Author:
Dittmann Jana,Franz Elke,Schneidewind Antje
Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Information Systems
Reference37 articles.
1. Ahsan K, Kundur D (2002) Practical Data Hiding in TCP/IP. Proc Workshop on Multimedia Security at ACM Multimedia ’02, French Riviera, December 2002
2. Cachin C: An Information-Theoretic Model for Steganography. In: [Aucs_98], pp 306–318
3. Chen B, Wornell GW (2001) Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE T Inform Theory 47(4):1423–1443
4. Csurka G, Deguillaume F, Ruanaidh JJKÓ, Pun T (2000) A Bayesian approach to affine transformation resistant image and video watermarking. In: Pfitzmann A (ed) Information Hiding, 3rd International Workshop. Dresden, Germany, September/October 1999, Proc, Springer, LNCS 1768, pp 270–285
5. Cox IJ, Kilian J, Leighton Z, Shamoon T (1996) Secure Spread Spectrum Watermarking for Images, Audio and Video. In: Proc ICIP’96, pp 243–246