X hits on this document

61 views

0 shares

0 downloads

0 comments

14 / 17

[25]

[26]

[27]

[28]

[29]

[30]

[31]

[32]

[33]

[34]

[35]

[36]

[37]

[38]

[39]

[40]

[41]

[42]

[43]

[44]

[45]

[46]

F. Hartung and B. Girod, “Watermarking of uncompressed and compressed video.” Signal Processing, vol. 66, no. 3, pp. 283– 301, May 1998, ISSN 0165-1684, European Association for Sig- nal Processing (EURASIP).

´

  • A.

    Herrigel, J. J. K. O Ruanaidh, H. Petersen, S. Pereira, and

  • T.

    Pun, “Secure copyright protection techniques for digital im-

ages.” In Aucsmith [148], pp. 169–190, ISBN 3-540-65386-4. M. D. Swanson, B. Zu, and A. H. Tewfik, “Robust data hiding for images.” In 7th Digital Signal Processing Workshop (DSP

  • 96)

    , pp. 37–40, IEEE, Loen, Norway, Sep. 1996.

    • G.

      C. Langelaar, J. C. A. van der Lubbe, and R. L. Lagendijk,

“Robust labeling methods for copy protection of images.” In Sethin and Jain [149], pp. 298–309, ISBN 0-8194-2433-1. J. Zhao and E. Koch, “Embedding robust labels into images for copyright protection.” In International Congress on Intel- lectual Property Rights for Specialised Information, Knowledge and New Technologies, Vienna, Austria, Aug. 1995. G. Schott, Schola steganographica: in classes octo distributa.... Jobus Hertz, printer, 1680, bound with: Gasparis Schotti... Technica curiosa... Herbipoli, 1665. [Courtesy of Whipple Sci- ence Museum, Cambridge.]. J. Reeds, “Solved: the ciphers in book III of Trithemius’ steganographia.” Cryptologia, vol. XXII, no. 4, pp. 291–317, Oct. 1998, ISSN 0161-1194. D. Kahn, The Codebreakers – The Story of Secret Writing. New York, New York, U.S.A.: Scribner, 1996, ISBN 0-684- 83130-9. A. Kerckhoffs, “La Cryptographie Militaire.” Journal des Sci- ences Militaires, vol. 9, pp. 5–38, Jan. 1883. R. J. Anderson, “Liability and computer security: Nine princi- ples.” In D. Gollmann, ed., Computer Security – Third Eu- ropean Symposium on Research in Computer Security (ES- ORICS’94), vol. 875 of Lecture Notes in Computer Science, pp. 231–245, Brighton, United Kingdom: Springer-Verlag, Berlin, Germany, 1994, ISBN 3-540-58618-0. J. BaltrusĖ‡aitis, Anamorphoses ou thaumaturgus opticus, pp. 5 and 15–19. Les perspectives de´prave´es, Paris, France: Flam- marion, 1984, ISBN 2-08-012604-0. A. Seckel, “Your mind’s eye: illusions & paradoxes of the visual system.” Lecture for the National Science Week, University of Cambridge, England, Mar. 1998, most of the material of this lecture is also available at <http://www.illusionworks.com/>. Herodotus, The Histories, chap. 5 – The fifth book entitled Terpsichore, 7 – The seventh book entitled Polymnia. London, England: J. M. Dent & Sons, Ltd, 1992, ISBN 0-460-87170-6, translated by George Rawlinson, introduction by Hugh Bow- den. B. Newman, Secrets of German Espionage. London: Robert Hale Ltd, 1940. “Aliroo home page.” <http://www.aliroo.com/>, Apr. 1997, WitnesSoft and ScarLet security software. J. C. Murphy, D. Dubbel, and R. Benson, “Technology ap- proaches to currency security.” In van Renesse [86], pp. 21–28, ISBN 0-8194-2556-7. G. W. W. Stevens, Microphotography – Photography and photo- fabrication at extreme resolutions. London: Chapman & Hall, 1968. D. Brewster, “Microscope.” In Encyclopædia Britannica or the dictionary of arts, sciences, and general literature, vol. XIV, chap. IX, Application of photography to the microscope, pp. 801–802, Edinburgh, 8th edn., 1857, courtesy of the Rare Books Section, Cambridge University Library. G. Tissandier, Les merveilles de la photographie, chap. VI – Les de´peˆches microscopiques du si`ege de Paris, pp. 233–248. Biblioth`eque des merveilles, Boulevard Saint Germain, Paris, France: Librairie Hachette & Cie, 1874, ouvrage illustre´ de 65 vignettes par Johandier, etc. et d’une planche tire´e `a la presse photoglyptique. [Courtesy of the Rare Books Section, Cam- bridge University Library.]. J. Hayhurst, “The pigeon post into Paris 1870–1871.”, 1970, <http://www.windowlink.com/jdhayhurst/pigeon/pigeon. html>. J. E. Hoover, “The enemy’s masterpiece of espionage.” The Reader’s Digest, vol. 48, pp. 49–53, May 1946, London edition. J. F. Delaigle, C. De Vleeschouwer, and B. Macq, “Watermark- ing algorithm based on a human visual model.” Signal Process- ing, vol. 66, no. 3, pp. 319–335, May 1998, ISSN 0165-1684, European Association for Signal Processing (EURASIP).

[47]

[48]

[49]

[50]

[51]

[52]

[53]

[54]

[55]

[56]

[57]

[58]

[59]

[60]

[61]

[62]

[63]

[64]

[65]

[66]

[67]

[68]

[69]

1075

L. Boney, A. H. Tewfik, and K. N. Hamdy, “Digital watermarks for audio signals.” In International Conference on Multime- dia Computing and Systems, pp. 473–480, IEEE, Hiroshima, Japan, 17–23 Jun. 1996.

  • F.

    Goffin, J.-F. Delaigle, C. D. Vleeschouwer, B. Macq, and

  • J.

    -J. Quisquater, “A low cost perceptive digital picture water-

marking method.” In Sethin and Jain [149], pp. 264–277, ISBN 0-8194-2433-1. N. Jayant, J. Johnston, and R. Safranek, “Signal compres- sion based on models of human perception.” Proceedings of the IEEE, vol. 81, no. 10, pp. 1385–1422, Oct. 1993. B. C. J. Moore, An Introduction to the Psychology of Hearing. London, England: Academic Press, 3rd edn., 1989. British Standard, BSI, London, Information technology – Generic coding of moving pictures and associated audio in- formation – Part 3: audio., Oct. 1995, implementation of ISO/IEC 13818-3:1995. A. Werner, J. Oomen, M. E. Groenewegen, R. G. van der Waal, and R. N. Veldhuis, “A variable-bit-rate buried-data channel for compact disc.” Journal of the Audio Engineering Society, vol. 43, no. 1/2, pp. 23–28, Jan.–Feb. 1995. E. J. Delp, “Perceptual watermarking of images.” Proceedings of the IEEE, vol. 87, no. 7, May 1999, to appear. R. J. Anderson, “Why cryptosystems fail.” Communications of the A.C.M., vol. 37, no. 11, pp. 32–40, Nov. 1994. F. Bacon, Of the advancement and proficiencie of learning or the partitions of sciences, vol. VI, pp. 257–271. Leon Lichfield, Oxford, for R. Young and E. Forest, 1640, copy of Sir Geof- frey Keynes, courtesy of the Rare Book Section, Cambridge University Library. P. Leary, The second cryptographic Shakespeare: a monograph wherein the poems and plays attributed to William Shakespeare are proven to contain the enciphered name of the concealed author, Francis Bacon. Omaha, Nebraska, U.S.A.: Westchester House, 2nd edn., 1990, ISBN 0-9617917-1-3. N. R. Wagner, “Fingerprinting.” In Symposium on Security and Privacy, pp. 18–22, Technical Commitee on Security & Privacy, IEEE Computer Society, Oakland, California, U.S.A., 25–27 Apr. 1983. J. Brassil, S. Low, N. Maxemchuk, and L. O’Garman, “Elec- tronic marking and identification techniques to discourage doc- ument copying.” In Infocom, pp. 1278–1287, IEEE, Toronto, Canada, Jun. 1994. R. B. Wolfgang and E. J. Delp, “A watermark for digital im- ages.” In International Conference on Images Processing, pp. 219–222, IEEE, Lausanne, Switzerland, 16–19 Sep. 1996. S. Walton, “Image authentication for a slippery new age.” Dr. Dobb’s journal of software tools, vol. 20, no. 4, pp. 18–26, Apr. 1995. K. Matsui and K. Tanaka, “Video-steganography: How to se- cretly embed a signature in a picture.” Journal of the Inter- active Multimedia Association Intellectual Property Project, vol. 1, no. 1, pp. 187–205, Jan. 1994. R. J. Anderson and C. Manifavas, “Chameleon – A new kind of stream cipher.” In Biham [145], pp. 107–113, ISBN 3-540- 63247-6. J. R. Smith and B. O. Comiskey, “Modulation and information hiding in images.” In Anderson [5], pp. 207–226, ISBN 3-540- 61996-8. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding.” I.B.M. Systems Journal, vol. 35, no. 3 & 4, pp. 313–336, 1996. I. Pitas, “A method for signature casting on digital images.” In International Conference on Image Processing, vol. 3, pp. 215–218, Sep. 1996. G. C. Langelaar, J. C. A. van der Lubbe, and J. Biemond, “Copy protection for multimedia data based on labeling tech- niques.” In 17th Symposium on Information Theory in the Benelux, Enschede, The Netherlands, May 1996. R. C. Dixon, Spread spectrum systems with commercial appli- cations. New York, New York, U.S.A.: John Wiley & Sons, Inc., 3rd edn., 1994, ISBN 0-471-59342-7. R. A. Scholtz, “The origins of spread spectrum communica- tions.” IEEE Transactions on Communications, vol. 30, no. 5, pp. 822–853, May 1982. R. L. Pickholtz, D. L. Schilling, and L. B. Milstein, “Theory of spread spectrum communications – A tutorial.” IEEE Trans-

Document info
Document views61
Page views61
Page last viewedWed Dec 07 09:22:46 UTC 2016
Pages17
Paragraphs556
Words16709

Comments