Journals starting with dw0

DW02 * *IWDW
* BER Formulation for the Blind Retrieval of MPEG Video Watermark
* Content Adaptive Watermark Embedding in the Multiwavelet Transform Using a Stochastic Image Model
* Design and Application of DWT-Domain Optimum Decoders, The
* DWT-Based Fragile Watermarking Tolerant of JPEG Compression, A
* Enhanced Watermarking Scheme Based on Removal of Local Means
* Image Normalization Using Invariant Centroid for RST Invariant Digital Image Watermarking
* Image Watermarking Algorithm Robust to Geometric Distortion, An
* Implications for Image Watermarking of Recent Work in Image Analysis and Representation
* Information-Hiding Games
* Informed Embedding for Multi-bit Watermarks
* Multi-user Based Watermarking System with Two-Security-Level Keys, A
* Multistage VQ Based Watermarking Technique with Fake Watermarks, A
* New Blind Watermarking Technique Based on Independent Component Analysis, A
* New Collusion Attack and Its Performance Evaluation, A
* On Watermarking Numeric Sets
* Optimal Detection of Transform Domain Additive Watermark by Using Low Density Diversity
* Robust Local Watermarking on Salient Image Areas
* Spatial Frequency Band Division in Human Visual System Based-Watermarking
* SVD-Based Fragile Watermarking Scheme for Image Authentication, A
* Two-Step Detection Algorithm in a HVS-Based Blind Watermarking of Still Images
* Watermarking Techniques for Electronic Circuit Design
22 for DW02

DW03 * *IWDW
* Audio Watermarking Based on Music Content Analysis: Robust against Time Scale Modification
* Authentication of 3-D Polygonal Meshes
* Coefficient Selection Methods for Scalable Spread Spectrum Watermarking
* Content-Dependent Anti-disclosure Image Watermark
* Data-Hiding Capacity Improvement for Text Watermarking Using Space Coding Method
* Echo Watermarking in Sub-band Domain
* EM Estimation of Scale Factor for Quantization-Based Audio Watermarking
* Enhancement Methods of Image Quality in Screen Mark Attack
* Feature-Watermarking Scheme for JPEG Image Authentication, A
* High Quality Perceptual Steganographic Techniques
* Highly Reliable Stochastic Perceptual Watermarking Model Based on Multiwavelet Transform
* Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet Transform
* Image Steganography and Steganalysis: Concepts and Practice
* Importance of Aliasing in Structured Quantization Index Modulation Data Hiding, The
* Increasing Robustness of an Improved Spread Spectrum Audio Watermarking Method Using Attack Characterization
* Intelligent Watermark Detection Decoder Based on Independent Component Analysis, An
* Lossless Watermarking Considering the Human Visual System
* Metadata Hiding for Content Adaptation
* Method to Improve the Stego-Image Quality for Palette-Based Image Steganography, A
* Model-Based Steganography
* Modification of Polar Echo Kernel for Performance Improvement of Audio Watermarking
* Multi-bit Video Watermarking Based on 3D DFT Using Perceptual Models
* Natural Language Watermarking Using Semantic Substitution for Chinese Text
* New Digital Watermarking for Architectural Design Drawing Using LINEs and ARCs Based on Vertex, A
* Normalization Domain Watermarking Method Based on Pattern Extraction
* On Perceptual Quality of Watermarked Images: An Experimental Approach
* On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving
* On the Integration of Watermarks and Cryptography
* Optimal Data-Hiding Strategies for Games with BER Payoffs
* Performance Analysis of Order Statistical Patchwork
* Performance Measurement of Watermark Embedding Patterns
* Public Watermark Detection Using Multiple Proxies and Secret Sharing
* Resilient Information Hiding for Abstract Semi-structures
* Robust Audio Watermarking Using Both DWT and Masking Effect
* Robust Logo Multiresolution Watermarking Based on Independent Component Analysis Extraction, A
* Robust Printed Image Watermarking Based on Iterative Halftoning Method, A
* Robust Watermarking with Adaptive Receiving
* Robust Wavelet-Based Information Hiding through Low-Density Parity-Check (LDPC) Codes
* Rotation-Tolerant Watermark Detection Using Circular Harmonic Function Correlation Filter
* RST-Resistant Image Watermarking Using Invariant Centroid and Reordered Fourier-Mellin Transform
* Secure Steganographic Scheme against Statistical Analyses, A
* Secure Video Watermarking via Embedding Strength Modulation
* Semi-fragile Watermarking for Tamper Proofing and Authentication of Still Images
* Three-Dimensional Watermarking Algorithm Using the DCT Transform of Triangle Strips, A
* Towards Generic Detection Scheme in Zero Knowledge Protocol for Blind Watermark Detection
* Use of Motion Estimation to Improve Video Watermarking for MPEG Encoders
* Watermark Embedding for Black-Box Channels
* Watermarking Scheme Applicable for Fingerprinting Protocol, A
49 for DW03

DW04 * *IWDW
* Alteration-Locating Authentication Watermarking for Binary Images
* Better Use of Human Visual Model in Watermarking Based on Linear Prediction Synthesis Filter
* Counter-Geometric Distortions Data Hiding Scheme Using Double Channels in Color Images, A
* Cryptanalysis of a Wavelet Based Watermarking Scheme
* Fidelity-Controlled Robustness Enhancement of Blind Watermarking Schemes Using Evolutionary Computational Techniques
* Fingerprinting Curves
* Flaws in Generic Watermarking Protocols Based on Zero-Knowledge Proofs
* Generalization of an Anonymous Buyer-Seller Watermarking Protocol and Its Application to Mobile Communications, A
* Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems, A
* Informed Detection Revisited
* Multi-feature Based Invertible Authentication Watermarking for JPEG Images, A
* On Security Notions of Steganographic Systems
* Reversible Data Hiding
* Reversible Data Hiding Using Integer Wavelet Transform and Companding Technique
* Robust Estimation of Amplitude Modification for Scalar Costa Scheme Based Audio Watermark Detection
* Robust Frequency Domain Audio Watermarking: A Tuning Analysis
* Robust Watermarking on Polygonal Meshes Using Distribution of Vertex Norms
* Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition, A
* Steganographic Scheme Using a Block Cipher
* Towards the Public but Noninvertible Watermarking
* Video Watermarking Using the 3-D Wavelet Transform and Two Perceptual Watermarks, A
* Watermarking Attack: Security of WSS Techniques
* Watermarking System for QoS Aware Content Adaptation
* Watermarking Technique for Authentication of 3-D Polygonal Meshes
* Weighted Segmented Digital Watermarking
26 for DW04

DW06 * *IWDW
* Adaptive Video Watermarking Utilizing Video Characteristics in 3D-DCT Domain
* Analysis and Comparison of Typical Reversible Watermarking Methods
* Analysis of Optimal Search Interval for Estimation of Modified Quantization Step Size in Quantization-Based Audio Watermark Detection
* Attack on JPEG2000 Steganography Using LRCA
* Capacity Enhancement of Compressed Domain Watermarking Channel Using Duo-binary Coding
* Category Attack for LSB Steganalysis of JPEG Images
* Colorization Based Animation Broadcast System with Traitor Tracing Capability, A
* Data Hiding in Film Grain
* Desynchronization in Compression Process for Collusion Resilient Video Fingerprint
* Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition
* Error Resilient Image Authentication Using Feature Statistical and Spatial Properties
* Geometric Invariant Domain for Image Watermarking
* Improved Differential Energy Watermarking for Embedding Watermark
* Intellectual Property Rights Management Using Combination Encryption in MPEG-4
* Joint Screening Halftoning and Visual Cryptography for Image Protection
* Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets
* Low-Cost Attack on Branch-Based Software Watermarking Schemes, A
* Multi Bit Plane Image Steganography
* New Multi-set Modulation Technique for Increasing Hiding Capacity of Binary Watermark for Print and Scan Processes, A
* Novel Multibit Watermarking Scheme Combining Spread Spectrum and Quantization, A
* Reversible Watermarking Based on Histogram Shifting, A
* Reversible Watermarking for Error Diffused Halftone Images Using Statistical Features
* Robust Audio Watermarking Based on Low-Order Zernike Moments
* Robust Video Watermarking Scheme Via Temporal Segmentation and Middle Frequency Component Adaptive Modification, A
* Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform, A
* Scalable Protection and Access Control in Full Scalable Video Coding
* Secure Quantization Index Modulation Watermark Detection
* Secure Watermark Embedding Through Partial Encryption
* Steganalysis in the Presence of Weak Cryptography and Encoding
* Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA)
* Towards Lower Bounds on Embedding Distortion in Information Hiding
* Universal JPEG Steganalysis in the Compressed Frequency Domain
* Watermarking for 3D Keyframe Animation Based on Geometry and Interpolator
* Watermarking Is Not Cryptography
* Wavelet Analysis Based Blind Watermarking for 3-D Surface Meshes
* Wavelet Domain Print-Scan and JPEG Resilient Data Hiding Method
* Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication, A
38 for DW06

DW07 * *IWDW
* Attack Analysis for He and Wu's Joint Watermarking/Fingerprinting Scheme
* Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning
* Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality, A
* Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking
* Detecting Photographic Composites of People
* Dither Modulation in the Logarithmic Domain
* Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis
* Fusion Based Blind Image Steganalysis by Boosting Feature Selection
* GA-Based Robustness Evaluation Method for Digital Image Watermarking
* General Data Hiding Framework and Multi-level Signature for Binary Images, A
* High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain
* High Payload VQ Steganographic Method for Binary Images, A
* High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents
* Improved Reversible Difference Expansion Watermarking Algorithm, An
* In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005
* Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model
* Marriage of Cryptography and Watermarking: Beneficial and Challenging for Secure Watermarking and Detection, The
* Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images, A
* Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding
* Multiple Scrambling and Adaptive Synchronization for Audio Watermarking
* Multiple Watermarking in Visual Cryptography
* On the Complexity of Obtaining Optimal Watermarking Schemes
* Optimum Histogram Pair Based Image Lossless Data Embedding
* Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack, A
* Reversible Data Hiding Using Prediction Error Values Embedding
* Reversible Quantization-Index Modulation Using Neighboring Correlation
* Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation
* Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding
* Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption
* Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis
* Steganalysis of Multi Bit Plane Image Steganography
* Steganalysis Versus Splicing Detection
* Theoretical Framework for Watermarking of Compressed Signals, A
* Watermarking for Authentication of LZ-77 Compressed Documents
* Watermarking, a Mature Technology: Retrospect and Prospect
* Weaknesses of MB2
37 for DW07

DW08 * *IWDW
* Adaptive SVD-Based Digital Image Watermarking
* Adaptive Threshold Based Robust Watermark Detection Method
* Algorithm for Modeling Print and Scan Operations Used for Watermarking, An
* Balanced Multiwavelets Based Digital Image Watermarking
* Blind Detection of Digital Forgery Image Based on the Local Entropy of the Gradient
* Color Image Watermarking Scheme in the Associated Domain of DWT and DCT Domains Based on Multi-channel Watermarking Framework, A
* Content Sharing Based on Personal Information in Virtually Secured Space
* Design of Collusion-Resistant Fingerprinting Systems: Review and New Results
* Detection of Double MPEG Compression Based on First Digit Statistics
* Detection of Hidden Information in Webpage Based on Higher-Order Statistics
* Digital Camera Identification from Images: Estimating False Acceptance Probability
* Digital Forgery Image Detection Algorithm Based on Wavelet Homomorphic Filtering, A
* Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption, An
* Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic Security Models
* Exposure Time Change Attack on Image Watermarking Systems
* First Digit Law and Its Application to Digital Forensics
* Formal Analysis of Two Buyer-Seller Watermarking Protocols
* Generalised Model for Distortion Performance Analysis of Wavelet Based Watermarking, A
* GSM Based Security Analysis for Add-SS Watermarking
* High Capacity Steganographic Algorithm in Color Images, A
* Multiple Watermarking with Side Information
* Non-malleable Schemes Resisting Adaptive Adversaries
* Novel Approach for JPEG Steganography, A
* Novel Method for Block Size Forensics Based on Morphological Operations, A
* Novel Real-Time MPEG-2 Video Watermarking Scheme in Copyright Protection, A
* Novel Steganographic Algorithm Resisting Targeted Steganalytic Attacks on LSB Matching, A
* On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography
* Practical Print-and-Scan Resilient Watermarking for High Resolution Images, A
* Reversible Data Hiding Based On H.264/AVC Intra Prediction
* Robust Audio Watermarking Based on Log-Polar Frequency Index
* Robust Watermarking Scheme for H.264, A
* Run-Length and Edge Statistics Based Approach for Image Splicing Detection
* Scalability Evaluation of Blind Spread-Spectrum Image Watermarking
* Scale-Space Feature Based Image Watermarking in Contourlet Domain
* Secret Sharing Based Video Watermark Algorithm for Multiuser
* Space Time Block Coding for Spread Spectrum Watermarking Systems
* Steganalysis Based on Difference Image
* Time Series Intra-Video Collusion Attack on Frame-by-Frame Video Watermarking, A
* Video Watermarking Based on Spatio-temporal JND Profile
40 for DW08

DW09 * *IWDW
* Blind Digital Watermarking of Low Bit-Rate Advanced H.264/AVC Compressed Video
* Camera-Model Identification Using Markovian Transition Probability Matrix
* Changing Face of Cryptography, The
* Classification Framework for Fair Content Tracing Protocols
* Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks
* Data Hiding and the Statistics of Images
* Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS Model
* Dot-Size Variant Visual Cryptography
* Enhanced Statistical Approach to Identifying Photorealistic Images, An
* Estimating the Information Theoretic Optimal Stego Noise
* Fast Embedding Technique for Dirty Paper Trellis Watermarking
* Forensic Techniques for Image Source Classification: A Comparative Study
* Fragile Watermarking Scheme with Extensive Content Restoration Capability
* Hiding Information by Context-Based Synonym Substitution
* High Capacity Data Hiding in Binary Document Images
* Homomorphic Method for Sharing Secret Images, A
* Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking
* Local Patch Blind Spectral Watermarking Method for 3D Graphics
* Multi-class Blind Steganalysis Based on Image Run-Length Analysis
* New Approach in Reversible Watermarking, A
* Reading Watermarks from Printed Binary Images with a Camera Phone
* Robust AVS Audio Watermarking
* Robust Watermarking for MPEG-2, A
* Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques
* Statistical and Iterative Method for Data Hiding in Palette-Based Images, A
* Survey of Passive Image Tampering Detection, A
* Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping
* Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks
29 for DW09

Index for "d"


Last update:18-Sep-17 11:54:01
Use price@usc.edu for comments.