Abstract is missing.
- Watermarking by DCT coefficient removal: a statistical approach to optimal parameter settingsGerhard C. Langelaar, Reginald L. Lagendijk, Jan Biemond. 2-13 [doi]
- Selective block assignment approach for robust digital image watermarkingKam-Shing Ng, Lee-Ming Cheng. 14-20 [doi]
- Secure robust digital watermarking using the lapped orthogonal transformShelby Pereira, Joseph Ó Ruanaidh, Thierry Pun. 21-30 [doi]
- DWT-based technique for spatio-frequency masking of digital signaturesMauro Barni, Franco Bartolini, Vito Cappellini, Alessandro Lippi, Alessandro Piva. 31-39 [doi]
- Perceptual watermarks for digital images and videoRaymond B. Wolfgang, Christine Podilchuk, Edward J. Delp III. 40-53 [doi]
- Issues and solutions for authenticating MPEG videoChing-Yung Lin, Shih-Fu Chang. 54-65 [doi]
- Verification watermarks on fingerprint recognition and retrievalSharathchandra Pankanti, Minerva M. Yeung. 66-78 [doi]
- Fragile imperceptible digital watermark with privacy controlDon Coppersmith, Frederick C. Mintzer, Charles Philippe Tresser, Chai Wah Wu, Minerva M. Yeung. 79-84 [doi]
- Content-based integrity protection of digital imagesMaria Paula Queluz. 85-95 [doi]
- Exploring CDMA for watermarking of digital videoBijan G. Mobasseri. 96-102 [doi]
- Video watermarking system for broadcast monitoringTon Kalker, Geert Depovere, Jaap Haitsma, Maurice Maes. 103-112 [doi]
- Robust 3D DFT video watermarkingFrédéric Deguillaume, Gabriela Csurka, Joseph Ó Ruanaidh, Thierry Pun. 113-124 [doi]
- IPR techniques applied to a multimedia environment in the HYPERMEDIA projectAlberto Muñoz, Arturo Ribagorda, José M. Sierra. 125-133 [doi]
- Watermark extimation through local pixel correlationMatthew J. Holliman, Nasir D. Memon, Minerva M. Yeung. 134-146 [doi]
- Spread spectrum watermarking: malicious attacks and counterattacksFrank Hartung, Jonathan K. Su, Bernd Girod. 147-158 [doi]
- Channel model for a watermark attackJonathan K. Su, Frank Hartung, Bernd Girod. 159-170 [doi]
- Combining digital watermarks and collusion-secure fingerprints for digital imagesJana Dittmann, Alexander Behr, Mark Stabenau, Peter Schmitt, Jörg Schwenk, Johannes Ueberberg. 171-183 [doi]
- Text-indicated speaker verification method using PSI-CELP parametersTakefumi Mogaki, Naohisa Komatsu, Hiroaki Nishikawa. 184-193 [doi]
- Noninvertible watermarking methods for MPEG-encoded audioLintian Qiao, Klara Nahrstedt. 194-203 [doi]
- Fragile watermarking using the VW2D watermarkRaymond B. Wolfgang, Edward J. Delp III. 204-213 [doi]
- Comparing robustness of watermarking techniquesJessica J. Fridrich, Miroslav Goljan. 214-225 [doi]
- Fair benchmark for image watermarking systemsMartin Kutter, Fabien A. P. Petitcolas. 226-239 [doi]
- OCTALIS benchmarking: comparison of four watermarking techniquesLaurent Piron, Michael Arnold, Martin Kutter, Wolfgang Funk, Jean M. Boucqueau, Fiona Craven. 240-251 [doi]
- Watermarking by histogram specificationDinu Coltuc, Philippe Bolon. 252-263 [doi]
- Geometrical and frequential watermarking scheme using similaritiesPatrick Bas, Jean-Marc Chassery, Franck Davoine. 264-272 [doi]
- Digital image watermarking by salient point modification: practical resultsPeter M. J. Rongen, Maurice J. Maes, Kees van Overveld. 273-282 [doi]
- Watermarking with quadratic residuesMikhail J. Atallah, Samuel S. Wagstaff Jr.. 283-288 [doi]
- Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal Public Key Crypto SystemNasir D. Memon, Ping Wah Wong. 289-295 [doi]
- Blind digital watermarking for cartoon and map imagesPo-Chyi Su, C. C. Jay Kuo, Houng-Jyh Mike Wang. 296-306 [doi]
- Watermarking of dither halftoned imagesZachi Baharav, Doron Shaked. 307-316 [doi]
- Marking and detection of text documents using transform-domain techniquesYong Liu, Jonathon Mant, Edward Wong, Steven H. Low. 317-328 [doi]
- Watermarking of 3D-polygon-based models with robustness against mesh simplificationOliver Benedens. 329-341 [doi]
- Dither modulation: a new approach to digital watermarking and information embeddingBrian Chen, Gregory W. Wornell. 342-353 [doi]
- Algebraic construction of a new class of quasi-orthogonal arrays for steganographyRon G. van Schyndel, Andrew Z. Tirkel, Imants D. Svalbe, Thomas E. Hall, Charles F. Osborne. 354-364 [doi]
- Steganograpic image transformationShuichi Takano, Kiyoshi Tanaka, Tatsuo Sugimura. 365-374 [doi]
- R/D optimal data hidingPaolo Prandoni, Martin Vetterli. 375-385 [doi]
- Technique for image data hiding and reconstruction without host imageJong Jin Chae, B. S. Manjunath. 386-396 [doi]
- Reversible digital imagesKeith T. Knox. 397-403 [doi]
- Extraction of multiresolution watermark images for resolving rightful ownershipWenjun Zeng, Bede Liu, Shawmin Lei. 404-414 [doi]
- Recovering modified watermarked images with reference to the original imageQibin Sun, Jiankang Wu, Robert H. Deng. 415-424 [doi]
- Maximum-likelihood sequence decoding of digital image watermarkingGeorge F. Elmasry, Yun-Qing Shi. 425-436 [doi]
- Capacity of the watermark channel: how many bits can be hidden within a digital image?Mauro Barni, Franco Bartolini, Alessia De Rosa, Alessandro Piva. 437-448 [doi]
- Digital watermarking systems with chaotic sequencesHui Xiang, Lindong Wang, Hai Lin 0003, Jiaoying Shi. 449-459 [doi]
- Secure multicast protocol with copyright protectionHao-Hua Chu, Lintian Qiao, Klara Nahrstedt. 460-471 [doi]
- Architecture of security management unit for safe hosting of multiple agentsTanguy Gilmont, Jean-Didier Legat, Jean-Jacques Quisquater. 472-483 [doi]
- Agent-based copyright protection architecture for online electronic publishingXun Yi, S. Kitazawa, Eiji Okamoto, Xiao Feng Wang, Kwok-Yan Lam, S. Tu. 484-493 [doi]
- Securing the anonymity of content providers in the World Wide WebThomas Demuth, Andreas Rieke. 494-502 [doi]
- Coding and modulation in watermarking and data hidingBo Tao, Michael T. Orchard. 503 [doi]