
Certimark. (2001). Certimark benchmark, metrics &
parameters
(D22). Geneva, Switzerland.
Cox, I. J., Miller, M. L., & Bloom, J. A. (2002).
Digital
Watermarking
(1 ed.). San Francisco: Morgan
Kaufmann.
Craver, S., Memon, N., Yeo, B.-L., & Yeung, M. M.
(1998). Resolving rightful ownerships with invisible
watermarking techniques: Limitations, attacks and
implications.
IEEE Journal on Selected Areas in
Communications, 16
(4), 573-586.
Craver, S., Memon, N., & Yeung, M. M. (1996).
Can
invisible watermarks resolve rightful ownerships?
(RC
20509): IBM Research.
Craver, S., Perrig, A., & Petitcolas, F. A. P. (2000).
Robustness of copyright marking systems. In F. A. P.
Petitcolas & S. Katzenbeisser (Eds.), Information
hiding: Techniques for steganography and digital
watermarking
(1 ed., pp. 149-174). Boston: Artech
House.
Craver, S., Yeo, B.-L., & Yeung, M. M. (1998, July 1998).
Technical trials and legal tribulations.
Communications of the ACM, 41, 45-54.
Dannenberg, R., & Mazzoni, D. (2002). Audacity
(Version 0.98). Pittsburgh, PA.
Gordy, J. D., & Burton, L. T. (2000, August 2000).
Performance evaluation of digital audio watermarking
algorithms.
Paper presented at the 43rd Midwest
Symposium on Circuits and Systems, Lansing, MI.
ITU. (2001). Method for objective measurements of
perceived audio quality
(ITU-R BS.1387). Geneva:
International Telecommunication Union.
Johnson, N. F., & Katzenbeisser, S. C. (2000). A survey of
steganographic techniques. In F. A. P. Petitcolas & S.
Katzenbeisser (Eds.), Information hiding: Techniques
for steganography and digital watermarking
(1 ed.,
pp. 43-78). Boston: Artech House.
Katzenbeisser, S., & Veith, H. (2002, January 2002).
Securing symmetric watermarking schemes against
protocol attacks.
Paper presented at the Proceedings of
the SPIE, Security and Watermarking of Multimedia
Contents IV, San Jose, CA.
Kirovski, D., & Malvar, H. (2001, April 2001).
Robust
cover communication over a public audio channel
using spread spectrum.
Paper presented at the
Information Hiding Workshop, Pittsburgh, PA.
Kutter, M., & Hartung, F. (2000). Introduction to
watermarking techniques. In F. A. P. Petitcolas & S.
Katzenbeisser (Eds.),
Information hiding: Techniques
for steganography and digital watermarking
(1 ed.,
pp. 97-120). Boston: Artech House.
Kutter, M., & Petitcolas, F. A. P. (1999, January 1999).
A
fair benchmark for image watermarking systems.
Paper presented at the Electronic Imaging '99. Security
and Watermarking of Multimedia Contents, San Jose,
CA.
Kutter, M., & Petitcolas, F. A. P. (2000). Fair evaluation
methods for image watermarking systems.
Journal of
Electronic Imaging, 9
(4), 445-455.
Meerwald, P., & Pereira, S. (2002, January 2002).
Attacks,
applications, and evaluation of known watermarking
algorithms with Checkmark.
Paper presented at the
Proceedings of the SPIE, Security and Watermarking
of Multimedia Contents IV, San Jose, CA.
Pereira, S., Voloshynovskiy, S., Madueño, M., Marchand-
Maillet, S., & Pun, T. (2001, April, 2001).
Second
generation benchmarking and application oriented
evaluation.
Paper presented at the Information Hiding
Workshop, Pittsburgh, PA.
Petitcolas, F. A. P. (2000). Watermarking schemes
evaluation.
IEEE Signal Processing, 17(5), 58-64.
Petitcolas, F. A. P., & Anderson, R. J. (1998, September
1998). Weaknesses of copyright marking systems.
Paper presented at the Multimedia and Security
Workshop at the 6th ACM International Multimedia
Conference, Bristol U.K.
Petitcolas, F. A. P., & Anderson, R. J. (1999, June, 1999).
Evaluation of copyright marking systems. Paper
presented at the IEEE Multimedia Systems, Florence,
Italy.
Petitcolas, F. A. P., Anderson, R. J., & G., K. M. (1998,
April 1998).
Attacks on copyright marking systems.
Paper presented at the Second workshop on
information hiding, Portland, OR.
Petitcolas, F. A. P., Steinebach, M., Raynal, F., Dittmann,
J., Fontaine, C., & Fatès, N. (2001, January 22-26).
A
public automated web-based evaluation service for
watermarking schemes: StirMark Benchmark.
Paper
presented at the Electronic Imaging 2001, Security and
Watermarking of Multimedia Contents, San Jose, CA.
Piron, L., Arnold, M., Kutter, M., Funk, W., Boucqueau, J.
M., & Craven, F. (1999, January, 1999).
OCTALIS
benchmarking : Comparison of four watermarking
techniques.
Paper presented at the Proceedings of
SPIE: Security and Watermarking of Multimedia
Contents, San Jose, CA.
Robinson, D. J. M., & Hawksford, M. J. (1999, September
1999).
Time-domain auditory model for the
assessment of high-quality coded audio.
Paper
presented at the 107th Conference f the Audio
Engineering Society, New York, NY.
Swanson, M. D., Zhu, B., Tewfik, A. H., & Boney, L.
(1998). Robust audio watermarking using perceptual
masking.
Signal Processing, 66(3), 337-355.
Thiede, T., & Kabot, E. (1996, 1996).
A new perceptual
quality measure for bit rate reduced audio.
Paper
presented at the 100th AES Convention, Copenhagen,
Denmark.
Thiede, T., Treurniet, W. C., Bitto, R., Sporer, T.,
Brandenburg, K., Schmidmer, C., Keyhl, K., G., B. J.,
Colomes, C., Stoll, G., & Feiten, B. (1998, 1999).
PEAQ - der künftige ITU-Standard zur objektiven
messung der wahrgenommenen audioqualität.
Paper
presented at the Tonmeistertagung Karlsruhe, Munich,
Germany.
Voloshynovskiy, S., Pereira, S., Iquise, V., & Pun, T.
(2001, June 2001). Attack modelling: towards a
second generation benchmark.
Paper presented at the
Signal Processing.
Voloshynovskiy, S., Pereira, S., Pun, T., Eggers, J. J., &
Su, J. K. (2001, August, 2001). Attacks on digital
watermarks: Classification, estimation-based attacks
and benchmarks.
IEEE Communications Magazine,
39,
118-127.
ICETE 2004 - WIRELESS COMMUNICATION SYSTEMS AND NETWORKS
300