• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,862
Next 10 →

Secure spread spectrum watermarking for multimedia

by Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, Talal Shamoon - IEEE TRANSACTIONS ON IMAGE PROCESSING , 1997
"... This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. We advocate that a watermark should be constructed as an independent and identically distributed (i.i.d.) Gauss ..."
Abstract - Cited by 1100 (10 self) - Add to MetaCart
.i.d.) Gaussian random vector that is imperceptibly inserted in a spread-spectrum-like fashion into the perceptually most significant spectral components of the data. We argue that insertion of a watermark under this regime makes the watermark robust to signal processing operations (such as lossy compression

Secure Spread-Spectrum Watermarking for Telemedicine Applications

by Basant Kumar, Harsh Vikram Singh, Surya Pal Singh , 2010
"... This paper presents a secure spread-spectrum watermarking algorithm for digital images in discrete wavelet transform (DWT) domain. The algorithm is applied for embedding watermarks like patient identification/ source identification or doctors signature in binary image format into host digital radiol ..."
Abstract - Add to MetaCart
This paper presents a secure spread-spectrum watermarking algorithm for digital images in discrete wavelet transform (DWT) domain. The algorithm is applied for embedding watermarks like patient identification/ source identification or doctors signature in binary image format into host digital

Using Secured Spread Spectrum Technique Abstract

by K. Anusudha, A. Sangeetha
"... Digital watermarking has been proposed to increase the digital data security, confidentiality and integrity. Satellite image watermarking is a special category of image watermarking in the sense that the images have special requirements. Particularly, watermarked satellite images should not differ p ..."
Abstract - Add to MetaCart
perceptually from the original counterparts, because the purpose of taking the image must not be violated. This paper provides spread spectrum watermarking of the satellite image by choosing a region of interest and embedding the watermark in the same. The reason for choosing a region of interest is an area

SECURE SPREAD SPECTRUM WATERMARKING FOR IMAGES, AUDIO AND VIDEO

by Ingemar J. Cox-t, Joe Kiliant, Tom Leightont, Tala Shamoont
"... We describe a digital watermarking method for use in au-dio, image, video and multimedia data. We argue that a watermark must be placed in perceptually significant com-ponents of a signal if it is to be robust to common signal distortions and malicious attack. However, it is well known that modifica ..."
Abstract - Add to MetaCart
that modification of these components can lead to percep-tual degradation of the signal. To avoid this, we propose to insert a watermark into the spectral components of the data using techniques analogous to spread sprectrum communi-cations, hiding a narrow band signal in a wideband channel that is the data

Ann. Telecommun. DOI 10.1007/s12243-009-0119-9 Comparison of secure spread-spectrum modulations applied to still image watermarking

by Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq, P. Bas, F. Cayre, B. Mathon, B. Macq, B. Macq , 2008
"... Abstract This article shows the results obtained when using secure spread-spectrum watermarking on gray-scale images in the watermark only attack (WOA) framework. Two secure modulations, natural water-marking (NW) and circular watermarking (CW), are compared with classical insecure modulations, spre ..."
Abstract - Add to MetaCart
Abstract This article shows the results obtained when using secure spread-spectrum watermarking on gray-scale images in the watermark only attack (WOA) framework. Two secure modulations, natural water-marking (NW) and circular watermarking (CW), are compared with classical insecure modulations

applied to still image watermarking

by Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq, P. Bas, F. Cayre, B. Mathon, B. Macq, B. Macq , 2009
"... Comparison of secure spread-spectrum modulations ..."
Abstract - Add to MetaCart
Comparison of secure spread-spectrum modulations

SPINS: Security Protocols for Sensor Networks

by Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar , 2001
"... As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. We design a suite of security building blocks that are optimized ..."
Abstract - Cited by 1094 (30 self) - Add to MetaCart
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. We design a suite of security building blocks that are optimized

Ultra-wide bandwidth time-hopping spread spectrum impulse radio for wireless access communications

by Moe Z. Win, Robert A. Scholtz - IEEE TRANS. COMMUN , 2000
"... Attractive features of time-hopping spread-spectrum multiple-access systems employing impulse signal technology are outlined, and emerging design issues are described. Performance of such communications systems in terms of achievable transmission rate and multiple-access capability are estimated fo ..."
Abstract - Cited by 456 (16 self) - Add to MetaCart
Attractive features of time-hopping spread-spectrum multiple-access systems employing impulse signal technology are outlined, and emerging design issues are described. Performance of such communications systems in terms of achievable transmission rate and multiple-access capability are estimated

The Determinants of Credit Spread Changes.

by Pierre Collin-Dufresne , Robert S Goldstein , J Spencer Martin , Gurdip Bakshi , Greg Bauer , Dave Brown , Francesca Carrieri , Peter Christoffersen , Susan Christoffersen , Greg Duffee , Darrell Duffie , Vihang Errunza , Gifford Fong , Mike Gallmeyer , Laurent Gauthier , Rick Green , John Griffin , Jean Helwege , Kris Jacobs , Chris Jones , Andrew Karolyi , Dilip Madan , David Mauer , Erwan Morellec , Federico Nardari , N R Prabhala , Tony Sanders , Sergei Sarkissian , Bill Schwert , Ken Singleton , Chester Spatt , René Stulz - Journal of Finance , 2001
"... ABSTRACT Using dealer's quotes and transactions prices on straight industrial bonds, we investigate the determinants of credit spread changes. Variables that should in theory determine credit spread changes have rather limited explanatory power. Further, the residuals from this regression are ..."
Abstract - Cited by 422 (2 self) - Add to MetaCart
ABSTRACT Using dealer's quotes and transactions prices on straight industrial bonds, we investigate the determinants of credit spread changes. Variables that should in theory determine credit spread changes have rather limited explanatory power. Further, the residuals from this regression

Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding

by Brian Chen, Gregory W. Wornell - IEEE TRANS. ON INFORMATION THEORY , 1999
"... We consider the problem of embedding one signal (e.g., a digital watermark), within another "host" signal to form a third, "composite" signal. The embedding is designed to achieve efficient tradeoffs among the three conflicting goals of maximizing information-embedding rate, mini ..."
Abstract - Cited by 496 (14 self) - Add to MetaCart
distortion--robustness tradeoffs than currently popular spread-spectrum and low-bit(s) modulation methods. Furthermore, we show that for some important classes of probabilistic models, DC-QIM is optimal (capacity-achieving) and regular QIM is near-optimal. These include both additive white Gaussian noise
Next 10 →
Results 1 - 10 of 5,862
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University