Sciweavers

11 search results - page 1 / 3
» ih 1999
Sort
View
IH
1999
Springer
13 years 8 months ago
Attacks on Steganographic Systems
The majority of steganographic utilities for the camouflage of confidential communication suffers from fundamental weaknesses. On the way to more secure steganographic algorithm...
Andreas Westfeld, Andreas Pfitzmann
IH
1999
Springer
13 years 8 months ago
Robust Watermarking for Images Based on Color Manipulation
Abstract. In this paper we present a new efficient watermarking scheme for images. The basic idea of our method is to alter the colors of the given image in a suitable but imperce...
Sebastiano Battiato, Dario Catalano, Giovanni Gall...
IH
1999
Springer
13 years 8 months ago
Robust Object Watermarking: Application to Code
In this paper, we focus on a step of the watermarking process whose importance has been disregarded so far. In this perspective, we introduce the vector extraction paradigm which i...
Julien P. Stern, Gaël Hachez, François...
IH
1999
Springer
13 years 8 months ago
An Asymmetric Public Detection Watermarking Technique
The new watermarking technique1 presented in this paper is an example of an asymmetric public detection scheme. The detection process does not need the original picture nor the sec...
Teddy Furon, Pierre Duhamel