Abstract is missing.
- High capacity reversible watermarking for audioMichiel van der Veen, Fons Bruekers, Arno J. van Leest, Stephane Cavin. 1-11 [doi]
- Robustness evaluation of transactional audio watermarking systemsChristian Neubauer, Martin Steinebach, Frank Siebenhaar, Joerg Pickel. 12-20 [doi]
- Robust audio watermark method using sinusoid patterns based on pseudo-random sequencesZheng Liu, Yoshiyuki Kobayashi, Shusaku Sawato, Akira Inoue. 21-31 [doi]
- Audio watermarking for live performanceRyuki Tachibana. 32-43 [doi]
- Capacity-optimized mp2 audio watermarkingMartin Steinebach, Jana Dittmann. 44-54 [doi]
- Steganalysis of audio based on audio quality metricsHamza Özer, Ismail Avcibas, Bülent Sankur, Nasir D. Memon. 55-66 [doi]
- Audio steganography by amplitude or phase modificationKaliappan Gopalan, Stanley J. Wenndt, Scott F. Adams, Darren M. Haddad. 67-76 [doi]
- Perceptual mask estimation from watermarked imagesSergi Ventosa, Elisa Sayrol, Josep Vidal. 77-84 [doi]
- Perceptual quality evaluation of geometrically distorted images using relevant geometric transformation modelingIwan Setyawan, Damien Delannay, Benoit M. Macq, Reginald L. Lagendijk. 85-94 [doi]
- Exploring effective coefficients in transform-domain perceptual watermarkingChih-Wei Tang, Hsueh-Ming Hang. 95-106 [doi]
- Watermark strength determination based on a new contrast masking modelAbdelhakim Saadane. 107-114 [doi]
- Optimizing watermark robustness with respect to a perceptual distortion constraintJustin Picard, Arnaud Robert. 115-122 [doi]
- Active steganalysis of sequential steganographyShalin P. Trivedi, Rajarathnam Chandramouli. 123-130 [doi]
- Steganalysis of additive-noise modelable information hidingJeremiah J. Harmsen, William A. Pearlman. 131-142 [doi]
- New methodology for breaking steganographic techniques for JPEGsJessica J. Fridrich, Miroslav Goljan, Dorin Hogea. 143-155 [doi]
- Steganographic system based on higher-order statisticsRoman Tzschoppe, Robert Bäuml, Johannes B. Huber, André Kaup. 156-166 [doi]
- SmartSearch steganalysisJeffrey A. Bloom, Rafael Alonso. 167-172 [doi]
- Steganography capacity: a steganalysis perspectiveRajarathnam Chandramouli, Nasir D. Memon. 173-177 [doi]
- Higher-order statistical steganalysis of palette imagesJessica J. Fridrich, Miroslav Goljan, David Soukal. 178-190 [doi]
- Digital image steganography using stochastic modulationJessica J. Fridrich, Miroslav Goljan. 191-202 [doi]
- Exhaustive geometrical search and the false positive watermark detection probabilityJeroen Lichtenauer, Iwan Setyawan, Ton Kalker, Reginald L. Lagendijk. 203-214 [doi]
- Optimized selection of benchmark test parameters for image watermark algorithms based on Taguchi methods and corresponding influence on design decisions for real-world applicationsTony Rodriguez, David Cushman. 215-228 [doi]
- Signal processing for smart cardsJean-Jacques Quisquater, David Samyde. 229-239 [doi]
- Applications of a hologram watermarking protocol: aging-aware biometric signature verification and time validity check with personal documentsClaus Vielhauer, Lucilla Croce Ferri. 240-248 [doi]
- Implementation of ID card system using optodigital information hiding schemeJung-Jin Kim, Jin-Hyuk Choi, Eun-Soo Kim. 249-259 [doi]
- Biometric data reduction for embedding in small imagesNaseem Ishaq Qazi. 260-268 [doi]
- Application of blurring filters to improve detection of invisible image watermarksGordon W. Braudaway, Frederick C. Mintzer. 269-277 [doi]
- Wide spread spectrum watermarking with side information and interference cancellationGaëtan Le Guelvouit, Stéphane Pateux. 278-289 [doi]
- Advantages and drawbacks of multiplicative spread spectrum watermarkingMauro Barni, Franco Bartolini, Alessia De Rosa. 290-299 [doi]
- Watermarking Wigner distributionBijan G. Mobasseri. 300-310 [doi]
- Improved polynomial detectors for side-informed watermarkingJonathan Delhumeau, Teddy Furon, Neil J. Hurley, Guénolé C. M. Silvestre. 311-321 [doi]
- Watermark detection algorithm in multimedia using statistical decision theorySeong Geun Kwon, Ki-Ryong Kwon, Kuhn-Il Lee. 322-329 [doi]
- Enhanced robustness in image watermarking using turbo codesChristian Rey, Karine Amis, Jean-Luc Dugelay, Ramesh Pyndiah, Annie Picart. 330-336 [doi]
- 3D watermarking design evaluationOliver Benedens, Jana Dittmann, Fabien A. P. Petitcolas. 337-348 [doi]
- Autocorrelation-function-based watermarking with side informationChoong-Hoon Lee, Heung-Kyu Lee, Young-Ho Suh. 349-358 [doi]
- Feature-based watermarking of 2D vector dataMichael Voigt, Christoph Busch. 359-366 [doi]
- Informed digital watermark embedding based on guided scramblingAkiomi Kunisa. 367-378 [doi]
- Analysis of data hiding technologies for medical imagesAlessandro Piva, Franco Bartolini, Iuve Coppini, Alessia De Rosa, Elena Tamburini. 379-390 [doi]
- Real-time watermarking techniques for sensor networksJessica Fang, Miodrag Potkonjak. 391-402 [doi]
- Music score watermarking by clef modificationsMartin Schmucker, Hongning Yan. 403-412 [doi]
- Visible encryption: using paper as a secure channelNorberto Degara-Quintela, Fernando Pérez-González. 413-422 [doi]
- Multiresolution binary image embeddingPing Wah Wong. 423-429 [doi]
- Watermarking spot colorsOsama M. Alattar, Alastair Reed. 430-439 [doi]
- Evaluation of watermarking low-bit-rate MPEG-4 bit streamsAdnan M. Alattar, Mehmet Utku Celik, Eugene T. Lin. 440-451 [doi]
- Authentication of MPEG-4 data: risks and solutionsAndreas Lang, Stefan Thiemert, Enrico Hauer, Huajian Liu, Fabien A. P. Petitcolas. 452-461 [doi]
- Video watermarking system using selection and overlapping of region by features of consecutive framesHye-Joo Lee, Jin Woo Hong. 462-470 [doi]
- Watermark recovery from 2D views of a 3D video objectEmmanuel Garcia, Jean-Luc Dugelay. 471-480 [doi]
- Temporal alignment of video sequences for watermarking systemsDamien Delannay, Cédric De Roover, Benoit M. Macq. 481-492 [doi]
- Temporal synchronization in video watermarking: further studiesEugene T. Lin, Edward J. Delp III. 493-504 [doi]
- Protection of multicast scalable video by secret sharing: simulation resultsAhmet M. Eskicioglu, Scott D. Dexter, Edward J. Delp III. 505-515 [doi]
- Key-based video watermarking system on MPEG-2Shiau-Jen Weng, Ta-Te Lu, Pao-Chi Chang. 516-525 [doi]
- On digital cinema and watermarkingArno J. van Leest, Jaap Haitsma, Ton Kalker. 526-535 [doi]
- Robust content-dependent high-fidelity watermark for tracking in digital cinemaJeffrey Lubin, Jeffrey A. Bloom, Hui Cheng. 536-545 [doi]
- Watermarking requirements for Boeing digital cinemaJohn P. Lixvar. 546-552 [doi]
- Registration methods for nonblind watermark detection in digital cinema applicationsPhilippe Nguyen, Raphaèle Balter, Nicolas Montfort, Séverine Baudry. 553-562 [doi]
- Digital rights language support for evolving digital cinema requirementsXavier Orri, Joan-Maria Mas, Benoit M. Macq. 563-573 [doi]
- Semantically transparent fingerprinting for right protection of digital cinemaXiaolin Wu. 574-579 [doi]
- Data hiding capacity analysis for real images based on stochastic nonstationary geometrical modelsSviatoslav Voloshynovskiy, Oleksiy J. Koval, Frédéric Deguillaume, Thierry Pun. 580-593 [doi]
- Limits of error correction coding in video watermarkingMarcel Ambroze, Martin Tomlinson, Cristian Vasile Serdean, Graham Wade. 594-603 [doi]
- Capacity bounds and constructions for reversible data-hidingTon Kalker, Frans M. J. Willems. 604-611 [doi]
- Optimality of SCS watermarkingRobert Bäuml, Roman Tzschoppe, André Kaup, Johannes B. Huber. 612-622 [doi]
- Hexagonal quantizers are not optimal for 2D data hidingFélix Balado, Fernando Pérez-González. 623-631 [doi]
- New wrinkle in dirty paper techniquesBrett A. Bradley, John Stach. 632-643 [doi]
- Security of visual hash functionRegunathan Radhakrishnan, Ziyou Xiong, Nasir D. Memon. 644-652 [doi]
- Invertible authentication for 3D meshesJana Dittmann, Oliver Benedens. 653-664 [doi]
- New alteration detecting technique for printed documents using dot pattern watermarkingMasahiko Suzaki, Yasuhiro Mitsui, Masayuki Suto. 665-676 [doi]
- Advanced techniques for dispute resolving and authorship proofs on digital worksAndré Adelsbach, Ahmad-Reza Sadeghi. 677-688 [doi]
- Localized lossless authentication watermark (LAW)Mehmet Utku Celik, Gaurav Sharma 0001, A. Murat Tekalp, Eli Saber. 689-698 [doi]
- Host-aware spread spectrum watermark embedding techniquesHugh Brunk. 699-707 [doi]
- Oblivious image watermarking combined with JPEG compressionQing Chen, Henri Maître, Béatrice Pesquet-Popescu. 708-716 [doi]
- Empirical evaluation of a JPEG2000 standard-based robust watermarking schemeJulià Minguillón, Jordi Herrera-Joancomartí, David Megías. 717-727 [doi]
- Key-dependent pyramidal wavelet domains for secure watermark embeddingWerner Dietl, Peter Meerwald, Andreas Uhl. 728 [doi]