Ausgeblendete Felder
Books Bücher
" Proceedings of the IEEE, Special Issue on Identification and Protection of Multimedia Information, Vol. 87, No. 7, 1 127-1 141, 1999. 1 1 . IJ Cox, J Kilian, FT Leighton and T Shamoon, Secure spread spectrum watermarking for multimedia. "
Informed Watermarking - Seite 177
von Joachim Eggers, Bernd Girod - 2002 - 182 Seiten
Eingeschränkte Leseprobe - Über dieses Buch

Disappearing Cryptography: Information Hiding : Steganography & Watermarking

Peter Wayner - 2002 - 444 Seiten
...Deepa Kundur and D. Hatzinakos. Digital watermarking for telltale tamper-proofing and authentication. Proceedings of the IEEE Special Issue on Identification and Protection of Multimedia Information, 87(7): 1167-1 180, July 1999. D. Knuth. The Art of Computer Programming: Volume 2, Seminumerical Algorithms....
Eingeschränkte Leseprobe - Über dieses Buch

Soft Computing and Industry: Recent Applications

Rajkumar Roy - 2002 - 894 Seiten
...35-43. 3. FAP Petitcolas, RJ Anderson, and MG Kuhn (1999), "Information hiding - a survey," in Proc. of the IEEE - Special Issue on Identification and Protection of Multimedia Information, pp. 1062-1078. 4. F. Hartung and M. Kutter (1999), "Multimedia watermarking techniques," in Proc. of...
Eingeschränkte Leseprobe - Über dieses Buch

Multimedia Data Hiding

Min Wu, Bede Liu - 2003 - 244 Seiten
...D. Kundur and D. Hatzinakos: "Digital Watermarking for Telltale Tamper-Proofing and Authentication," Proceedings of the IEEE, Special Issue on Identification and Protection of Multimedia Information, vol. 87, no. 7, pp. 1167-1 180, July 1999. [126] CY Lin, SF Chang: "A Robust Image Authentication Method...
Eingeschränkte Leseprobe - Über dieses Buch

Information Security Applications: 6th International Workshop, WISA 2005 ...

Taekyoung Kwon - 2006 - 396 Seiten
...2003, San Diego CA. (2003)191-201. 10. F. Hartung and M. Kutter.: Multimedia Watermarking Techniques, Proceedings of the IEEE, Special Issue on Identification and Protection of Multimedia Information 87. (1999). Video Fingerprinting System Using Wavelet and Error Correcting Code Hyunho Kang1, Brian...
Eingeschränkte Leseprobe - Über dieses Buch

Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2007 ...

Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang, Qing Yang, Xueqi Cheng, Jue Wang, Fei-Yue Wang, Hsinchun Chen - 2007 - 332 Seiten
...Kunder D. and Hatzinakos D.: Digital watermarking for telltale tamper-proofing and authentication. Proceedings of the IEEE (Special Issue on Identification and Protection of Multimedia Information). 87(1999) 1167-1180 8. Wagner NR, Fountain RL, and Hazy RJ: The fingerprinted database. 6th International...
Eingeschränkte Leseprobe - Über dieses Buch

Information Hiding: 8th International Workshop, IH 2006, Alexandria, VA, USA ...

Jan Camenisch - 2007 - 396 Seiten
...Artech House Publishers (2000) 17. Hartung, F., Kutter, M.: Multimedia watermarking techniques. In: Proceedings of the IEEE, Special Issue on Identification and Protection of Multimedia Information, vol. 87, pp. 1079-1107 (1999) 18. Adelsbach, A., Sadeghi, AR: Advanced techniques for dispute resolving...
Eingeschränkte Leseprobe - Über dieses Buch

Digitale Wasserzeichen

Fabian Kannemann - 2007 - 29 Seiten
...Ton/Linnartz, Jean-Paul/Miller Matt, L./Traw, Brendan (1999): Copy Protection for DVD Video. In: Proc. of the IEEE, Special Issue on Identification and Protection of Multimedia Information, 87, 7, 1999. S. 1267-1276. Cox, Ingemar J./Kilian, Joe/Leighton, T./Shamoon, T. (1996a): A secure,...
Eingeschränkte Leseprobe - Über dieses Buch




  1. Meine Mediathek
  2. Hilfe
  3. Erweiterte Buchsuche