Bender, W.,Gruhl, D.,Morimoto, N., and Lu, A., Techniques for Data Hiding, IBM Systems Journal, 35, 3 and 4, 1996.

Braudaway, G.W., Protecting Publicly Available Images with an Invisible Image Watermark, IBM Watson Research Center.

Cox, I.J.,Kilian, J.,Leighton, T., and Shamoon, T., A Secure Robust Watermark for Multimedia, University of Cambridge, U.K., 1996.

Eggers, J.J.,Su, J.K., and Girod, B., Asymmetric Watermarking Schemes, University of Erlangen-Nuremberg, 2000.

Gruhl, D. and Bender, W., Information Hiding to Foil the Casual Counterfeiter, Information Hiding Workshop, 1998.

Hartung, F. and Girod, B., Watermarking of Compressed and Uncompressed Video, University of Erlangen-Nuremberg, 1998.

Hernandez, J.R. and Perez-Gonzalez, F., Throwing More Light on Image Watermarks, Universidad di Vigo.

Herrigel, A.,Ruandiadh, J.O.,Peterson, H.,Pereira, S., and Pun, T., Secure Copyright Protection Techniques for Digital Images, University of Geneva.

Judge, J.C., Steganography: Past, Present, and Future, SANS, 2001.

Katzenbeisser, S. and Petitcolas, F.A.P. (Eds.), Information Hiding: Techniques for Steganography and Watermarking, Artech House, Boston, 2000.

Marvel, L.M.,Boncelet, C.G., Jr., and Retter, C.T., "Reliable Blind Information Hiding for Images," International Workshop on Information Hiding, April 1998.

Mintzer, F.,Lotspiech, J., and Morimoto, N., "Safeguarding Digital Library Contents and Users," D-Lib Magazine, December 1997.

Swanson, M.D.,Kobayashi, M., and Tewfik, A.H., "Multimedia Data-Embedding and Watermarking Technologies," IEEE, 86, 6, June 1998.

Wu, M., Silent Messages and Invisible Pictures, Electrical Engineering Dept., Princeton University, 2000.

Investigator's Guide to Steganography
Investigators Guide to Steganography
ISBN: 0849324335
EAN: 2147483647
Year: 2003
Pages: 220

Similar book on Amazon © 2008-2017.
If you may any questions please contact us: