Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Protection copie")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 175

  • Page / 7
Export

Selection :

  • and

Critique to Burmester and Le attack to Sebé and Domingo-Ferrer fingerprinting schemeSEBE, F; DOMINGO-FERRER, J.Electronics Letters. 2004, Vol 40, Num 20, pp 1261-1262, issn 0013-5194, 2 p.Article

Watermark detection with zero-knowledge disclosureADELSBACH, André; KATZENBEISSER, Stefan; SADEGHI, Ahmad-Reza et al.Multimedia systems. 2003, Vol 9, Num 3, pp 266-278, issn 0942-4962, 13 p.Article

Optical security and counterfeit deterrence techniques II (San Jose CA, 28-30 January 1998)van Renesse, Rudolf L.SPIE proceedings series. 1998, isbn 0-8194-2754-3, X, 326 p, isbn 0-8194-2754-3Conference Proceedings

Reversible watermarking scheme with image-independent embedding capacityLI, C.-T.IEE proceedings. Vision, image and signal processing. 2005, Vol 152, Num 6, pp 779-786, issn 1350-245X, 8 p.Article

New watermark scheme for copyright protection of the stereo vision system using adaptive disparity matching algorithmLEE, Myung-Han; BAE, Kyung-Hoon; KIM, Jung-Jin et al.SPIE proceedings series. 2003, pp 210-219, isbn 0-8194-4968-7, 10 p.Conference Paper

An unified approach of asymmetric watermarking schemesFURON, T; VENTURINI, I; DUHAMEL, P et al.SPIE proceedings series. 2001, pp 269-279, isbn 0-8194-3992-4Conference Paper

Méthodes de resynchronisation pour le tatouage audio = Resynchronization methods for audio watermarkingDE C. T. GOMES, Leandro; GOMEZ, Emilia; BONNET, Madeleine et al.Symposium on signal and image processingColloque sur le traitement du signal et des images. 2001, 2Vol, vol1, 247-250Conference Paper

Video retrieval method using shotID for copyright protection systemsMURANOI, R; JIYING ZHAO; HAYASAKA, R et al.SPIE proceedings series. 1998, Vol 3527, pp 245-252, isbn 0-8194-2988-0Conference Paper

An anonymous Buyer-Seller watermarking protocol with anonymity controlHAK SOO JU; HYUN JEONG KIM; DONG HOON LEE et al.Lecture notes in computer science. 2003, pp 421-432, issn 0302-9743, isbn 3-540-00716-4, 12 p.Conference Paper

Improved watermark detection based on similarity diagramsFOTOPOULOS, V; SKODRAS, A. N.Signal processing. Image communication. 2002, Vol 17, Num 4, pp 337-345, issn 0923-5965Article

Évaluation automatique des méthodes de tatouage = Automatic evaluation of watermarking schemesRAYNAL, R. F; PETITCOLAS, F. A; FONTAINE, C et al.TS. Traitement du signal. 2001, Vol 18, Num 4, pp 271-282, issn 0765-0019, NSArticle

Modeling the security of steganographic systemsZÖLLNER, J; FEDERRATH, H; KLIMANT, H et al.Lecture notes in computer science. 1998, pp 344-354, issn 0302-9743, isbn 3-540-65386-4Conference Paper

Technologies for image securityMACQ, Benoît; EBRAHIMI, Touradj.Signal processing. Image communication. 2003, Vol 18, Num 4, issn 0923-5965, 89 p.Serial Issue

Applying DRM techniques to video on the internet: Characterizing problems and solutionsGRAB, Y. Eric.SMPTE journal (1976). 2002, Vol 111, Num 4, pp 154-158, issn 0036-1682Conference Paper

Tatouage d'images par ondelettes et application à la couleur = Wavelet image watermarking: application to colorDAVOINE, Franck; CAYRE, Francois.Symposium on signal and image processingColloque sur le traitement du signal et des images. 2001, 2Vol, vol1, 251-254Conference Paper

Introduction aux méthodes de tatouage asymétriques dans le cadre de la protection de copie = Introduction to the copy protection framework, a plea for asymmetric watermarking schemesFURON, Teddy; DUHAMEL, Pierre.TS. Traitement du signal. 2001, Vol 18, Num 4, pp 221-233, issn 0765-0019, NSArticle

Steganalysis and game equilibriaETTINGER, J. M.Lecture notes in computer science. 1998, pp 319-328, issn 0302-9743, isbn 3-540-65386-4Conference Paper

A novel audio watermarking algorithm for copyright protection of digital audioSEOK, Jongwon; HONG, Jinwoo; KIM, Jinwoong et al.ETRI journal. 2002, Vol 24, Num 3, pp 181-189, issn 1225-6463Article

Image watermarking for copyright protection and data hiding via the Mojette transformAUTRUSSEAU, Florent; GUEDON, Jeanpierre.SPIE proceedings series. 2002, pp 378-386, isbn 0-8194-4415-4Conference Paper

Modelling the false alarm and missed detection rate for electronic watermarksLINNARTZ, J.-P; KALKER, T; DEPOVERE, G et al.Lecture notes in computer science. 1998, pp 329-343, issn 0302-9743, isbn 3-540-65386-4Conference Paper

Shedding more light on image watermarksHERNANDEZ, J. R; PEREZ-GONZALEZ, F.Lecture notes in computer science. 1998, pp 191-207, issn 0302-9743, isbn 3-540-65386-4Conference Paper

An asymmetric image watermarking scheme resistant against geometrical distortionsBOGUMIL, Dariusz.Signal processing. Image communication. 2006, Vol 21, Num 1, pp 59-66, issn 0923-5965, 8 p.Article

Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detectorLU, Chun-Shien; LIAO, Hong-Yuan Mark; KUTTER, Martin et al.IEEE transactions on image processing. 2002, Vol 11, Num 3, pp 280-292, issn 1057-7149Article

The illegal copy protection using hidden agentLEE, Deok-Gyu; LEE, Im-Yeong; AHN, Jong-Keun et al.Lecture notes in computer science. 2002, pp 832-841, issn 0302-9743, isbn 3-540-00028-3, 10 p.Conference Paper

Intellectual property protection systems and digital watermarkingLACY, J; QUACKENBUSH, S. R; REIBMAN, A et al.Lecture notes in computer science. 1998, pp 158-168, issn 0302-9743, isbn 3-540-65386-4Conference Paper

  • Page / 7