143
Voted
IH
15 years 9 months ago
2001 Springer
Many steganographic systems are weak against visual and statistical attacks. Systems without these weaknesses offer only a relatively small capacity for steganographic messages. T...
133
click to vote
IH
15 years 9 months ago
2001 Springer
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
123
click to vote
IH
15 years 9 months ago
2001 Springer
Abstract. We have developed the first hardware and software (intellectual property) metering scheme that enables reliable low overhead proofs for the number of manufactured parts a...
112
Voted
IH
15 years 9 months ago
2001 Springer 156
click to vote
IH
15 years 9 months ago
2001 Springer
We present a set of watermarking techniques for effective covert communication over an audio signal carrier. Watermark robustness is enabled using: (i) redundant spread-spectrum fo...
|