X hits on this document





15 / 17






















actions on Communications, vol. 30, no. 5, pp. 855–884, May 1982.

  • A.

    Z. Tirkel, G. A. Rankin, R. M. van Schyndel, W. J. Ho,

  • N.

    R. A. Mee, and C. F. Osborne, “Electronic watermark.”

In Digital Image Computing, Technology and Applications (DICTA’93), pp. 666–673, Macquarie University, Sidney, 1993. I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for images, audio and video.” In International Conference on Image Processing (ICIP’96), pp. 243–246, IEEE, Lausanne, Switzerland, 16–19 Sep. 1996. F. Hartung and B. Girod, “Watermarking of MPEG-2 en- coded video without decoding and re-encoding.” In M. Free- man, P. Jardetzky, and H. M. Vin, eds., Multimedia Computing and Networking 1997 , vol. 3020, pp. 264–273, The Society for Imaging Science and Technology (IS&T) and the International Society for Optical Engineering (SPIE), San Jose, California, U.S.A.: SPIE, Feb. 1997, ISBN 0-8194-2431-5.






Interchange Format (GIF) Specification, Jun. <http://icib.igd.fhg.de/icib/it/defacto/company/ compuserve/gif87a/>.


G. Jagpal, “Steganoraphy in digital images.” Dissertation, Uni- versity of Cambridge, Selwyn College. F. A. P. Petitcolas, “MP3Stego.” <http://www.cl.cam.ac.uk/ ~fapp2/steganography/mp3stego/>, Aug. 1998. E. Koch and J. Zhao, “Towards robust and hidden image copy- right labeling.” In Workshop on Nonlinear Signal and Image Processing, pp. 452–455, IEEE, Neos Marmaras, Greece, Jun. 1995.

´ J. J. K. O Ruanaidh, W. J. Dowling, and F. M. Boland, “Water-

marking digital images for copyright protection.” I.E.E. Pro- ceedings on Vision, Signal and Image Processing, vol. 143, no. 4, pp. 250–256, Aug. 1996. M. D. Swanson, B. Zhu, and A. H. Tewfik, “Transparent robust image watermarking.” In International Conference on Image Processing, vol. III, pp. 211–214, IEEE, 1996. D. Kundur and D. Hatzinakos, “A robust digital image water- marking method using wavelet-based fusion.” In International Conference on Image Processing, pp. 544–547, IEEE, Santa Barbara, California, U.S.A., Oct. 1997, ISBN 0-8186-8183-7.

´ J. J. K. O Ruanaidh and T. Pun, “Rotation, scale and transla-

tion invariant spread spectrum digital image watermarking.” Signal Processing, vol. 66, no. 3, pp. 303–317, May 1998, ISSN 0165-1684, European Association for Signal Processing (EURASIP). D. Gruhl, W. Bender, and A. Lu, “Echo hiding.” In Anderson [5], pp. 295–315, ISBN 3-540-61996-8. B. P. Bogert, M. J. R. Healy, and J. W. Tukey, “The quefrency alanysis of time series for echoes: Cepstrum, pseudo-autocovariance, cross-cepstrum and saphe cracking.” In M. Rosenblatt, ed., Symposium on Time Series Analysis, pp. 209–243, New York, New York, U.S.A.: John Wiley & Sons, Inc., 1963. D. L. Schilling, ed., Meteor burst communications: theory and practice. Wiley series in telecommunications, New York, New York, U.S.A.: Wiley, 1993. D. Gruhl and W. Bender, “Information hiding to foil the casual counterfeiter.” In Aucsmith [148], pp. 1–15, ISBN 3-540-65386- 4. R. L. van Renesse, “Security design of valuable documents and products.” In Optical Security and Counterfeit Deterrence Techniques [87], pp. 10–20, ISBN 0-8194-2033-6. R. L. van Renesse, ed., Optical Security and Counterfeit De- terrence Techniques II, vol. 3314, San Jose, California, U.S.A., 28–30 Jan. 1998, The Society for Imaging Science and Technol- ogy (IS&T) and the International Society for Optical Engineer- ing (SPIE), SPIE, ISBN 0-8194-2556-7.

  • , Optical Security and Counterfeit Deterrence Techniques,

vol. 2659, San Jose, California, U.S.A., Feb. 1996, The Soci- ety for Imaging Science and Technology (IS&T) and the Inter- national Society for Optical Engineering (SPIE), SPIE, ISBN 0-8194-2033-6. D. van Lingen, “The new Dutch passport.” In van Renesse [87], pp. 67–73, ISBN 0-8194-2033-6. S. Spannenburg, “Optically- and machine-detectable security elements.” In van Renesse [87], pp. 76–96, ISBN 0-8194-2033-6. R. L. van Renesse, “Verifying versus falsifying banknotes.”

[98] [99] [94] [93] [96] [97] [95] [91] [92] In Optical Security and Counterfeit Deterrence Techniques II [86], pp. 71–85, ISBN 0-8194-2556-7. J. D. Brongers, “Search for effective document security by ‘in- ventioneering’.” In van Renesse [86], pp. 29–38, ISBN 0-8194- 2556-7. “Anti-counterfeit trials begin with watermark technology.” Fi- nancial Technology International Bulletin, vol. 9, no. 2, pp. 6– 7, Oct. 1993. I. M. Lancaster and L. T. Konntnik, “Progress in counterfeit deterrence: The contribution of information exchange.” In van Renesse [87], pp. 2–8, ISBN 0-8194-2033-6. R. Johnson and A. Garcia, “Vulnerability assessment of secu- rity seals.” Journal of Security Administration, vol. 20, no. 1, pp. 15–27, Jun. 1997. V. Gligor, “A guide to understanding covert channel analysis of trusted systems.” Tech. Rep. NCSC-TG-030, National Com- puter Security Center, Ft. George G. Meade, Maryland, U.S.A., Nov. 1993. B. W. Lampson, “A note on the confinement problem.” Com- munications of the A.C.M., vol. 16, no. 10, pp. 613–615, Oct. 1973. W. van Eck, “Electromagnetic radiation from video display units: an eavesdropping risk?” Computers & Security, vol. 4, no. 4, pp. 269–286, Dec. 1985. D. Russel and G. Gangemi, Computer Security Basics, chap. 10: TEMPEST. Sebastopol, California, U.S.A.: O’Reilly & As- sociates, 1991, ISBN 0-937175-71-4. M. G. Kuhn and R. J. Anderson, “Soft tempest: Hidden data transmission using electromagnetic emanations.” In Aucsmith [148], pp. 124–142, ISBN 3-540-65386-4. [100] J.-P. M. G. Linnartz and M. van Dijk, “Analysis of the sensi- tivity attack against electronic watermarks in images.” In Auc- smith [148], pp. 258–272, ISBN 3-540-65386-4. [101] M. Maes, “Twin peaks: The histogram attack on fixed depth image watermarks.” In Aucsmith [148], pp. 290–305, ISBN 3- 540-65386-4. [102] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Attacks on copyright marking systems.” In Aucsmith [148], pp. 218– 238, ISBN 3-540-65386-4. [103] G. C. Langelaar, R. L. Lagendijk, and J. Biemond, “Removing spatial spread spectrum watermarks by non-linear filtering.” In 9th European Signal Processing Conference (EUSIPCO’98), pp. 2281–2284, Island of Rhodes, Greece, 8–11 Sep. 1998, ISBN 960-7620-05-4. [104] R. Barnett and D. E. Pearson, “Frequency mode L.R. attack operator for digitally watermarked images.” Electronics Let- ters, vol. 34, no. 19, pp. 1837–1839, Sep. 1998. [105] M. Kutter, “Watermarking resisting to translation, rotation, and scaling.” In Proceedings of SPIE International Symposium on Voice, Video, and Data Communications, vol. 3528, pp. 423–431, Boston, U.S.A., Nov. 1998. [106] P. W. Wong and E. J. Delp, eds., Security and Watermark- ing of Multimedia Contents, vol. 3657, San Jose, California, U.S.A., 25–27 Jan. 1999, The Society for Imaging Science and Technology (IS&T) and the International Society for Optical Engineering (SPIE), SPIE, ISBN 0-8194-3128-1. [107] M. Kutter and F. A. P. Petitcolas, “A fair benchmark for image watermarking systems.” In Wong and Delp [106], pp. 226–239, ISBN 0-8194-3128-1. [108] N. F. Johnson and S. Jajodia, “Steganalysis of images created using current steganography software.” In Aucsmith [148], pp. 273–289, ISBN 3-540-65386-4. [109] S. Craver, B.-L. Yeo, and M. Yeung, “Technical trials and legal tribulations.” Communications of the A.C.M., vol. 41, no. 7, pp. 44–54, Jul. 1998. [110] K. N. Hamdy, A. H. Tewfik, T. Chen, and S. Takagi, “Time- scale modification of audio signals with combined harmonic and wavelet representations.” In International Conference on Acoustics, Speech and Signal Processing (ICASSP’97), vol. 1, pp. 439–442, IEEE, Munich, Germany: IEEE Press, Apr. 1997, Session on Hearing Aids and Computer Music. [111] N. A. Dodgson, “Quadratic interpolation for image resam- pling.” IEEE Transactions on Image Processing, vol. 6, no. 9, pp. 1322–1326, Sep. 1997, ISSN 1057-7149. [112] G. W. Braudaway, “Results of attacks on a claimed robust dig- ital image watermark.” In van Renesse [86], ISBN 0-8194-2556- 7. [113] A. V. Oppenheim and R. W. Schafer, Discrete-Time Signal


Document info
Document views39
Page views39
Page last viewedSat Oct 22 21:37:11 UTC 2016