Reversible Watermarking of NURBS-Based CAD Models (Englisch)
- Neue Suche nach: Funk, Wolfgang
- Neue Suche nach: Funk, Wolfgang
In:
Information Hiding
2
;
172-187
;
2007
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Reversible Watermarking of NURBS-Based CAD Models
-
Beteiligte:Funk, Wolfgang ( Autor:in )
-
Erschienen in:Information Hiding , 2 ; 172-187Lecture Notes in Computer Science ; 4437, 2 ; 172-187
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2007
-
Format / Umfang:16 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Natural Watermarking: A Secure Spread Spectrum Technique for WOABas, Patrick / Cayre, François et al. | 2007
- 15
-
An Improved Asymmetric Watermarking System Using Matrix EmbeddingCraver, Scott et al. | 2007
- 26
-
A Cryptographic Method for Secure Watermark DetectionMalkin, Michael / Kalker, Ton et al. | 2007
- 42
-
Steganographic Communication in Ordered ChannelsChakinala, R. C. / Kumarasubramanian, A. / Manokaran, R. / Noubir, G. / Rangan, C. Pandu / Sundaram, R. et al. | 2007
- 58
-
Analyzing Network-Aware Active Wardens in IPv6Lewandowski, Grzegorz / Lucena, Norka B. / Chapin, Steve J. et al. | 2007
- 78
-
Video Watermarking by Using Geometric Warping Without Visible ArtifactsPröfrock, Dima / Schlauweg, Mathias / Müller, Erika et al. | 2007
- 93
-
Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time DomainXiang, Shijun / Huang, Jiwu / Yang, Rui et al. | 2007
- 109
-
Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded WardensBergmair, Richard / Katzenbeisser, Stefan et al. | 2007
- 124
-
Noisy Timing Channels with Binary Inputs and OutputsMartin, Keye / Moskowitz, Ira S. et al. | 2007
- 145
-
A Computational Model for Watermark RobustnessAdelsbach, André / Katzenbeisser, Stefan / Sadeghi, Ahmad-Reza et al. | 2007
- 161
-
Hiding Information HidingYoung, Adam / Yung, Moti et al. | 2007
- 172
-
Reversible Watermarking of NURBS-Based CAD ModelsFunk, Wolfgang et al. | 2007
- 188
-
A High-Capacity Data Hiding Method for Polygonal MeshesWu, Hao-tian / Cheung, Yiu-ming et al. | 2007
- 201
-
Steganography for Radio Amateurs— A DSSS Based Approach for Slow Scan TelevisionWestfeld, Andreas et al. | 2007
- 216
-
Delayed and Controlled Failures in Tamper-Resistant SoftwareTan, Gang / Chen, Yuqun / Jakubowski, Mariusz H. et al. | 2007
- 232
-
A Model for Self-Modifying CodeAnckaert, Bertrand / Madou, Matias / Bosschere, Koen et al. | 2007
- 249
-
A Markov Process Based Approach to Effective Attacking JPEG SteganographyShi, Yun Q. / Chen, Chunhua / Chen, Wen et al. | 2007
- 265
-
Batch Steganography and Pooled SteganalysisKer, Andrew D. et al. | 2007
- 282
-
On Steganographic Embedding EfficiencyFridrich, Jessica / Lisoněk, Petr / Soukal, David et al. | 2007
- 297
-
Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext AttacksLe, Tri / Kurosawa, Kaoru et al. | 2007
- 314
-
Modified Matrix Encoding Technique for Minimal Distortion SteganographyKim, Younhee / Duric, Zoran / Richards, Dana et al. | 2007
- 328
-
Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical FingerprintingSeol, Jae-Min / Kim, Seong-Whan et al. | 2007
- 343
-
A Collusion-Resistant Video Watermarking SchemeHoumansadr, Amir / Ghaemmaghami, Shahrokh et al. | 2007
- 355
-
An Elliptic Curve Backdoor Algorithm for RSASSAYoung, Adam / Yung, Moti et al. | 2007
- 375
-
A Subliminal-Free Variant of ECDSABohli, Jens-Matthias / González Vasco, María Isabel / Steinwandt, Rainer et al. | 2007