121
click to vote
IH
15 years 6 months ago
2001 Springer
Many steganographic systems are weak against visual and statistical attacks. Systems without these weaknesses offer only a relatively small capacity for steganographic messages. T...
116
click to vote
IH
15 years 6 months ago
2001 Springer
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
104
Voted
IH
15 years 6 months ago
2001 Springer
Abstract. We have developed the first hardware and software (intellectual property) metering scheme that enables reliable low overhead proofs for the number of manufactured parts a...
IH
15 years 6 months ago
2001 Springer 131
Voted
IH
15 years 6 months ago
2001 Springer
We present a set of watermarking techniques for effective covert communication over an audio signal carrier. Watermark robustness is enabled using: (i) redundant spread-spectrum fo...
|