Abstract is missing.
- Practical steganalysis of digital images: state of the artJessica J. Fridrich, Miroslav Goljan. 1-13 [doi]
- Mathematical approach to steganalysisRajarathnam Chandramouli. 14-25 [doi]
- Communications approach to image steganographyJoachim J. Eggers, Robert Bäuml, Bernd Girod. 26-37 [doi]
- Applied public-key steganographyPierre Guillon, Teddy Furon, Pierre Duhamel. 38-49 [doi]
- Defining security in steganographic systemsStefan Katzenbeisser 0001, Fabien A. P. Petitcolas. 50-56 [doi]
- StegoWall: blind statistical detection of hidden dataSviatoslav Voloshynovskiy, Alexander Herrigel, Yuri B. Rytsar, Thierry Pun. 57-68 [doi]
- Adaptive steganographyRajarathnam Chandramouli, Grace Li, Nasir D. Memon. 69-78 [doi]
- StirMark Benchmark: audio watermarking attacks based on lossy compressionMartin Steinebach, Andreas Lang, Jana Dittmann. 79-90 [doi]
- Quality evaluation of watermarked audio tracksMichael Arnold, Kai Schilz. 91-101 [doi]
- Nth-order audio watermarkingNeil J. Hurley, Guénolé C. M. Silvestre. 102-109 [doi]
- Audio content authentication based on psycho-acoustic modelRegunathan Radhakrishnan, Nasir D. Memon. 110-117 [doi]
- Digimarc MediaBridge: the birth of a consumer product from concept to commercial applicationBurt Perry, Brian MacIntosh, David Cushman. 118-123 [doi]
- Digital watermarking scheme for extremely high-resolution printing imagesYuji Honjo, Kiyoshi Tanaka. 124-131 [doi]
- HIT : a new approach for hiding multimedia information in textEssam A. El-Kwae, Li Cheng. 132-140 [doi]
- Practical off-line authenticationHeajoung Yoo, Seungchul Seo, Sangjin Lee, Jongin Lim. 141-148 [doi]
- Sensitivity labels and invisible identification markings in human-readable outputChristoph Busch, Stephen D. Wolthusen. 149-157 [doi]
- Comparison of two speech content authentication approachesChung-Ping Wu, C. C. Jay Kuo. 158-169 [doi]
- Automatic music monitoring and boundary detection for broadcast using audio watermarkingTaiga Nakamura, Ryuki Tachibana, Seiji Kobayashi. 170-180 [doi]
- Evolution of music score watermarking algorithmChristoph Busch, Paolo Nesi, Martin Schmucker, Marius B. Spinu. 181-193 [doi]
- Scheme of standard MIDI files steganography and its evaluationDaisuke Inoue, Tsutomu Matsumoto. 194-205 [doi]
- Capacity improvement for a blind symbolic music score watermarking techniqueMartin Schmucker. 206-213 [doi]
- Color image watermarking using channel-state knowledgeJosep Vidal, Maribel Madueño, Elisa Sayrol. 214-221 [doi]
- Adaptive color watermarkingAlastair Reed, Brett T. Hannigan. 222-229 [doi]
- Hiding-based compression for improved color image codingPatrizio Campisi, Deepa Kundur, Dimitrios Hatzinakos, Alessandro Neri. 230-239 [doi]
- Watermarking protocols for authentication and ownership protection based on timestamps and hologramsJana Dittmann, Martin Steinebach, Lucilla Croce Ferri. 240-251 [doi]
- Return of ambiguity attacksScott Craver. 252-259 [doi]
- Securing symmetric watermarking schemes against protocol attacksStefan Katzenbeisser 0001, Helmut Veith. 260-268 [doi]
- Links between cryptography and information hidingCaroline Fontaine, Frédéric Raynal. 269-280 [doi]
- Channel model for watermarks subject to desynchronization attacksRobert Bäuml, Joachim J. Eggers, Roman Tzschoppe, Johannes B. Huber. 281-292 [doi]
- Attacks, applications, and evaluation of known watermarking algorithms with CheckmarkPeter Meerwald, Shelby Pereira. 293-304 [doi]
- Design of template in the autocorrelation domainJin S. Seo, Chang D. Yoo. 305-312 [doi]
- Method for the estimation and recovering from general affine transforms in digital watermarking applicationsFrédéric Deguillaume, Sviatoslav Voloshynovskiy, Thierry Pun. 313-322 [doi]
- Robust image watermarking scheme resilient to desynchronization attacksChangryoul Choi, Jechang Jeong. 323-333 [doi]
- Adaptive watermarking using successive subband quantization and perceptual model based on multiwavelet transformKi-Ryong Kwon, Ahmed H. Tewfik. 334-348 [doi]
- Digital watermarking in wavelet domain with predistortion for authenticity verification and localizationDominique A. Winne, Henry D. Knowles, David R. Bull, Cedric Nishan Canagarajah. 349-356 [doi]
- Compression-compatible digital watermark algorithm for authenticity verification and localizationDominique A. Winne, Henry D. Knowles, David R. Bull, Cedric Nishan Canagarajah. 357-367 [doi]
- Blockwise image watermarking system with selective data embedding in wavelet transform domainPao-Chi Chang, Ta-Te Lu, Li-Lin Lee. 368-377 [doi]
- Image watermarking for copyright protection and data hiding via the Mojette transformFlorent Autrusseau, Jean-Pierre V. Guédon. 378-386 [doi]
- Estimation of amplitude modifications before SCS watermark detectionJoachim J. Eggers, Robert Bäuml, Bernd Girod. 387-398 [doi]
- Turbo-coded trellis-based constructions for data hidingJim Chou, Kannan Ramchandran, S. Sandeep Pradhan. 399-408 [doi]
- Optimum decoding and detection of a multiplicative amplitude-encoded watermarkMauro Barni, Franco Bartolini, Alessia De Rosa, Alessandro Piva. 409-420 [doi]
- Performance analysis of information hidingShuichi Shimizu. 421-432 [doi]
- Theoretical framework for watermark capacity and energy estimationRuizhen Liu, Tieniu Tan. 433-440 [doi]
- Watermark design for the Wiener attack and whitening filtered detectionYoungHa Hwang, Kyung A. Moon, Myung J. Kim. 441-449 [doi]
- Improved watermarking scheme by reference signal minglingSoo-Chang Pei, Jun-Horng Chen. 450-457 [doi]
- Watermarking for automatic quality monitoringMatthew J. Holliman, Minerva M. Yeung. 458-469 [doi]
- Computational analysis and system implications of video watermarking applicationsEric Debes, Matthew J. Holliman, William Macy, Yen-Kuang Chen, Minerva M. Yeung. 470-477 [doi]
- Temporal synchronization in video watermarkingEugene T. Lin, Edward J. Delp III. 478-490 [doi]
- Novel approach to collusion-resistant video watermarkingKaren Su, Deepa Kundur, Dimitrios Hatzinakos. 491-502 [doi]
- Real-time video watermarking techniqueHan Ho Lee, Jong J. Chae, Jong-Uk Choi. 503-511 [doi]
- Video watermarking resistance to rotation, scaling, and translationXiamu Niu, Martin Schmucker, Christoph Busch. 512-519 [doi]
- Synchronization-insensitive video watermarking using structured noise patternIwan Setyawan, Geerd Kakes, Reginald L. Lagendijk. 520-530 [doi]
- Video authentication with self-recoveryMehmet Utku Celik, Gaurav Sharma 0001, A. Murat Tekalp, Eli Saber. 531-541 [doi]
- Digital watermarking for secure and adaptive teleconferencingJan C. Vorbrüggen, Niels J. Thorwirth. 542-547 [doi]
- Method for hiding synchronization marks in scale- and rotation-resilient watermarking schemesDamien Delannay, Benoit M. Macq. 548-554 [doi]
- Application of composite invisible image watermarks to simplify detection of a distinct watermark from a large setGordon W. Braudaway, Frederick C. Mintzer. 555-562 [doi]
- Rotation-, scaling-, and translation-robust image watermarking using Gabor kernelsHiuk Jae Shim, Byeungwoo Jeon. 563-571 [doi]
- Lossless data embedding for all image formatsJessica J. Fridrich, Miroslav Goljan, Rui Du. 572-583 [doi]
- Image-feature-based robust digital watermarking schemeChih-Wei Tang, Hsueh-Ming Hang. 584-595 [doi]
- Image watermarking in the Fourier domain based on global features of concentric ring areasWolfgang Funk. 596-599 [doi]
- Image compression and watermarking using lattice vector quantizationJean-Marie Moureaux, Ludovic Guillemot. 600-610 [doi]
- Use of web cameras for watermark detectionJohn Stach, Trenton J. Brundage, Brett T. Hannigan, Brett A. Bradley, Tony Kirk, Hugh Brunk. 611-620 [doi]
- Watermarking 2D-vector data for geographical information systemsMichael Voigt, Christoph Busch. 621-628 [doi]
- Biometric authentication for ID cards with hologram watermarksLucilla Croce Ferri, Astrid Mayerhöfer, Marcus Frank, Claus Vielhauer, Ralf Steinmetz. 629-640 [doi]
- Biometric watermarking based on face recognitionTakami Satonaka. 641-651 [doi]
- Improved key management for digital watermark monitoringVolker Roth 0002, Michael Arnold. 652-658 [doi]
- New semifragile image authentication watermarking techniques using random bias and nonuniform quantizationKurato Maeno, Qibin Sun, Shih-Fu Chang, Masayuki Suto. 659-670 [doi]
- Multivalued semifragile watermarkingYuichi Nakai. 671-678 [doi]
- Wavelet-based reversible watermarking for authenticationJun Tian. 679-690 [doi]
- Security of fragile authentication watermarks with localizationJessica J. Fridrich. 691-700 [doi]
- Fragile and robust watermarking by histogram specificationDinu Coltuc, Philippe Bolon, Jean-Marc Chassery. 701 [doi]