G. van Schyndel, A. Z. Tirkel, I. D. Svalbe, T. E. Hall, and C. F. Osborne. Algebraic construction of a new class of quasi-orthogonal arrays in steganography. In Proc. of SPIE on Security and Watermarking of Multimedia Contents , volume 3657, pages 354-364, 1999.Google Scholar
- V. N. Vapnik. The Nature of Statistical Learning Theory . Springer-Verlag, New York, 1995. Google Scholar
- Paul Viola and William M. Wells III. Alignment by maximization of mutual information. Int. J. Computer Vision , 24(2):137-154, 1997. Google Scholar
- B. Vasudev and V. Ratnakar, Fragile watermarks for detecting tampering in images. United States Patent , 6,064,764, 2000.Google Scholar
- A. J. Viterbi. CDMA: Principles of Spread Spectrum Communications . Addison Wesley Longman Inc., 1995. Google Scholar
- C. D. Vleeschouwer, J. F. Delaigle, and B. Macq. Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Transactions on Multimedia , 5(1):97-105, March 2003.Google Scholar
- S. Voloshynovskiy, A. Herrigel, N. Baumgaetner, and T. Pun. A stochastic approach to content adaptive digital image watermarking. In Third International Workshop on Information Hiding , 1999. Google Scholar
- L. von Ahn and N. Hopper. Public-key steganography. In Advances in Cryptology: Proceedings of EUROCRYPT, Interlaken, Switzerland, May 2-6 , volume 3027 of LNCS , pages 323-341. Springer-Verlag, Heidelberg, 2004.Google Scholar
- Martin J. Wainwright and Eero P. Simoncelli. Scale mixtures of Gaussians and the statistics of natural images. In S. A. Solla, T. K. Leen, and K. R. Müller, editors, Advances in Neural Information Processing Systems 12 , pages 855-861. MIT Press, 2000.Google Scholar
- C. Walker. Personal communication, June 2000.Google Scholar
- C. Wang, G. Doerr, and I. J. Cox. Trellis coded modulation to improve dirty paper trellis watermarking. In SPIE Proceedings on Security, Steganography and Watermarking of Multimedia Contents IX , 2007.Google Scholar
- S.-G. Wang and K. T. Knox. Embedding digital watermarks in halftone screens. In Proc. SPIE Conf. on Security and Watermarking of Multimedia Data , volume 3971, pages 218-227, 2000.Google Scholar
- X. Wang, S. Chen, and S. Jajodia. Tracking anonymous peer-to-peer VoIP calls on the Internet. In 12th ACM Conf. on Computer and Communications Security , pages 81-91, 2005. Google Scholar
- Y. Wang and P. Moulin. Steganalysis of block-structured stegotext. In Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Content VI, San Jose, CA, January 19-22, 2004 , volume 5306, pages 477-488, 2004.Google Scholar
- A. B. Watson, G. Y. Yang, J. A. Solomon, and J. Villasenor. Visual thresholds for wavelet quantization error. Human Vision and Electronic Imaging , SPIE-2657:381-392, 1996.Google Scholar
- Andrew B. Watson. DCT quantization matrices optimized for individual images. Human Vision, Visual Processing, and Digital Display IV , SPIE-1913:202-216, 1993.Google Scholar
- Andrew B. Watson, editor. Digital Images and Human Vision . MIT Press, 1993. Google Scholar
- P. Wayner. Mimic functions. CRYPTOLOGIA , 16(3):193-214, July 1992. Google Scholar
- P. Wayner. Disappearing Cryptology , second edition . Morgan Kaufmann, San Francisco, 2002.Google Scholar
- A. Westfeld. High capacity despite better steganalysis (F5--a steganographic algorithm). In I. S. Moskowitz, editor, Information Hiding, 4th International Workshop , volume 2137 of LNCS , pages 289-302. Springer-Verlag, New York, 2001. Google Scholar
- A. Westfeld. Detecting low embedding rates. In F. A. P. Petitcolas, editor, Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002 , volume 2578 of LNCS , pages 324-339. Springer-Verlag, Berlin, 2002. Google Scholar
- A. Westfeld and A. Pfitzmann. Attacks on steganographic systems. In A. Pfitzmann, editor, Information Hiding, 3rd International Workshop, IH'99, Dresden, Germany, September 29-October 1, 1999 , volume 1768 of LNCS , pages 61-75. Springer-Verlag, New York, 2000. Google Scholar
- B. Widrow. Statistical analysis of amplitude-quantized sample-data systems. Trans. AIEE (Applications and Industry) , 79:555-568, 1960 (Jan. 1961 section).Google Scholar
- E. H. Wilkins. A History of Italian Literature . Oxford University Press, London, 1954.Google Scholar
- Raymond B. Wolfgang and Edward J. Delp. A watermark for digital images. In Proceedings of the 1996 International Conference on Image Processing , volume 3, pages 219-222, 1996.Google Scholar
- Raymond B. Wolfgang, C. I. Podilchuk, and E. J. Delp. Perceptual watermarks for digital images and video. Proc. of the IEEE , 87(7):1108-1126, 1999.Google Scholar
- Ping Wah Wong. A public key watermark for image verification and authentication. In IEEE Int. Conf. on Image Processing , volume 1, 1998.Google Scholar
- Ping Wah Wong and Edward J. Delp, editors. Security and Watermarking of Multimedia Contents , volume 3657. Society of Photo-optical Instrumentation Engineers, 1999.Google Scholar
- Ping Wah Wong and Edward J. Delp, editors. Security and Watermarking of Multimedia Contents II , volume 3971. Society of Photo-optical Instrumentation Engineers, 2000. Google Scholar
- Chung-Ping Wu, Po-Chyi Su, and C.-C. Jay Kuo. Robust and efficient digital audio watermarking using audio content analysis. Security and Watermarking of Multimedia Contents , Proc. SPIE-3971:382-392, 2000.Google Scholar
- M. Wu, E. Tang, and B. Liu. Data hiding in digital binary images. IEEE International Conference on Multimedia & Expo (ICME) , 2000.Google Scholar
- Min Wu and Bede Liu. Watermarking for image authentication. In IEEE Int. Conf. on Image Processing , volume 2, pages 437-441, 1998.Google Scholar
- R. Wu and H. Stark. Rotation-invarint pattern recognition suing optimum feature extraction. Applied Optics , 24:179-184, 1985.Google Scholar
- A. D. Wyner and J. Ziff. The rate distortion function for source coding with side information at the decoder. IEEE Trans. Inform. Theory , 22:1-10, 1976.Google Scholar
- Changsheng Xu, Jiankang Wu, and Qibin Sun. Audio registration and its application to digital watermarking. Security and Watermarking of Multimedia Contents , Proc. SPIE-3971:393-401, 2000.Google Scholar
- G. Xuan, Y. Q. Shi, J. Gao, D. Zou, C. Yang, Z. Zhang, P. Chai, C. Chen, and W. Chen. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In Proceedings 7th Information Hiding Workshop, Barcelona, Spain, June 6-8, 2005 , 2005.Google Scholar
- G. Xuan, Q. Yao, C. Yang, J. Gao, P. Chai, Y. Q. Shi, and Z. Ni. Lossless data hiding using histogram shifting method based on integer wavelets. Proc. Int. Workshop on Digital Watermarking, volume 4283, pages 323-332, November 2006.Google Scholar
- W. S. E. Yang and W. Sun. On information embedding when watermarks and covertexts are correlated. In IEEE International Symposium on Information Theory , pages 346-350, 2006.Google Scholar
- Nakajima Yasumasa, Ichihara Shintaro, and Mogami Kazuto. Digital camera and image authentication system using the same. Japanese Patent , JP 11215452, 1999.Google Scholar
- B.-L. Yeo and M. M. Yeung. Watermarking 3D objects for verification. IEEE Computer Graphics and Applications , 19(1):36-45, 1999. Google Scholar
- M. Yeung and F. Mintzer. An invisible watermarking technique for image verification. In Proc. Int. Conf. Image Processing , volume 1, pages 680-683, 1997.Google Scholar
- Gwo-Jong Yu, Chun-Shien Lu, H. Y. M. Liao, and Jang-Ping Sheu. Mean quantization blind watermarking for image authentication. In IEEE Int. Conf. on Image Processing , volume 3, pages 706-709, 2000.Google Scholar
- X. Yu, Y. Wang, and T. Tan. On estimation of secret message length in J-steg-like steganography. In Proceedings, International Conference on Pattern Recognition, Cambridge, UK, August 23-26, 2004 , volume 4, pages 673-676, 2004. Google Scholar
- R. Zamir, S. Shamai, and U. Erez. Nested linear/lattice codes for structured multiterminal binning. IEEE Transactions on Information Theory , 48(6):1250-1276, 2002.Google Scholar
- Q. Zhang and N. Boston. Quantization index modulation using E8 lattice. In Proceedings of the Annual Allerton Conference on Communication Control and Computing , volume 41, pages 488-489, 2003.Google Scholar
- T. Zhang and X. Ping. A fast and effective steganalytic technique against jsteg-like algorithms. In Proceedings, Symposium on Applied Computing, Melbourne, FL , pages 307-311, 2003. Google Scholar
- T. Zhang and X. Ping. A new approach to reliable detection of LSB steganography in natural images. Signal Processing , 83(10):2085-2094, 2003. Google Scholar
- Bin Zhu and A. H. Tewfik. Media compression via data hiding. Thirty-First Asilomar Conf. on Signals, Systems, and Computers , pages 647-651, 1997.Google Scholar
Cited By
- Qi S, Zhang Y, Wang C, Xiang T, Cao X and Xiang Y (2024). Representing Noisy Image Without Denoising, IEEE Transactions on Pattern Analysis and Machine Intelligence, 46:10, (6713-6730), Online publication date: 1-Oct-2024.
- Abdulla A (2024). Digital image steganography: challenges, investigation, and recommendation for the future direction, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 28:15-16, (8963-8976), Online publication date: 1-Aug-2024.
- Kong W, Zhou L, Chen Y, Dong Z and Wu H Reducing Embedding Distortion for Palette Steganography by Dynamic Programming Proceedings of the 2024 12th International Conference on Communications and Broadband Networking, (115-122)
- Luo Y, Zhou T, Cui S, Ye Y, Liu F and Cai Z (2024). Fixing the Double Agent Vulnerability of Deep Watermarking: A Patch-Level Solution Against Artwork Plagiarism, IEEE Transactions on Circuits and Systems for Video Technology, 34:3, (1670-1683), Online publication date: 1-Mar-2024.
- Zhang X, Chen K, Ding J, Yang Y, Zhang W and Yu N (2024). Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography, IEEE Transactions on Information Forensics and Security, 19, (3148-3163), Online publication date: 1-Jan-2024.
- Xue Y, Wu J, Ji R, Zhong P, Wen J and Peng W (2024). Adaptive Domain-Invariant Feature Extraction for Cross-Domain Linguistic Steganalysis, IEEE Transactions on Information Forensics and Security, 19, (920-933), Online publication date: 1-Jan-2024.
- Yu J, Zhang X, Xu Y and Zhang J CRoSS Proceedings of the 37th International Conference on Neural Information Processing Systems, (80730-80743)
- Wen Y, Kirchenbauer J, Geiping J and Goldstein T Tree-rings watermarks Proceedings of the 37th International Conference on Neural Information Processing Systems, (58047-58063)
- Chen S, Malik A, Zhang X, Feng G and Wu H (2023). A Fast Method for Robust Video Watermarking Based on Zernike Moments, IEEE Transactions on Circuits and Systems for Video Technology, 33:12, (7342-7353), Online publication date: 1-Dec-2023.
- van Rensburg B, Puteaux P, Puech W and Pedeboy J (2023). 3D Object Watermarking from Data Hiding in the Homomorphic Encrypted Domain, ACM Transactions on Multimedia Computing, Communications, and Applications, 19:5s, (1-20), Online publication date: 31-Oct-2023.
- Ge S, Xia Z, Fei J, Tong Y, Weng J and Li M (2023). A robust document image watermarking scheme using deep neural network, Multimedia Tools and Applications, 82:25, (38589-38612), Online publication date: 1-Oct-2023.
- Qi S, Zhang Y, Wang C, Zhou J and Cao X (2023). A Principled Design of Image Representation: Towards Forensic Tasks, IEEE Transactions on Pattern Analysis and Machine Intelligence, 45:5, (5337-5354), Online publication date: 1-May-2023.
- Xiao M, Li X, Zhao Y, Ma B and Guo G (2022). A Novel Reversible Data Hiding Scheme Based on Pixel-Residual Histogram, ACM Transactions on Multimedia Computing, Communications, and Applications, 19:1s, (1-19), Online publication date: 28-Feb-2023.
- Zhou H, Zhang W, Chen K, Li W and Yu N (2022). Three-Dimensional Mesh Steganography and Steganalysis: A Review, IEEE Transactions on Visualization and Computer Graphics, 28:12, (5006-5025), Online publication date: 1-Dec-2022.
- Chen H, Song L, Qian Z, Zhang X and Ma K Hiding images in deep probabilistic models Proceedings of the 36th International Conference on Neural Information Processing Systems, (36776-36788)
- Tang L, Xie J and Wu D (2022). An interval type-2 fuzzy edge detection and matrix coding approach for color image adaptive steganography, Multimedia Tools and Applications, 81:27, (39145-39167), Online publication date: 1-Nov-2022.
- Maiti C and Dhara B (2022). A blind audio watermarking based on singular value decomposition and quantization, International Journal of Speech Technology, 25:3, (759-771), Online publication date: 1-Sep-2022.
- Sinhal R and Ansari I (2022). Multipurpose Image Watermarking: Ownership Check, Tamper Detection and Self-recovery, Circuits, Systems, and Signal Processing, 41:6, (3199-3221), Online publication date: 1-Jun-2022.
- Abdelwahab K, El-atty S, Brisha A and Abd El-Samie F (2022). Efficient cancelable speaker identification system based on a hybrid structure of DWT and SVD, International Journal of Speech Technology, 25:1, (279-288), Online publication date: 1-Mar-2022.
- Li C, Zhang P and Wang C (2022). Harmonious Textual Layout Generation Over Natural Images via Deep Aesthetics Learning, IEEE Transactions on Multimedia, 24, (3416-3428), Online publication date: 1-Jan-2022.
- Kuznetsov A and Kononchenko A Message Concealing in Vector Images 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), (465-470)
- Li S, Xue M, Zhao B, Zhu H and Zhang X (2021). Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization, IEEE Transactions on Dependable and Secure Computing, 18:5, (2088-2105), Online publication date: 1-Sep-2021.
- Tang L, Wu D, Wang H, Chen M and Xie J (2021). An adaptive fuzzy inference approach for color image steganography, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 25:16, (10987-11004), Online publication date: 1-Aug-2021.
- Liu G, Wu H and Zhang X Covert Communication via Modulating Soft Label of Neural Network Artificial Intelligence and Security, (349-359)
- Tran V, Jayatilaka G, Ashok A and Misra A DeepLight Proceedings of the 20th International Conference on Information Processing in Sensor Networks (co-located with CPS-IoT Week 2021), (238-253)
- Begum M and Uddin M (2021). Implementation of Secured and Robust DFT-Based Image Watermark Through Hybridization with Decomposition Algorithm, SN Computer Science, 2:3, Online publication date: 1-May-2021.
- Mosleh M, Setayeshi S, Barekatain B and Mosleh M (2021). A novel audio watermarking scheme based on fuzzy inference system in DCT domain, Multimedia Tools and Applications, 80:13, (20423-20447), Online publication date: 1-May-2021.
- Geetha R and Geetha S (2021). A multi-layered “plus-minus one” reversible data embedding scheme, Multimedia Tools and Applications, 80:9, (14123-14136), Online publication date: 1-Apr-2021.
- Mastorakis S, Zhong X, Huang P and Tourani R DLWIoT: Deep Learning-based Watermarking for Authorized IoT Onboarding 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), (1-7)
- Hu R and Xiang S (2020). Cover-Lossless Robust Image Watermarking Against Geometric Deformations, IEEE Transactions on Image Processing, 30, (318-331), Online publication date: 1-Jan-2021.
- Khare P and Srivastava V (2021). A reliable and secure image watermarking algorithm using homomorphic transform in DWT domain, Multidimensional Systems and Signal Processing, 32:1, (131-160), Online publication date: 1-Jan-2021.
- Su A, He X and Zhao X (2020). JPEG steganalysis based on ResNeXt with Gauss partial derivative filters, Multimedia Tools and Applications, 80:3, (3349-3366), Online publication date: 1-Jan-2021.
- Zhang C, Benz P, Karjauv A, Sun G and Kweon I UDH Proceedings of the 34th International Conference on Neural Information Processing Systems, (10223-10234)
- Gruber S, Neumayr B, Fabianek C, Gringinger E, Schuetz C and Schrefl M Towards Informed Watermarking of Personal Health Sensor Data for Data Leakage Detection Digital Forensics and Watermarking, (109-124)
- Meenakshi K, Swaraja K and Kora P (2020). A hybrid matrix factorization technique to free the watermarking scheme from false positive and negative problems, Multimedia Tools and Applications, 79:39-40, (29865-29900), Online publication date: 1-Oct-2020.
- Wang H, Ho A and Li S OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework Computer Security, (243-260)
- Tundis A, Mukherjee G and Mühlhäuser M Mixed-code text analysis for the detection of online hidden propaganda Proceedings of the 15th International Conference on Availability, Reliability and Security, (1-7)
- Yin Z, Ji Y and Luo B (2020). Reversible Data Hiding in JPEG Images With Multi-Objective Optimization, IEEE Transactions on Circuits and Systems for Video Technology, 30:8, (2343-2352), Online publication date: 1-Aug-2020.
- Qi W, Li X, Zhang T and Guo Z (2020). Optimal Reversible Data Hiding Scheme Based on Multiple Histograms Modification, IEEE Transactions on Circuits and Systems for Video Technology, 30:8, (2300-2312), Online publication date: 1-Aug-2020.
- Roy A and Chakraborty R (2020). Toward Optimal Prediction Error Expansion-Based Reversible Image Watermarking, IEEE Transactions on Circuits and Systems for Video Technology, 30:8, (2377-2390), Online publication date: 1-Aug-2020.
- Hurrah N, Parah S and Sheikh J (2020). Embedding in medical images: an efficient scheme for authentication and tamper localization, Multimedia Tools and Applications, 79:29-30, (21441-21470), Online publication date: 1-Aug-2020.
- Gaj S, Sur A and Bora P (2020). Prediction mode based H.265/HEVC video watermarking resisting re-compression attack, Multimedia Tools and Applications, 79:25-26, (18089-18119), Online publication date: 1-Jul-2020.
- Gourrame K, Douzi H, Harba R, Rabia R, Ros F and ElHajji M Image Watermarking Based on Fourier-Mellin Transform Image and Signal Processing, (348-356)
- Geetha R and Geetha S (2020). Embedding electronic patient information in clinical images: an improved and efficient reversible data hiding technique, Multimedia Tools and Applications, 79:19-20, (12869-12890), Online publication date: 1-May-2020.
- Feng B, Li X, Jie Y, Guo C and Fu H (2019). A Novel Semi-fragile Digital Watermarking Scheme for Scrambled Image Authentication and Restoration, Mobile Networks and Applications, 25:1, (82-94), Online publication date: 1-Feb-2020.
- Ferreira F and Lima J (2019). A robust 3D point cloud watermarking method based on the graph Fourier transform, Multimedia Tools and Applications, 79:3-4, (1921-1950), Online publication date: 1-Jan-2020.
- Hatoum M, Darazi R and Couchot J (2019). Normalized blind STDM watermarking scheme for images and PDF documents robust against fixed gain attack, Multimedia Tools and Applications, 79:3-4, (1887-1919), Online publication date: 1-Jan-2020.
- Jafari Barani M, Ayubi P, Yousefi Valandar M and Yosefnezhad Irani B (2019). A blind video watermarking algorithm robust to lossy video compression attacks based on generalized Newton complex map and contourlet transform, Multimedia Tools and Applications, 79:3-4, (2127-2159), Online publication date: 1-Jan-2020.
- Yang R, Au M, Lai J, Xu Q and Yu Z Collusion Resistant Watermarking Schemes for Cryptographic Functionalities Advances in Cryptology – ASIACRYPT 2019, (371-398)
- Bertini F, Rizzo S and Montesi D (2019). Can Information Hiding in Social Media Posts Represent a Threat?, Computer, 52:10, (52-60), Online publication date: 1-Oct-2019.
- Deljavan Amiri M, Amiri A and Meghdadi M (2019). HVS-based scalable video watermarking, Multimedia Systems, 25:4, (273-291), Online publication date: 1-Aug-2019.
- Belferdi W, Behloul A and Noui L (2019). A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration, Multidimensional Systems and Signal Processing, 30:3, (1093-1112), Online publication date: 1-Jul-2019.
- Fakhredanesh M, Rahmati M and Safabakhsh R (2019). Steganography in discrete wavelet transform based on human visual system and cover model, Multimedia Tools and Applications, 78:13, (18475-18502), Online publication date: 1-Jul-2019.
- Abdulla A, Sellahewa H and Jassim S (2019). Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images, Multimedia Tools and Applications, 78:13, (17799-17823), Online publication date: 1-Jul-2019.
- Chen C, Lu W and Chou C (2019). Rotational copy-move forgery detection using SIFT and region growing strategies, Multimedia Tools and Applications, 78:13, (18293-18308), Online publication date: 1-Jul-2019.
- Dhargupta S, Chakraborty A, Ghosal S, Saha S and Sarkar R (2019). Fuzzy edge detection based steganography using modified Gaussian distribution, Multimedia Tools and Applications, 78:13, (17589-17606), Online publication date: 1-Jul-2019.
- Burimas R, Kumpuak T, Intarauksorn M, Galajit K, Aimmanee P and Karnjana J Framework for Hiding Information in Audio Sub-signals by Using Singular Spectrum Analysis with Psychoacoustic Model Proceedings of the 3rd International Conference on Graphics and Signal Processing, (67-74)
- Tang Z, Xu S, Ye D, Wang J, Zhang X and Yu C (2019). Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image, Journal of Real-Time Image Processing, 16:3, (709-724), Online publication date: 1-Jun-2019.
- Kim W, Nam S, Kang J and Lee H (2019). Robust watermarking in curvelet domain for preserving cleanness of high-quality images, Multimedia Tools and Applications, 78:12, (16887-16906), Online publication date: 1-Jun-2019.
- Rhayma H, Makhloufi A, Hamam H and Hamida A (2019). Semi-fragile self-recovery watermarking scheme based on data representation through combination, Multimedia Tools and Applications, 78:10, (14067-14089), Online publication date: 1-May-2019.
- Wahed M and Nyeem H (2019). Reversible data hiding with interpolation and adaptive embedding, Multimedia Tools and Applications, 78:8, (10795-10819), Online publication date: 1-Apr-2019.
- Sabbane F, Aherrahrou N and Tairi H A new region based watermarking scheme for medical images Proceedings of the New Challenges in Data Sciences: Acts of the Second Conference of the Moroccan Classification Society, (1-6)
- Allili M, Casemajor N and Talbi A (2019). Multiple image copy detection and evolution visualisation using tree graphs, Multimedia Tools and Applications, 78:5, (6253-6275), Online publication date: 1-Mar-2019.
- Singh D and Singh S (2019). Block Truncation Coding based effective watermarking scheme for image authentication with recovery capability, Multimedia Tools and Applications, 78:4, (4197-4215), Online publication date: 1-Feb-2019.
- Molaei A and Ebrahimzadeh A (2019). Optimal steganography with blind detection based on Bayesian optimization algorithm, Pattern Analysis & Applications, 22:1, (205-219), Online publication date: 1-Feb-2019.
- (2019). A cryptographic data hiding algorithm with high cover text capacity, International Journal of Electronic Security and Digital Forensics, 11:2, (225-244), Online publication date: 1-Jan-2019.
- Li L, Chang C, Chen H and Jung K (2019). An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy, Security and Communication Networks, 2019, Online publication date: 1-Jan-2019.
- Al-Otum H (2019). Wavelet packets-based watermarking with preserved high color image quality and enhanced robustness for copyright protection applications, Multimedia Tools and Applications, 78:2, (2199-2225), Online publication date: 1-Jan-2019.
- Gourrame K, Douzi H, Harba R, Riad R, Ros F, Amar M and Elhajji M (2019). A zero-bit Fourier image watermarking for print-cam process, Multimedia Tools and Applications, 78:2, (2621-2638), Online publication date: 1-Jan-2019.
- Hsiao C, Tsai M and Yang C (2018). Simple and robust watermarking scheme based on square-root-modulus technique, Multimedia Tools and Applications, 77:23, (30419-30435), Online publication date: 1-Dec-2018.
- Bideh P, Mahdavi M, Borujeni S and Arasteh S (2018). Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications, Multimedia Tools and Applications, 77:24, (31713-31735), Online publication date: 1-Dec-2018.
- Guo J and Potkonjak M Watermarking Deep Neural Networks for Embedded Systems 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), (1-8)
- Muhammad N, Bibi N, Qasim I, Jahangir A and Mahmood Z (2018). Digital watermarking using Hall property image decomposition method, Pattern Analysis & Applications, 21:4, (997-1012), Online publication date: 1-Nov-2018.
- Lipuš B and ?Alik B (2018). Robust watermarking of airborne LiDAR data, Multimedia Tools and Applications, 77:21, (29077-29097), Online publication date: 1-Nov-2018.
- Abdelhakim A, Saad M, Sayed M and Saleh H (2018). Optimized SVD-based robust watermarking in the fractional Fourier domain, Multimedia Tools and Applications, 77:21, (27895-27917), Online publication date: 1-Nov-2018.
- Chen C, Zhou B and Mow W (2018). RA Code: A Robust and Aesthetic Code for Resolution-Constrained Applications, IEEE Transactions on Circuits and Systems for Video Technology, 28:11, (3300-3312), Online publication date: 1-Nov-2018.
- Yu H, Lim J, Kim K and Lee S Pinto Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (1089-1101)
- Hamidi M, Haziti M, Cherifi H and Hassouni M (2018). Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform, Multimedia Tools and Applications, 77:20, (27181-27214), Online publication date: 1-Oct-2018.
- Hu H and Chang J (2018). Dual image watermarking by exploiting the properties of selected DCT coefficients with JND modeling, Multimedia Tools and Applications, 77:20, (26965-26990), Online publication date: 1-Oct-2018.
- Hosny K and Darwish M (2018). Robust color image watermarking using invariant quaternion Legendre-Fourier moments, Multimedia Tools and Applications, 77:19, (24727-24750), Online publication date: 1-Oct-2018.
- Frattolillo F (2018). Watermarking protocols, International Journal of Information Security, 17:5, (587-601), Online publication date: 1-Oct-2018.
- Yang R, Au M, Lai J, Xu Q and Yu Z Unforgeable Watermarking Schemes with Public Extraction Security and Cryptography for Networks, (63-80)
- Zebbiche K, Khelifi F and Loukhaoukha K (2018). Robust additive watermarking in the DTCWT domain based on perceptual masking, Multimedia Tools and Applications, 77:16, (21281-21304), Online publication date: 1-Aug-2018.
- Douglas M, Bailey K, Leeney M and Curran K (2018). An overview of steganography techniques applied to the protection of biometric data, Multimedia Tools and Applications, 77:13, (17333-17373), Online publication date: 1-Jul-2018.
- Abdelhakim A and Abdelhakim M (2018). A time-efficient optimization for robust image watermarking using machine learning, Expert Systems with Applications: An International Journal, 100:C, (197-210), Online publication date: 15-Jun-2018.
- Kumar R, Chand S and Singh S (2018). An Improved Histogram-Shifting-Imitated reversible data hiding based on HVS characteristics, Multimedia Tools and Applications, 77:11, (13445-13457), Online publication date: 1-Jun-2018.
- Zhang J, Gu Z, Jang J, Wu H, Stoecklin M, Huang H and Molloy I Protecting Intellectual Property of Deep Neural Networks with Watermarking Proceedings of the 2018 on Asia Conference on Computer and Communications Security, (159-172)
- Tsai M and Yuadi I (2018). Digital forensics of microscopic images for printed source identification, Multimedia Tools and Applications, 77:7, (8729-8758), Online publication date: 1-Apr-2018.
- Himeur Y and Boukabou A (2018). A robust and secure key-frames based video watermarking system using chaotic encryption, Multimedia Tools and Applications, 77:7, (8603-8627), Online publication date: 1-Apr-2018.
- Borjian N, Kabir E, Seyedin S and Masehian E (2018). A query-by-example music retrieval system using feature and decision fusion, Multimedia Tools and Applications, 77:5, (6165-6189), Online publication date: 1-Mar-2018.
- Kumar C, Singh A and Kumar P (2018). A recent survey on image watermarking techniques and its application in e-governance, Multimedia Tools and Applications, 77:3, (3597-3622), Online publication date: 1-Feb-2018.
- Etemad E, Samavi S, Reza Soroushmehr S, Karimi N, Etemad M, Shirani S and Najarian K (2018). Robust image watermarking scheme using bit-plane of hadamard coefficients, Multimedia Tools and Applications, 77:2, (2033-2055), Online publication date: 1-Jan-2018.
- Abura'ed N, Khan F and Bhaskar H (2017). Advances in the Quantum Theoretical Approach to Image Processing Applications, ACM Computing Surveys, 49:4, (1-49), Online publication date: 31-Dec-2018.
- Chen C, Wang H and Lin C (2017). An efficiency enhanced cluster expanding block algorithm for copy-move forgery detection, Multimedia Tools and Applications, 76:24, (26503-26522), Online publication date: 1-Dec-2017.
- Dey N, Parah S, Sheikh J and Bhat G (2017). Realization of a New Robust and Secure Watermarking Technique Using DC Coefficient Modification in Pixel Domain and Chaotic Encryption, Journal of Global Information Management, 25:4, (80-102), Online publication date: 1-Oct-2017.
- Głowacz A and Pietroń M (2017). Implementation of Digital Watermarking Algorithms in Parallel Hardware Accelerators, International Journal of Parallel Programming, 45:5, (1108-1127), Online publication date: 1-Oct-2017.
- Mairgiotis A, Koliopanos C and Kondi L Rao based watermark detector through two-level hierarchical prior in transform domain Proceedings of the 21st Pan-Hellenic Conference on Informatics, (1-6)
- Chang C and Shen J (2017). Features Classification Forest: A Novel Development that is Adaptable to Robust Blind Watermarking Techniques, IEEE Transactions on Image Processing, 26:8, (3921-3935), Online publication date: 1-Aug-2017.
- Soltani Panah A, van Schyndel R and Sellis T (2017). Towards an asynchronous aggregation-capable watermark for end-to-end protection of big data streams, Future Generation Computer Systems, 72:C, (288-304), Online publication date: 1-Jul-2017.
- Pérez Gort M, Feregrino Uribe C and Nummenmaa J A Minimum Distortion Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, (111-121)
- Uchida Y, Nagai Y, Sakazawa S and Satoh S Embedding Watermarks into Deep Neural Networks Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval, (269-277)
- Nadeau A and Sharma G (2017). An Audio Watermark Designed for Efficient and Robust Resynchronization After Analog Playback, IEEE Transactions on Information Forensics and Security, 12:6, (1393-1405), Online publication date: 1-Jun-2017.
- Roy D and Sengupta A (2017). Low overhead symmetrical protection of reusable IP core using robust fingerprinting and watermarking during high level synthesis, Future Generation Computer Systems, 71:C, (89-101), Online publication date: 1-Jun-2017.
- Malik A, Sikka G and Verma H (2017). A high payload data hiding scheme based on modified AMBTC technique, Multimedia Tools and Applications, 76:12, (14151-14167), Online publication date: 1-Jun-2017.
- Xue B, Li X, Wang J and Guo Z (2017). Improved reversible data hiding based on two-dimensional difference-histogram modification, Multimedia Tools and Applications, 76:11, (13473-13491), Online publication date: 1-Jun-2017.
- Sathish Shet K, Aswath A, Hanumantharaju M and Gao X (2017). Design and development of new reconfigurable architectures for LSB/multi-bit image steganography system, Multimedia Tools and Applications, 76:11, (13197-13219), Online publication date: 1-Jun-2017.
- Malik A, Sikka G and Verma H (2017). An image interpolation based reversible data hiding scheme using pixel value adjusting feature, Multimedia Tools and Applications, 76:11, (13025-13046), Online publication date: 1-Jun-2017.
- Chen W, Wu K and Wang C (2017). A novel message embedding algorithm using the optimal weighted modulus, Information Sciences: an International Journal, 388:C, (17-36), Online publication date: 1-May-2017.
- Makarov A and Shabunin A On Design of Secure E-Services for Public Authority in the Russian Federation Proceedings of the 20th Conference of Open Innovations Association FRUCT, (260-267)
- Ouazzane H, Mahersia H and Hamrouni K How to extend the use of the discrete orthogonal stockwell transform to image watermarking Proceedings of the Symposium on Applied Computing, (101-107)
- Piotrowski Z and Lenarczyk P (2017). Blind image counterwatermarking --- hidden data filter, Multimedia Tools and Applications, 76:7, (10119-10131), Online publication date: 1-Apr-2017.
- Kandi H, Mishra D and Gorthi S (2017). Exploring the learning capabilities of convolutional neural networks for robust image watermarking, Computers and Security, 65:C, (247-268), Online publication date: 1-Mar-2017.
- Nouri R and Mansouri A (2017). Digital image steganalysis based on the reciprocal singular value curve, Multimedia Tools and Applications, 76:6, (8745-8756), Online publication date: 1-Mar-2017.
- Munib S and Khan A (2017). Robust image watermarking technique using triangular regions and Zernike moments for quantization based embedding, Multimedia Tools and Applications, 76:6, (8695-8710), Online publication date: 1-Mar-2017.
- Singh P and Agarwal S (2017). A self recoverable dual watermarking scheme for copyright protection and integrity verification, Multimedia Tools and Applications, 76:5, (6389-6428), Online publication date: 1-Mar-2017.
- Saleem A, Beghdadi A and Boashash B (2017). A distortion-free contrast enhancement technique based on a perceptual fusion scheme, Neurocomputing, 226:C, (161-167), Online publication date: 22-Feb-2017.
- Soleymani S and Taherinia A (2017). Double expanding robust image watermarking based on Spread Spectrum technique and BCH coding, Multimedia Tools and Applications, 76:3, (3485-3503), Online publication date: 1-Feb-2017.
- Dutta T and Gupta H (2017). An Efficient Framework for Compressed Domain Watermarking in P Frames of High-Efficiency Video Coding (HEVC)--Encoded Video, ACM Transactions on Multimedia Computing, Communications, and Applications, 13:1, (1-24), Online publication date: 17-Jan-2017.
- Zhang G, Kou L, Zhang L, Liu C, Da Q, Sun J and Lu R (2017). A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT, Security and Communication Networks, 2017, Online publication date: 1-Jan-2017.
- Su P, Kuo T and Li M (2017). A practical design of digital watermarking for video streaming services, Journal of Visual Communication and Image Representation, 42:C, (161-172), Online publication date: 1-Jan-2017.
- Yang C (2017). Robust high-capacity watermarking scheme based on Euclidean norms and quick coefficient alignment, Multimedia Tools and Applications, 76:1, (1455-1477), Online publication date: 1-Jan-2017.
- Bitar A, Darazi R, Couchot J and Couturier R (2017). Blind digital watermarking in PDF documents using Spread Transform Dither Modulation, Multimedia Tools and Applications, 76:1, (143-161), Online publication date: 1-Jan-2017.
- Singh D and Singh S (2017). DCT based efficient fragile watermarking scheme for image authentication and restoration, Multimedia Tools and Applications, 76:1, (953-977), Online publication date: 1-Jan-2017.
- Kumar M and Agrawal S (2016). Reversible data hiding based on prediction error expansion using adjacent pixels, Security and Communication Networks, 9:16, (3703-3712), Online publication date: 10-Nov-2016.
- Yan B, Liu X and Yang H (2016). Structure compliant local warping of images with applications to watermarking attack, Multimedia Tools and Applications, 75:21, (13451-13479), Online publication date: 1-Nov-2016.
- Kieu T and Rudder A (2016). A reversible steganographic scheme for VQ indices based on joint neighboring and predictive coding, Multimedia Tools and Applications, 75:21, (13705-13731), Online publication date: 1-Nov-2016.
- Luo C, Fylakis A, Partala J, Klakegg S, Goncalves J, Liang K, Seppänen T and Kostakos V A data hiding approach for sensitive smartphone data Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, (557-568)
- Chen W, Liao Y, Lin Y and Wang C (2016). A novel general multiple-base data embedding algorithm, Information Sciences: an International Journal, 358:C, (164-190), Online publication date: 1-Sep-2016.
- Neuner S, Voyiatzis A, Schmiedecker M, Brunthaler S, Katzenbeisser S and Weippl E (2016). Time is on my side, Digital Investigation: The International Journal of Digital Forensics & Incident Response, 18:S, (S76-S86), Online publication date: 7-Aug-2016.
- Ou B, Li X and Wang J (2016). High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion, Journal of Visual Communication and Image Representation, 39:C, (12-23), Online publication date: 1-Aug-2016.
- Singh D and Singh S (2016). Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability, Journal of Visual Communication and Image Representation, 38:C, (775-789), Online publication date: 1-Jul-2016.
- Wójtowicz W and Ogiela M (2016). Digital images authentication scheme based on bimodal biometric watermarking in an independent domain, Journal of Visual Communication and Image Representation, 38:C, (1-10), Online publication date: 1-Jul-2016.
- Agilandeeswari L and Ganesan K (2016). A robust color video watermarking scheme based on hybrid embedding techniques, Multimedia Tools and Applications, 75:14, (8745-8780), Online publication date: 1-Jul-2016.
- Lima J and Da Silva Neto E (2016). Audio encryption based on the cosine number transform, Multimedia Tools and Applications, 75:14, (8403-8418), Online publication date: 1-Jul-2016.
- Tsai Y (2016). An efficient 3D information hiding algorithm based on sampling concepts, Multimedia Tools and Applications, 75:13, (7891-7907), Online publication date: 1-Jul-2016.
- Agarwal H, Sen D, Raman B and Kankanhalli M (2016). Visible watermarking based on importance and just noticeable distortion of image regions, Multimedia Tools and Applications, 75:13, (7605-7629), Online publication date: 1-Jul-2016.
- Hou J, Kim D, Song H and Lee H Secure Image Display through Visual Cryptography Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, (169-174)
- Tsai Y (2016). A Distortion-Free Data Hiding Scheme for Triangular Meshes Based on Recursive Subdivision, Advances in Multimedia, 2016, (1), Online publication date: 1-Jun-2016.
- Doğan Ş (2016). A new data hiding method based on chaos embedded genetic algorithm for color image, Artificial Intelligence Review, 46:1, (129-143), Online publication date: 1-Jun-2016.
- Kasana S and Garg P Interpolation based Reversible Data Hiding Scheme for Digital Images Proceedings of the 21st Western Canadian Conference on Computing Education, (1-6)
- Voloshina N, Bezzateev S, Prudanov A, Vasilev M and Gorbunov A Effectiveness of LSB and MLSB information embedding for BMP images Proceedings of the 18th Conference of Open Innovations Association FRUCT, (378-384)
- Makarov A and Yakovleva E Comparative analysis of halftoning algorithms for digital watermarking Proceedings of the 18th Conference of Open Innovations Association FRUCT, (193-199)
- Davarzani R, Mozaffari S and Yaghmaie K (2016). Perceptual image hashing using center-symmetric local binary patterns, Multimedia Tools and Applications, 75:8, (4639-4667), Online publication date: 1-Apr-2016.
- Khandare S and Shrawankar U (2016). Image Bit Depth Plane Digital Watermarking for Secured Classified Image Data Transmission, Procedia Computer Science, 78:C, (698-705), Online publication date: 1-Mar-2016.
- Zolotavkin Y and Juhola M (2016). A new Scalar Quantization method for Digital Image Watermarking, Journal of Electrical and Computer Engineering, 2016, (1-1), Online publication date: 1-Jan-2016.
- Roy A, Chakraborty R and Naskar R Reversible Color Image Watermarking in the YCoCg-R Color Space Proceedings of the 11th International Conference on Information Systems Security - Volume 9478, (480-498)
- Hao L, Feng J and Zhou B Gradient domain binary image hiding using color difference metric SIGGRAPH Asia 2015 Technical Briefs, (1-4)
- Conotter V, Comesana P and Perez-Gonzalez F (2015). Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images, IEEE Transactions on Information Forensics and Security, 10:11, (2257-2269), Online publication date: 1-Nov-2015.
- Feng B, Lu W and Sun W (2015). Novel steganographic method based on generalized K-distance N-dimensional pixel matching, Multimedia Tools and Applications, 74:21, (9623-9646), Online publication date: 1-Nov-2015.
- Dharwadkar N, Parane K and Poojara S A Novel Scheme of Data Hiding for Color Images in Spatial Domain with High Capacity of Embedding Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, (403-407)
- Srivastava A Performance Comparison of Various Particle Swarm Optimizers in DWT-SVD watermarking for RGB Images Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, (244-250)
- Fujiyoshi M and Kiya H Histogram-Based Near-Lossless Data Hiding and Its Application to Image Compression Proceedings, Part II, of the 16th Pacific-Rim Conference on Advances in Multimedia Information Processing -- PCM 2015 - Volume 9315, (225-235)
- Hajj-Ahmad A, Baudry S, Chupeau B and Doërr G Flicker Forensics for Pirate Device Identification Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, (75-84)
- Hou J, Kim D, Choi S and Lee H 3D Print-Scan Resilient Watermarking Using a Histogram-Based Circular Shift Coding Structure Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, (115-121)
- Huang Y and Tsai Y (2015). A Reversible Data Hiding Scheme for 3D Polygonal Models Based on Histogram Shifting with High Embedding Capacity, 3D Research, 6:2, (1-12), Online publication date: 1-Jun-2015.
- Liu S, Hennelly B, Guo C and Sheridan J (2015). Robustness of Double Random Phase Encoding spread-space spread-spectrum watermarking technique, Signal Processing, 109:C, (345-361), Online publication date: 1-Apr-2015.
- Kieu T and Ramroach S (2015). A reversible steganographic scheme for VQ indices based on joint neighboring coding, Expert Systems with Applications: An International Journal, 42:2, (713-722), Online publication date: 1-Feb-2015.
- Hernaez I, Saratxaga I, Ye J, Sanchez J, Erro D and Navas E Speech Watermarking Based on Coding of the Harmonic Phase Proceedings of the Second International Conference on Advances in Speech and Language Technologies for Iberian Languages - Volume 8854, (259-268)
- Subhedar M and Mankar V High Capacity Image Steganography based on Discrete Wavelet Transform and Singular Value Decomposition Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, (1-7)
- Kim D, Lee G and Yoo K A reversible data hiding scheme based on histogram shifting using edge direction predictor Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, (126-131)
- Chang C, Nguyen T and Lin C (2014). Reversible data embedding for indices based on histogram analysis, Journal of Visual Communication and Image Representation, 25:7, (1704-1716), Online publication date: 1-Oct-2014.
- Naderahmadian Y and Hosseini-Khayat S (2014). Fast and robust watermarking in still images based on QR decomposition, Multimedia Tools and Applications, 72:3, (2597-2618), Online publication date: 1-Oct-2014.
- Yang Z, Chiou S and Lee J (2014). Watermark design based on Steiner triple systems, Multimedia Tools and Applications, 72:3, (2177-2194), Online publication date: 1-Oct-2014.
- Behloul A A blind robust image watermarking using interest points and IWT Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems, (139-145)
- Xu S and Lai S An Optimal Least Significant Bit Based Image Steganography Algorithm Proceedings of International Conference on Internet Multimedia Computing and Service, (42-45)
- Carnein M, Schöttle P and Böhme R Predictable rain? Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, (97-108)
- Quiring E and Schöttle P On the combination of randomized thresholds and non-parametric boundaries to protect digital watermarks against sensitivity attacks Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, (41-48)
- Zhang H, Cao Y, Zhao X, Zhang W and Yu N Video steganography with perturbed macroblock partition Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, (115-122)
- Urvoy M and Autrusseau F Application of Grubbs' test for outliers to the detection of watermarks Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, (49-60)
- Hirata N and Kawamura M Digital watermarking method using LDPC code for clipped image Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation, (25-30)
- Hou J, Park J, Kim D, Nam S and Lee H Robust video watermarking for MPEG compression and DA-AD conversion Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation, (2-8)
- Wang J, Guan L, Liu L and Zha D Implementing a Covert Timing Channel Based on Mimic Function Proceedings of the 10th International Conference on Information Security Practice and Experience - Volume 8434, (247-261)
- Botta M, Cavagnino D and Pomponiu V (2014). Protecting the Content Integrity of Digital Imagery with Fidelity Preservation, ACM Transactions on Multimedia Computing, Communications, and Applications, 10:3, (1-5), Online publication date: 1-Apr-2014.
- Zielińska E, Mazurczyk W and Szczypiorski K (2014). Trends in steganography, Communications of the ACM, 57:3, (86-95), Online publication date: 1-Mar-2014.
- Daraee F and Mozaffari S (2014). Watermarking in binary document images using fractal codes, Pattern Recognition Letters, 35:C, (120-129), Online publication date: 1-Jan-2014.
- Minamoto T and Ohura R (2014). A blind digital image watermarking method based on the dyadic wavelet transform and interval arithmetic, Applied Mathematics and Computation, 226, (306-319), Online publication date: 1-Jan-2014.
- Kanduri Y and Midatala M Digital Watermarking Using Modified Techniques in Spectral Domain of Images Proceedings of the First International Conference on Mining Intelligence and Knowledge Exploration - Volume 8284, (310-315)
- Kim D, Park G and Yoo K An Improved Reversible Data Hiding Scheme Based On Neighboring Pixel Differences Proceedings of International Conference on Advances in Mobile Computing & Multimedia, (282-285)
- Gujjunoori S and Amberker B (2013). DCT based reversible data embedding for MPEG-4 video using HVS characteristics, Journal of Information Security and Applications, 18:4, (157-166), Online publication date: 1-Dec-2013.
- Cho S, Cha B, Gawecki M and Jay Kuo C (2013). Block-based image steganalysis, Journal of Visual Communication and Image Representation, 24:7, (846-856), Online publication date: 1-Oct-2013.
- Bouzidi I, Ouled Zaid A, Hachani M and Puech W Joint watermarking and progressive geometric compression of 3D meshes Proceedings of the first ACM workshop on Information hiding and multimedia security, (209-214)
- Naskar R and Chakraborty R (2013). A generalized tamper localization approach for reversible watermarking algorithms, ACM Transactions on Multimedia Computing, Communications, and Applications, 9:3, (1-22), Online publication date: 1-Jun-2013.
- Lusson F, Bailey K, Leeney M and Curran K (2013). A novel approach to digital watermarking, exploiting colour spaces, Signal Processing, 93:5, (1268-1294), Online publication date: 1-May-2013.
- Domingo-Ferrer J and MegíAs D (2013). Distributed multicast of fingerprinted content based on a rational peer-to-peer community, Computer Communications, 36:5, (542-550), Online publication date: 1-Mar-2013.
- Hong W (2013). Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique, Information Sciences: an International Journal, 221, (473-489), Online publication date: 1-Feb-2013.
- Gujjunoori S and Amberker B A DCT based reversible data embedding scheme for MPEG-4 video using HVS characteristics Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing, (1-7)
- Yershov A, Zabiniako V and Semenchuk P (2012). Using Concatenated Steganography for Visual Analysis in GIS SOA, Applied Computer Systems, 13:1, (74-82), Online publication date: 1-Nov-2012.
- Choudhary A, Chauhan S, Alam M and Tanveer S Schur decomposition and dither modulation Proceedings of the CUBE International Information Technology Conference, (744-748)
- Pandian N and Thangavel R A hybrid embedded steganography technique Proceedings of the International Conference on Advances in Computing, Communications and Informatics, (1123-1130)
- Liao X, Wen Q, Zhao Z and Zhang J (2012). A Novel Steganographic Method with Four-Pixel Differencing and Modulus Function, Fundamenta Informaticae, 118:3, (281-289), Online publication date: 1-Aug-2012.
- Di Martino F and Sessa S (2012). Fragile watermarking tamper detection with images compressed by fuzzy transform, Information Sciences: an International Journal, 195, (62-90), Online publication date: 1-Jul-2012.
- Ilchev S and Ilchev V Modular data hiding for improved web-portal security Proceedings of the 13th International Conference on Computer Systems and Technologies, (187-194)
- Cogranne R, Zitzmann C, Retraint F, Nikiforov I, Fillatre L and Cornu P Statistical detection of LSB matching using hypothesis testing theory Proceedings of the 14th international conference on Information Hiding, (46-62)
- Song C, Sudirman S and Merabti M (2012). A robust region-adaptive dual image watermarking technique, Journal of Visual Communication and Image Representation, 23:3, (549-568), Online publication date: 1-Apr-2012.
- Yang L, Chen Q, Tian J and Wu D (2012). Robust track-and-trace video watermarking, Security and Communication Networks, 5:4, (353-363), Online publication date: 1-Apr-2012.
- Yamada T, Echizen I and Yoshiura H PC-based real-time video watermark embedding system independent of platform for parallel computing Transactions on Data Hiding and Multimedia Security VII, (15-33)
- Yang C (2012). Reversible data hiding using two marked images based on adaptive coefficient-shifting algorithm, Advances in Multimedia, 2012, (19-19), Online publication date: 1-Jan-2012.
- Mulvaney D, Woodward B, Datta S, Harvey P, Vyas A, Thakker B, Farooq O and Istepanian R (2012). Monitoring heart disease and diabetes with mobile internet communications, International Journal of Telemedicine and Applications, 2012, (12-12), Online publication date: 1-Jan-2012.
- Blasco J, Hernandez-Castro J, de Fuentes J and Ramos B (2012). A framework for avoiding steganography usage over HTTP, Journal of Network and Computer Applications, 35:1, (491-501), Online publication date: 1-Jan-2012.
- Aguilar J and Anderson J (2011). A Neural Watermark Approach, Electronic Notes in Theoretical Computer Science (ENTCS), 281:C, (35-50), Online publication date: 29-Dec-2011.
- Naskar R and Chakraborty R Reversible image watermarking through coordinate logic operation based prediction Proceedings of the 7th international conference on Information Systems Security, (190-203)
- Minamoto T and Ohura R A blind digital image watermarking method based on the dual-tree complex discrete wavelet transform and interval arithmetic Proceedings of the 14th international conference on Information Security and Cryptology, (437-449)
- Poh G and Z'aba M On the security and practicality of a buyer seller watermarking protocol for DRM Proceedings of the 4th international conference on Security of information and networks, (251-254)
- Di Crescenzo G and Arce G Data forensics constructions from cryptographic hashing and coding Proceedings of the 10th international conference on Digital-Forensics and Watermarking, (494-509)
- Yamada T and Takahashi Y Use of "emergable watermarks" as copy indicators for securing video content Proceedings of the 10th international conference on Digital-Forensics and Watermarking, (181-195)
- Bandyopadhyay S, Naskar R and Chakraborty R Reversible watermarking using priority embedding through repeated application of integer wavelet transform Proceedings of the First international conference on Security aspects in information technology, (45-56)
- Rocha A, Scheirer W, Boult T and Goldenstein S (2011). Vision of the unseen, ACM Computing Surveys, 43:4, (1-42), Online publication date: 1-Oct-2011.
- Bhat K V, Sengupta I and Das A (2011). A New Audio Watermarking Scheme Based on Singular Value Decomposition and Quantization, Circuits, Systems, and Signal Processing, 30:5, (915-927), Online publication date: 1-Oct-2011.
- Bravo-Solorio S and Nandi A (2011). Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics, Signal Processing, 91:8, (1759-1770), Online publication date: 1-Aug-2011.
- Kieu T and Chang C (2011). A steganographic scheme by fully exploiting modification directions, Expert Systems with Applications: An International Journal, 38:8, (10648-10657), Online publication date: 1-Aug-2011.
- Mairgiotis A and Stylios G Transform based additive data hiding based on a hierarchical prior Proceedings of the 5th European conference on European computing conference, (301-305)
- Domingo-Ferrer J Rational enforcement of digital oblivion Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society, (1-8)
- Kim S, Kyung K and Kwon D Haptic annotation for an interactive image Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, (1-10)
- Das S, Bandyopadhyay P, Banerjee M and Chaudhuri A A chip-based watermarking framework for color image authentication Proceedings of the 2011 International Conference on Communication, Computing & Security, (178-183)
- Bandyopadhyay P, Das S, Banerjee M and Chaudhuri A A fragile color image watermarking framework focusing a new invisible domain Proceedings of the 2011 International Conference on Communication, Computing & Security, (172-177)
- Liu S, Yao H, Zhang S and Gao W A progressive quality hiding strategy based on equivalence partitions of hiding units Transactions on data hiding and multimedia security VI, (58-82)
- Borse R and Chaudhuri S Computation of embedding capacity in reversible watermarking schemes Proceedings of the Seventh Indian Conference on Computer Vision, Graphics and Image Processing, (472-478)
- Tsai M and Liu J A game-theoretic system security design for the visible watermarking Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence, (19-24)
- Muttoo S and Kumar V (2010). Hiding Message in Map Along Pre-Hamiltonian Path, International Journal of Information Security and Privacy, 4:4, (21-34), Online publication date: 1-Oct-2010.
- Meerwald P and Uhl A Watermark detection on quantized transform coefficients using product bernoulli distributions Proceedings of the 12th ACM workshop on Multimedia and security, (175-180)
- Feng X and Doërr G FLD-based detection of re-compressed speech signals Proceedings of the 12th ACM workshop on Multimedia and security, (43-48)
- Jia L, Shin S and Yoo K A reversible data hiding scheme using even-odd embedding method Proceedings of the Advanced intelligent computing theories and applications, and 6th international conference on Intelligent computing, (213-220)
- Li W, Liu Y and Xue X Robust audio identification for MP3 popular music Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval, (627-634)
- Meerwald P and Uhl A Watermark detection for video bookmarking using mobile phone camera Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security, (64-74)
- Song C, Sudirman S, Merabti M and Llewellyn-Jones D Analysis of digital image watermark attacks Proceedings of the 7th IEEE conference on Consumer communications and networking conference, (941-945)
- Naoe K, Sasaki H and Takefuji Y (2010). Secure Key Generation for Static Visual Watermarking by Machine Learning in Intelligent Systems and Services, International Journal of Systems and Service-Oriented Engineering, 1:1, (46-61), Online publication date: 1-Jan-2010.
- Wang X, Yang Y and Yang H (2010). Invariant image watermarking using multi-scale Harris detector and wavelet moments, Computers and Electrical Engineering, 36:1, (31-44), Online publication date: 1-Jan-2010.
- Turner C A steganographic computational paradigm for wireless sensor networks Proceedings of the 6th international conference on Innovations in information technology, (270-274)
- Wang X, Ma T and Niu P Digital Audio Watermarking Technique Using Pseudo-Zernike Moments Information and Communications Security, (459-473)
- Senda K and Kawamura M Statistical-mechanical approach for multiple watermarks using spectrum spreading Proceedings of the 4th international conference on Information theoretic security, (231-247)
- Tsai M, Wang C and Liu J A hybrid model for digital camera source identification Proceedings of the 16th IEEE international conference on Image processing, (2865-2868)
- Braci S, Boyer R and Delpha C Security evaluation of informed watermarking schemes Proceedings of the 16th IEEE international conference on Image processing, (117-120)
- Gao Y, Li X, Zeng T and Yang B Improving embedding efficiency via matrix embedding Proceedings of the 16th IEEE international conference on Image processing, (109-112)
- Kim K, Lee M, Lee H and Lee H (2009). Reversible data hiding exploiting spatial correlation between sub-sampled images, Pattern Recognition, 42:11, (3083-3096), Online publication date: 1-Nov-2009.
- Meerwald P and Uhl A Additive spread-spectrum watermark detection in demosaicked images Proceedings of the 11th ACM workshop on Multimedia and security, (25-32)
- Belet P, Dams T, Bardyn D and Dooms A Comparison of perceptual shaping techniques for digital image watermarking Proceedings of the 16th international conference on Digital Signal Processing, (387-392)
- Candido S and Hutchinson S Detecting intrusion faults in remotely controlled systems Proceedings of the 2009 conference on American Control Conference, (4968-4973)
- Huang C, Chuang S, Huang Y and Wu J (2009). Unseen visible watermarking, IEEE Transactions on Information Forensics and Security, 4:2, (193-206), Online publication date: 1-Jun-2009.
- Wohlgemuth S, Müller G, Sonehara N and Echizen I On observable delegation of personal data by watermarking Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, (1143-1147)
- Acriçmez O, Seifert J and Zhang X A secure DVB set-top box via trusting computing technologies Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, (1048-1055)
- Bhat K. V, Sengupta I and Das A Audio Watermarking Based on Quantization in Wavelet Domain Proceedings of the 4th International Conference on Information Systems Security, (235-242)
- Wayner P (2008). Disappearing Cryptography, 10.5555/1523275, Online publication date: 3-Dec-2008.
- Schaathun H A key-recovery attack on authentication watermarking by li and yuan Proceedings of the 10th ACM workshop on Multimedia and security, (221-226)
- Muñoz A, Gallardo J and García S Detection of distributed steganographic information in social networks Proceedings of the 2008 Euro American Conference on Telematics and Information Systems, (1-9)
- Lenders V, Koukoumidis E, Zhang P and Martonosi M Location-based trust for mobile user-generated content Proceedings of the 9th workshop on Mobile computing systems and applications, (60-64)
- Park J and Doherty J A steganographic approach for covert waveform design MILCOM 2016 - 2016 IEEE Military Communications Conference, (180-185)
- Blicq R Extended abstract: Capturing the right flavo(u)r 2015 IEEE International Professional Communication Conference (IPCC), (1-2)
Recommendations
Adaptive removable visible watermarking technique using dual watermarking for digital color images
This paper proposes a removable visible watermarking system based on a dual watermark technique and blind removal. A visible watermark pattern is embedded in the cosine discrete transform (DCT) domain, taking into consideration the texture and luminance ...