2009 |
Fei, C; Kwong, R; Kundur, D Secure Semi-Fragile Watermarking for Image Authentication Inproceedings Proc. First IEEE International Workshop on Information Forensics and Security (WIFS), pp. 141-145, London, UK, 2009. Links | BibTeX | Tags: drm, forensics @inproceedings{FeiKwoKunWIFS09, title = {Secure Semi-Fragile Watermarking for Image Authentication}, author = {C Fei and R Kwong and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/FeiKwoKunWIFS09.pdf http://dx.doi.org/10.1109/WIFS.2009.5386465}, year = {2009}, date = {2009-12-06}, booktitle = {Proc. First IEEE International Workshop on Information Forensics and Security (WIFS)}, pages = {141-145}, address = {London, UK}, keywords = {drm, forensics}, pubstate = {published}, tppubtype = {inproceedings} } |
Fei, C; Kwong, R; Kundur, D A Hypothesis Testing Approach to Semifragile Watermark-Based Authentication Journal Article IEEE Transactions on Information Forensics and Security, 4 (2), pp. 179-192, 2009. @article{FeiKwoKunTIFS09, title = {A Hypothesis Testing Approach to Semifragile Watermark-Based Authentication}, author = {C Fei and R Kwong and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/FeiKwoKunTIFS09.pdf http://dx.doi.org/10.1109/TIFS.2009.2015039}, year = {2009}, date = {2009-06-01}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {4}, number = {2}, pages = {179-192}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
2006 |
Fei, C; Kundur, D; Kwong, R Analysis and Design of Secure Watermark-based Authentication Systems Journal Article IEEE Transactions on Information Forensics and Security, 1 (1), pp. 43-55, 2006. @article{FeiKunKwoTIFS06, title = {Analysis and Design of Secure Watermark-based Authentication Systems}, author = {C Fei and D Kundur and R Kwong}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/FeiKunKwoTIFS06.pdf http://dx.doi.org/10.1109/TIFS.2005.863505}, year = {2006}, date = {2006-03-01}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {1}, number = {1}, pages = {43-55}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Fei, Chuhong Analysis and Design of Watermark-Based Multimedia Authentication Systems PhD Thesis University of Toronto, 2006. Abstract | BibTeX | Tags: drm, PhD thesis, thesis @phdthesis{FeiPhDThesis08, title = {Analysis and Design of Watermark-Based Multimedia Authentication Systems}, author = {Chuhong Fei}, year = {2006}, date = {2006-01-01}, address = {Toronto, Canada}, school = {University of Toronto}, abstract = {Multimedia authentication techniques are required to protect the integrity and origin of digital multimedia data. In watermark-based multimedia authentication systems, a source-dependent authenticator is invisibly embedded within the protected data itself, in order to alert unacceptable distortions on the data and to authenticate the legitimate source. This thesis investigates the design and analysis of such systems. We formulate the authentication problem as error detection coding with robustness to certain types of legitimate channel noise. System performance requirements such as semi-fragility, security, key payload, embedding distortion, and algorithm complexity are all investigated in the unified framework to obtain best tradeoffs among them.In the analysis of multimedia authentication systems, we demonstrate how lattice codes can be used to address semi-fragile requirements and embedding distortion in a practical scheme. Security against possible malicious attacks is considered at the code level, and cryptographic techniques are incorporated to construct secure codes. We propose a novel security enhancement strategy based on nested lattice codes that results in secure and efficient authentication algorithms. Unconditional security is also investigated. We provide a formal methodology using composite hypothesis testing to balance robustness and fragility objectives with respect to legitimate and illegitimate distortions that is superior to existing approaches. We show that a quantization-based watermarking scheme is more appropriate for achieving semi-fragility.In system design, we propose two practical watermark-based authentication schemes for natural images: one for uncompressed images, the other for JPEG compressed ones. Our proposed algorithms are able to distinguish incidental distortions, such as JPEG compression and image enhancement filtering, from malicious tampering such as image object removal and substitution even in a small portion of the protected images. Our algorithms are secure against an active attacker, and are able to determine the degree of distortion and its location. In addition, our proposed joint compression and authentication scheme for compressed images is able to increase compression efficiency while keeping practical robustness to mild incidental signal processing changes. Effectiveness of the proposed algorithms is demonstrated by simulations and comparison with existing schemes. In the analysis of multimedia authentication systems, we demonstrate how lattice codes can be used to address semi-fragile requirements and embedding distortion in a practical scheme. Security against possible malicious attacks is considered at the code level, and cryptographic techniques are incorporated to construct secure codes. We propose a novel security enhancement strategy based on nested lattice codes that results in secure and efficient authentication algorithms. Unconditional security is also investigated. We provide a formal methodology using composite hypothesis testing to balance robustness and fragility objectives with respect to legitimate and illegitimate distortions that is superior to existing approaches. We show that a quantization-based watermarking scheme is more appropriate for achieving semi-fragility. In system design, we propose two practical watermark-based authentication schemes for natural images: one for uncompressed images, the other for JPEG compressed ones. Our proposed algorithms are able to distinguish incidental distortions, such as JPEG compression and image enhancement filtering, from malicious tampering such as image object removal and substitution even in a small portion of the protected images. Our algorithms are secure against an active attacker, and are able to determine the degree of distortion and its location. In addition, our proposed joint compression and authentication scheme for compressed images is able to increase compression efficiency while keeping practical robustness to mild incidental signal processing changes. Effectiveness of the proposed algorithms is demonstrated by simulations and comparison with existing schemes.}, keywords = {drm, PhD thesis, thesis}, pubstate = {published}, tppubtype = {phdthesis} } Multimedia authentication techniques are required to protect the integrity and origin of digital multimedia data. In watermark-based multimedia authentication systems, a source-dependent authenticator is invisibly embedded within the protected data itself, in order to alert unacceptable distortions on the data and to authenticate the legitimate source. This thesis investigates the design and analysis of such systems. We formulate the authentication problem as error detection coding with robustness to certain types of legitimate channel noise. System performance requirements such as semi-fragility, security, key payload, embedding distortion, and algorithm complexity are all investigated in the unified framework to obtain best tradeoffs among them.In the analysis of multimedia authentication systems, we demonstrate how lattice codes can be used to address semi-fragile requirements and embedding distortion in a practical scheme. Security against possible malicious attacks is considered at the code level, and cryptographic techniques are incorporated to construct secure codes. We propose a novel security enhancement strategy based on nested lattice codes that results in secure and efficient authentication algorithms. Unconditional security is also investigated. We provide a formal methodology using composite hypothesis testing to balance robustness and fragility objectives with respect to legitimate and illegitimate distortions that is superior to existing approaches. We show that a quantization-based watermarking scheme is more appropriate for achieving semi-fragility.In system design, we propose two practical watermark-based authentication schemes for natural images: one for uncompressed images, the other for JPEG compressed ones. Our proposed algorithms are able to distinguish incidental distortions, such as JPEG compression and image enhancement filtering, from malicious tampering such as image object removal and substitution even in a small portion of the protected images. Our algorithms are secure against an active attacker, and are able to determine the degree of distortion and its location. In addition, our proposed joint compression and authentication scheme for compressed images is able to increase compression efficiency while keeping practical robustness to mild incidental signal processing changes. Effectiveness of the proposed algorithms is demonstrated by simulations and comparison with existing schemes. In the analysis of multimedia authentication systems, we demonstrate how lattice codes can be used to address semi-fragile requirements and embedding distortion in a practical scheme. Security against possible malicious attacks is considered at the code level, and cryptographic techniques are incorporated to construct secure codes. We propose a novel security enhancement strategy based on nested lattice codes that results in secure and efficient authentication algorithms. Unconditional security is also investigated. We provide a formal methodology using composite hypothesis testing to balance robustness and fragility objectives with respect to legitimate and illegitimate distortions that is superior to existing approaches. We show that a quantization-based watermarking scheme is more appropriate for achieving semi-fragility. In system design, we propose two practical watermark-based authentication schemes for natural images: one for uncompressed images, the other for JPEG compressed ones. Our proposed algorithms are able to distinguish incidental distortions, such as JPEG compression and image enhancement filtering, from malicious tampering such as image object removal and substitution even in a small portion of the protected images. Our algorithms are secure against an active attacker, and are able to determine the degree of distortion and its location. In addition, our proposed joint compression and authentication scheme for compressed images is able to increase compression efficiency while keeping practical robustness to mild incidental signal processing changes. Effectiveness of the proposed algorithms is demonstrated by simulations and comparison with existing schemes. |
Fei, C; Kundur, D; Kwong, R A Hypothesis Testing Approach for Achieving Semi-fragility in Multimedia Authentication Inproceedings III, Delp E J; Wong, P W (Ed.): Proc. SPIE Security and Watermarking of Multimedia Contents VIII, pp. 607220-1 - 607220-12, San Jose, California, 2006. @inproceedings{FeiKunKwoSPIE06, title = {A Hypothesis Testing Approach for Achieving Semi-fragility in Multimedia Authentication}, author = {C Fei and D Kundur and R Kwong}, editor = {Delp E J III and P W Wong}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/FeiKunKwoSPIE06.pdf http://dx.doi.org/10.1117/12.643502}, year = {2006}, date = {2006-01-01}, booktitle = {Proc. SPIE Security and Watermarking of Multimedia Contents VIII}, volume = {6072}, pages = {607220-1 - 607220-12}, address = {San Jose, California}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
2005 |
Luh, W; Kundur, D New Paradigms for Effective Broadcasting and Fingerprinting of Entertainment Media Journal Article IEEE Communications Magazine, 43 (6), pp. 77-84, 2005. @article{LuhKunICM05, title = {New Paradigms for Effective Broadcasting and Fingerprinting of Entertainment Media}, author = {W Luh and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/LuhKunICM05.pdf http://dx.doi.org/10.1109/MCOM.2005.1452834}, year = {2005}, date = {2005-06-01}, journal = {IEEE Communications Magazine}, volume = {43}, number = {6}, pages = {77-84}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Su, K; Kundur, D; Hatzinakos, D Spatially Localized Image-dependent Watermarking for Statistical Invisibility and Collusion Journal Article IEEE Transactions on Multimedia, 7 (1), pp. 52-66, 2005. @article{SuKunHatTMM05b, title = {Spatially Localized Image-dependent Watermarking for Statistical Invisibility and Collusion}, author = {K Su and D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/SuKunHatTMM05b.pdf http://dx.doi.org/10.1109/TMM.2004.840614}, year = {2005}, date = {2005-02-01}, journal = {IEEE Transactions on Multimedia}, volume = {7}, number = {1}, pages = {52-66}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Su, K; Kundur, D; Hatzinakos, D Statistical Invisibility for Collusion-resistant Digital Video Watermarking Journal Article IEEE Transactions on Multimedia, 7 (1), pp. 43-51, 2005. @article{SuKunHatTMM05b, title = {Statistical Invisibility for Collusion-resistant Digital Video Watermarking}, author = {K Su and D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/SuKunHatTMM05.pdf http://dx.doi.org/10.1109/TMM.2004.840617}, year = {2005}, date = {2005-02-01}, journal = {IEEE Transactions on Multimedia}, volume = {7}, number = {1}, pages = {43-51}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Fei, C; Kundur, D; Kwong, R Achieving Computational and Unconditional Security in Authentication Watermarking: Analysis, Insights, and Algorithms Inproceedings III, Delp E J; Wong, P W (Ed.): Proc. SPIE Security and Watermarking of Multimedia Contents VII, pp. 697-708, San Jose, California, 2005. @inproceedings{FeiKunKwoSPIE05, title = {Achieving Computational and Unconditional Security in Authentication Watermarking: Analysis, Insights, and Algorithms}, author = {C Fei and D Kundur and R Kwong}, editor = {Delp E J III and P W Wong}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/FeiKunKwoSPIE05.pdf http://dx.doi.org/10.1117/12.586388}, year = {2005}, date = {2005-01-01}, booktitle = {Proc. SPIE Security and Watermarking of Multimedia Contents VII}, volume = {5681}, number = {5681}, pages = {697-708}, address = {San Jose, California}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
2004 |
Luh, William Collusion-Resistant Fingerprinting for Multimedia in a Broadcast Channel Environment 2004. Abstract | BibTeX | Tags: drm, MS Thesis, thesis @masterthesis{LuhMSThesis04, title = {Collusion-Resistant Fingerprinting for Multimedia in a Broadcast Channel Environment}, author = {William Luh}, year = {2004}, date = {2004-12-01}, address = {College Station, TX}, school = {Texas A&M University}, abstract = {Digital fingerprinting is a method by which a copyright owner can uniquely embed a buyer-dependent, inconspicuous serial number (representing the fingerprint) into every copy of digital data that is legally sold. The buyer of a legal copy is then deterred from distributing further copies, because the unique fingerprint can be used to trace back the origin of the piracy. The major challenge in fingerprinting is collusion, an attack in which a coalition of pirates compare several of their uniquely fingerprinted copies for the purpose of detecting and removing the fingerprints. The contributions of this thesis are two-fold. First, this thesis motivates the need for robustness against large coalitions of pirates by introducing the concept of a malicious distributor that has been overlooked in prior work. A novel fingerprinting code that has superior codeword length in comparison to existing work under this novel malicious distributor scenario, is developed. In addition, ideas presented in the proposed ¯ngerprinting design can easily be applied to existing fingerprinting schemes, making them more robust to collusion attacks. Second, a new framework termed Joint Source Fingerprinting that integrates the processes of watermarking and codebook design is introduced. The need for this new paradigm is motivated by the fact that existing ¯ngerprinting methods result in a perceptually undistorted multimedia after collusion is applied. In contrast, the new paradigm equates the process of collusion amongst a coalition of pirates, to degrading the perceptual characteristics, and hence commercial value of the multimedia in ques- tion. Thus by enforcing that the process of collusion diminishes the commercial value of the content, the pirates are deterred from attacking the ¯ngerprints. A ¯ngerprint- ing algorithm for video as well as an e±cient means of broadcasting or distributing ¯ngerprinted video is also presented. Simulation results are provided to verify our theoretical and empirical observations.}, keywords = {drm, MS Thesis, thesis}, pubstate = {published}, tppubtype = {masterthesis} } Digital fingerprinting is a method by which a copyright owner can uniquely embed a buyer-dependent, inconspicuous serial number (representing the fingerprint) into every copy of digital data that is legally sold. The buyer of a legal copy is then deterred from distributing further copies, because the unique fingerprint can be used to trace back the origin of the piracy. The major challenge in fingerprinting is collusion, an attack in which a coalition of pirates compare several of their uniquely fingerprinted copies for the purpose of detecting and removing the fingerprints. The contributions of this thesis are two-fold. First, this thesis motivates the need for robustness against large coalitions of pirates by introducing the concept of a malicious distributor that has been overlooked in prior work. A novel fingerprinting code that has superior codeword length in comparison to existing work under this novel malicious distributor scenario, is developed. In addition, ideas presented in the proposed ¯ngerprinting design can easily be applied to existing fingerprinting schemes, making them more robust to collusion attacks. Second, a new framework termed Joint Source Fingerprinting that integrates the processes of watermarking and codebook design is introduced. The need for this new paradigm is motivated by the fact that existing ¯ngerprinting methods result in a perceptually undistorted multimedia after collusion is applied. In contrast, the new paradigm equates the process of collusion amongst a coalition of pirates, to degrading the perceptual characteristics, and hence commercial value of the multimedia in ques- tion. Thus by enforcing that the process of collusion diminishes the commercial value of the content, the pirates are deterred from attacking the ¯ngerprints. A ¯ngerprint- ing algorithm for video as well as an e±cient means of broadcasting or distributing ¯ngerprinted video is also presented. Simulation results are provided to verify our theoretical and empirical observations. |
Mathai, Nebu John 0.18 CMOS Implementation of a Video Watermarking Algorithm 2004. Abstract | BibTeX | Tags: drm, MS Thesis, thesis @masterthesis{MatMSThesis04, title = {0.18 CMOS Implementation of a Video Watermarking Algorithm}, author = {Nebu John Mathai}, year = {2004}, date = {2004-12-01}, address = {Toronto, Canada}, school = {University of Toronto}, abstract = {We consider hardware implementation aspects of the digital watermarking problem through the implementation of a well-known video watermarking algorithm called Just Another Watermarking System (JAWS); we discuss the time and area constraints that must be satisfied by a successful hardware implementation. A hardware architecture that implements the algorithm under the constraints is then proposed. The architecture is analyzed to gain an understanding of the relationships between algorithmic features and implementation cost. Some general findings of this work that can be applied toward making algorithmic developments more amenable to hardware implementation are finally presented.}, keywords = {drm, MS Thesis, thesis}, pubstate = {published}, tppubtype = {masterthesis} } We consider hardware implementation aspects of the digital watermarking problem through the implementation of a well-known video watermarking algorithm called Just Another Watermarking System (JAWS); we discuss the time and area constraints that must be satisfied by a successful hardware implementation. A hardware architecture that implements the algorithm under the constraints is then proposed. The architecture is analyzed to gain an understanding of the relationships between algorithmic features and implementation cost. Some general findings of this work that can be applied toward making algorithmic developments more amenable to hardware implementation are finally presented. |
Campisi, P; Kundur, D; Neri, A Robust Digital Watermarking in the Ridgelet Domain Journal Article IEEE Signal Processing Letters, 11 (10), pp. 826-830, 2004. @article{CamKunNerSPL04, title = {Robust Digital Watermarking in the Ridgelet Domain}, author = {P Campisi and D Kundur and A Neri}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/CamKunNerSPL04.pdf http://dx.doi.org/10.1109/LSP.2004.835463}, year = {2004}, date = {2004-10-01}, journal = {IEEE Signal Processing Letters}, volume = {11}, number = {10}, pages = {826-830}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Kundur, D; Karthik, K Video Fingerprinting and Encryption Principles for Digital Rights Management Journal Article Proceedings of the IEEE Special Issue on Enabling Security Technologies for Digital Rights Management, 92 (6), pp. 918-932, 2004. @article{KunKarProcIEEE04, title = {Video Fingerprinting and Encryption Principles for Digital Rights Management}, author = {D Kundur and K Karthik}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunKarProcIEEE04.pdf http://dx.doi.org/10.1109/JPROC.2004.827356}, year = {2004}, date = {2004-06-01}, journal = {Proceedings of the IEEE Special Issue on Enabling Security Technologies for Digital Rights Management}, volume = {92}, number = {6}, pages = {918-932}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Kundur, D; Lin, C -Y; Macq, B; Yu, H H Enabling Security Technologies for Digital Rights Management Journal Article Proceedings of the IEEE, Special Issue on Enabling Security Technologies for Digital Rights Management, 92 (6), pp. 879-882, 2004. @article{KunLinMacYuProcIEEE04, title = {Enabling Security Technologies for Digital Rights Management}, author = {D Kundur and C -Y Lin and B Macq and H H Yu}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunLinMacYuProcIEEE04.pdf http://dx.doi.org/10.1109/JPROC.2004.827336}, year = {2004}, date = {2004-06-01}, journal = {Proceedings of the IEEE, Special Issue on Enabling Security Technologies for Digital Rights Management}, volume = {92}, number = {6}, pages = {879-882}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Kundur, D; Su, K; Hatzinakos, D “Digital Video Watermarking: Techniques, Technology and Trends,” in Intelligent Watermarking Techniques Book Chapter Pan, P J -S; Huang, H -C; Jain, L (Ed.): Chapter Digital Video Watermarking: Techniques,, pp. 265-314, World Scientific Publishing Company, 2004, ISBN: 978-981-238-757-8. @inbook{KunSuHatChap04, title = {“Digital Video Watermarking: Techniques, Technology and Trends,” in Intelligent Watermarking Techniques}, author = {D Kundur and K Su and D Hatzinakos}, editor = {P J -S Pan and H -C Huang and L Jain}, url = {http://www.worldscibooks.com/compsci/5471.html}, isbn = {978-981-238-757-8}, year = {2004}, date = {2004-04-01}, pages = {265-314}, publisher = {World Scientific Publishing Company}, chapter = {Digital Video Watermarking: Techniques,}, keywords = {drm}, pubstate = {published}, tppubtype = {inbook} } |
Karthik, K; Kundur, D; Hatzinakos, D Joint Fingerprinting and Decryption for Multimedia Content Tracing in Wireless Networks Inproceedings Carapezza, Edward M (Ed.): Proc. SPIE Sensors, Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense, pp. 360-370, Orlando, Florida, 2004. @inproceedings{KarKunHatSPIE04, title = {Joint Fingerprinting and Decryption for Multimedia Content Tracing in Wireless Networks}, author = {K Karthik and D Kundur and D Hatzinakos}, editor = {Edward M Carapezza}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KarKunHatSPIE04.pdf http://dx.doi.org/10.1117/12.542777}, year = {2004}, date = {2004-04-01}, booktitle = {Proc. SPIE Sensors, Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense}, volume = {5403}, pages = {360-370}, address = {Orlando, Florida}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Zhao, Y; Campisi, P; Kundur, D Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images Journal Article IEEE Transactions on Image Processing, 13 (3), pp. 430-448, 2004. Links | BibTeX | Tags: drm, forensics @article{ZhaCamKunTIP04, title = {Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images}, author = {Y Zhao and P Campisi and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/ZhaCamKunTIP04.pdf http://dx.doi.org/10.1109/TIP.2003.821552}, year = {2004}, date = {2004-03-01}, journal = {IEEE Transactions on Image Processing}, volume = {13}, number = {3}, pages = {430-448}, keywords = {drm, forensics}, pubstate = {published}, tppubtype = {article} } |
Akalu, R; Kundur, D Technological Protection Measures in the Courts: Law, Engineering, and DRM Lessons Learned from the Failure of the Content Scrambling System Journal Article IEEE Signal Processing Magazine, 21 (2), pp. 109-117, 2004. @article{AkaKunSPM04, title = {Technological Protection Measures in the Courts: Law, Engineering, and DRM Lessons Learned from the Failure of the Content Scrambling System}, author = {R Akalu and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/AkaKunSPM04.pdf http://dx.doi.org/10.1109/MSP.2004.1276119}, year = {2004}, date = {2004-03-01}, journal = {IEEE Signal Processing Magazine}, volume = {21}, number = {2}, pages = {109-117}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Fei, C; Kundur, D; Kwong, R Analysis and Design of Watermarking Algorithms for Improved Resistance to Compression Journal Article IEEE Transactions on Image Processing, 13 (2), pp. 126-144, 2004. @article{FeiKunKwoTIP04, title = {Analysis and Design of Watermarking Algorithms for Improved Resistance to Compression}, author = {C Fei and D Kundur and R Kwong}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/FeiKunKwoTIP04.pdf http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1206088}, year = {2004}, date = {2004-02-01}, journal = {IEEE Transactions on Image Processing}, volume = {13}, number = {2}, pages = {126-144}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Kundur, D; Hatzinakos, D Toward Robust Logo Watermarking using Multiresolution Image Fusion Principles Journal Article IEEE Transactions on Multimedia, 6 (2), pp. 185-198, 2004. @article{KunHatTMM04, title = {Toward Robust Logo Watermarking using Multiresolution Image Fusion Principles}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatTMM04.pdf http://dx.doi.org/10.1109/TMM.2003.819747}, year = {2004}, date = {2004-02-01}, journal = {IEEE Transactions on Multimedia}, volume = {6}, number = {2}, pages = {185-198}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Fei, C; Kundur, D; Kwong, R Analysis and Design of Authentication Watermarking Inproceedings III, Delp E J; Wong, P W (Ed.): Proc. SPIE Security and Watermarking of Multimedia Contents VI, pp. 760-771, San Jose, California, 2004. @inproceedings{FeiKunKwoSPIE04, title = {Analysis and Design of Authentication Watermarking}, author = {C Fei and D Kundur and R Kwong}, editor = {Delp E J III and P W Wong}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/FeiKunKwoSPIE04.pdf http://dx.doi.org/10.1117/12.526714}, year = {2004}, date = {2004-01-01}, booktitle = {Proc. SPIE Security and Watermarking of Multimedia Contents VI}, volume = {5306}, pages = {760-771}, address = {San Jose, California}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D; Zhao, Y; Campisi, P A Steganographic Framework for Dual Authentication and Compression of High Resolution Imagery Inproceedings Proc. IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1-4, Vancouver, Canada, 2004. Links | BibTeX | Tags: drm, forensics @inproceedings{KunZhaCamISCAS04, title = {A Steganographic Framework for Dual Authentication and Compression of High Resolution Imagery}, author = {D Kundur and Y Zhao and P Campisi}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunZhaCamISCAS04.pdf http://dx.doi.org/10.1109/ISCAS.2004.1329193}, year = {2004}, date = {2004-01-01}, booktitle = {Proc. IEEE International Symposium on Circuits and Systems (ISCAS)}, volume = {2}, pages = {1-4}, address = {Vancouver, Canada}, keywords = {drm, forensics}, pubstate = {published}, tppubtype = {inproceedings} } |
2003 |
Zhao, Yang Dual Domain Semi-Fragile Watermarking for Image Authentication 2003. Abstract | BibTeX | Tags: drm, forensics, MS Thesis, thesis @masterthesis{ZhaMSThesis03, title = {Dual Domain Semi-Fragile Watermarking for Image Authentication}, author = {Yang Zhao}, year = {2003}, date = {2003-12-01}, address = {Toronto, Canada}, school = {University of Toronto}, abstract = {Techniques to establish the authenticity and integrity of digital images are becoming increasingly essential for secure transacting. Ideally, the authentication algorithm should distinguish incidental integrity maintaining distortions such as lossy compression from malicious manipulations. This has motivated research into semi-ragile watermarking. A novel watermarking algorithm is proposed in this thesis that is both robust to compression and self-authenticating. The proposed algorithm is a content-based, semi-fragile watermarking method that employs a public-key scheme for still image authentication and integrity veri¯cation. The use of dual domains in the proposed algorithm enables greater control over the robustness and fragility of the overall scheme to manipulations, and provides very good classi¯cation of intentional and incidental tampering. In addition, the thesis provides theoretical analysis for the performance and the feasibility of the scheme. We also present experimental results to verify the theoretical observations and the comparison results for the proposed algorithm to four popular techniques.}, keywords = {drm, forensics, MS Thesis, thesis}, pubstate = {published}, tppubtype = {masterthesis} } Techniques to establish the authenticity and integrity of digital images are becoming increasingly essential for secure transacting. Ideally, the authentication algorithm should distinguish incidental integrity maintaining distortions such as lossy compression from malicious manipulations. This has motivated research into semi-ragile watermarking. A novel watermarking algorithm is proposed in this thesis that is both robust to compression and self-authenticating. The proposed algorithm is a content-based, semi-fragile watermarking method that employs a public-key scheme for still image authentication and integrity veri¯cation. The use of dual domains in the proposed algorithm enables greater control over the robustness and fragility of the overall scheme to manipulations, and provides very good classi¯cation of intentional and incidental tampering. In addition, the thesis provides theoretical analysis for the performance and the feasibility of the scheme. We also present experimental results to verify the theoretical observations and the comparison results for the proposed algorithm to four popular techniques. |
Squeira, Adrian Enhanced Watermark Detection 2003. Abstract | BibTeX | Tags: drm, MS Thesis, thesis @masterthesis{SeqMSThesis03, title = {Enhanced Watermark Detection}, author = {Adrian Squeira}, year = {2003}, date = {2003-12-01}, address = {Toronto, Canada}, school = {University of Toronto}, abstract = {Digital watermarking is a relatively overhead free solution to the problem of copyright infringement. In this thesis we investigate the choice of transform domain for embedding blind and non-blind watermarks in the face of eight different attacks. The chosen attacks are commonly used in watermark benchmarking programs. After extensive simulations involving seventeen different transforms, we find that our findings corroborate the results obtained by Ramkumar et al. for compression attacks. In addition, we analyse the Voloshynovskiy scheme for its probability of false alarm in a novel way. We then use the transform domain chosen from above and introduce the use of the SAGE algorithm as a parameter estimator. This algorithm is used to lower the probability of false alarm for the Voloshynovskiy scheme by improving the accuracy of parameter estimation and therefore lowering the variance of the detector output.}, keywords = {drm, MS Thesis, thesis}, pubstate = {published}, tppubtype = {masterthesis} } Digital watermarking is a relatively overhead free solution to the problem of copyright infringement. In this thesis we investigate the choice of transform domain for embedding blind and non-blind watermarks in the face of eight different attacks. The chosen attacks are commonly used in watermark benchmarking programs. After extensive simulations involving seventeen different transforms, we find that our findings corroborate the results obtained by Ramkumar et al. for compression attacks. In addition, we analyse the Voloshynovskiy scheme for its probability of false alarm in a novel way. We then use the transform domain chosen from above and introduce the use of the SAGE algorithm as a parameter estimator. This algorithm is used to lower the probability of false alarm for the Voloshynovskiy scheme by improving the accuracy of parameter estimation and therefore lowering the variance of the detector output. |
Mathai, N J; Sheikholeslami, A; Kundur, D VLSI Implementation of a Real-Time Video Watermark Embedder and Detector Inproceedings Proc. IEEE International Symposium on Circuits and Systems (ISCAS), pp. 772-775, Bangkok, Thailand, 2003. @inproceedings{MatSheKunISCAS03, title = {VLSI Implementation of a Real-Time Video Watermark Embedder and Detector}, author = {N J Mathai and A Sheikholeslami and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/MatSheKunISCAS03.pdf http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1206088}, year = {2003}, date = {2003-05-01}, booktitle = {Proc. IEEE International Symposium on Circuits and Systems (ISCAS)}, volume = {2}, pages = {772-775}, address = {Bangkok, Thailand}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Mathai, N J; Sheikholeslami, A; Kundur, D Hardware Implementation Perspectives of Digital Video Watermarking Algorithms Journal Article IEEE Transactions on Signal Processing, 51 (4), pp. 925-938, 2003. @article{MatKunSheTSP03, title = {Hardware Implementation Perspectives of Digital Video Watermarking Algorithms}, author = {N J Mathai and A Sheikholeslami and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/MatKunSheTSP03.pdf http://dx.doi.org/10.1109/TSP.2003.809382}, year = {2003}, date = {2003-04-01}, journal = {IEEE Transactions on Signal Processing}, volume = {51}, number = {4}, pages = {925-938}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
2002 |
Campisi, P; Kundur, D; Hatzinakos, D; Neri, A Compressive Data Hiding: An Unconventional Approach for Improved Color Image Coding Journal Article EURASIP Journal on Applied Signal Processing Special Issue on Emerging Applications of Data Hiding, 2002 (2), pp. 152-163, 2002. @article{CamKunHatNerJASP02, title = {Compressive Data Hiding: An Unconventional Approach for Improved Color Image Coding}, author = {P Campisi and D Kundur and D Hatzinakos and A Neri}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/CamKunHatNerJASP02.pdf http://dx.doi.org/10.1155/S1110865702000550}, year = {2002}, date = {2002-01-01}, journal = {EURASIP Journal on Applied Signal Processing Special Issue on Emerging Applications of Data Hiding}, volume = {2002}, number = {2}, pages = {152-163}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Su, K; Kundur, D; Hatzinakos, D A Novel Approach to Collusion Resistant Video Watermarking Inproceedings III, Delp E J; Wong, P W (Ed.): Proc. SPIE Security and Watermarking of Multimedia Contents IV, pp. 491-502, San Jose, California, 2002. @inproceedings{SuKunHatSPIE02, title = {A Novel Approach to Collusion Resistant Video Watermarking}, author = {K Su and D Kundur and D Hatzinakos}, editor = {Delp E J III and P W Wong}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/SuKunHatSPIE02.pdf http://dx.doi.org/10.1117/12.465307}, year = {2002}, date = {2002-01-01}, booktitle = {Proc. SPIE Security and Watermarking of Multimedia Contents IV}, volume = {4675}, pages = {491-502}, address = {San Jose, California}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
2001 |
Su, K; Kundur, D; Hatzinakos, D A Content-Dependent Spatially Localized Video Watermark for Resistance to Collusion and Interpolation Attacks Inproceedings Proc. IEEE International Conference on Image Processing (ICIP), pp. 818-821, Thessaloniki, Greece, 2001. @inproceedings{SuKunHatICIP01, title = {A Content-Dependent Spatially Localized Video Watermark for Resistance to Collusion and Interpolation Attacks}, author = {K Su and D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/SuKunHatICIP01.pdf http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=959171}, year = {2001}, date = {2001-10-01}, booktitle = {Proc. IEEE International Conference on Image Processing (ICIP)}, volume = {1}, pages = {818-821}, address = {Thessaloniki, Greece}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D Watermarking with Diversity: Insights and Implications Journal Article IEEE Multimedia, 8 (4), pp. 46-52, 2001. @article{KunMMM01, title = {Watermarking with Diversity: Insights and Implications}, author = {D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunMMM01.pdf http://dx.doi.org/10.1109/93.959102}, year = {2001}, date = {2001-10-01}, journal = {IEEE Multimedia}, volume = {8}, number = {4}, pages = {46-52}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Kundur, D; Hatzinakos, D Diversity and Attack Characterization for Improved Robust Watermarking Journal Article IEEE Transactions on Signal Processing, 29 (10), pp. 2383-2396, 2001. @article{KunHatTSP01, title = {Diversity and Attack Characterization for Improved Robust Watermarking}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatTSP01.pdf http://dx.doi.org/10.1109/78.950793}, year = {2001}, date = {2001-10-01}, journal = {IEEE Transactions on Signal Processing}, volume = {29}, number = {10}, pages = {2383-2396}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Su, Karen Digital Video Watermarking Principles for Resistance to Collusion and Interpolation Attacks 2001. Abstract | BibTeX | Tags: drm, MS Thesis, thesis @masterthesis{SuMAScThesis01, title = {Digital Video Watermarking Principles for Resistance to Collusion and Interpolation Attacks}, author = {Karen Su}, year = {2001}, date = {2001-09-01}, address = {Toronto, Canada}, school = {University of Toronto}, abstract = {In this thesis,w e propose two video watermarks based on the novel ideas of statistical invisibility and content-synchronized placement. We present a mathematical framework designed to facilitate collusion analysis and thereby enable protection from this important class of attacks. We define statistical invisibility and show that it is not only a property that supports the desired resistance to such attacks,but that it can also be easily induced using a spatially localized image-dependent approach. To construct the watermark,the notion of a watermark’s footprint,the spatial locations over which its energy is spread,is introduced. By defining localized footprints with regular structures,e.g.,sets of subframes within each frame, current image watermarks can immediately be applied at the subframe level. Results are presented to demonstrate the effectiveness of the algorithms. Comparisons are made with the well-known JAWS and CDMA video watermarks,as well as the StirMark 3.1 benchmarking suite.}, keywords = {drm, MS Thesis, thesis}, pubstate = {published}, tppubtype = {masterthesis} } In this thesis,w e propose two video watermarks based on the novel ideas of statistical invisibility and content-synchronized placement. We present a mathematical framework designed to facilitate collusion analysis and thereby enable protection from this important class of attacks. We define statistical invisibility and show that it is not only a property that supports the desired resistance to such attacks,but that it can also be easily induced using a spatially localized image-dependent approach. To construct the watermark,the notion of a watermark’s footprint,the spatial locations over which its energy is spread,is introduced. By defining localized footprints with regular structures,e.g.,sets of subframes within each frame, current image watermarks can immediately be applied at the subframe level. Results are presented to demonstrate the effectiveness of the algorithms. Comparisons are made with the well-known JAWS and CDMA video watermarks,as well as the StirMark 3.1 benchmarking suite. |
Sequeira, A; Kundur, D Communication and Information Theory in Watermarking: A Survey Inproceedings Tescher, A G; Vasudev, B; Bove, V M (Ed.): Proc. SPIE Multimedia Systems and Applications IV, pp. 216-227, Denver, Colorado, 2001. @inproceedings{SeqKunSPIE01, title = {Communication and Information Theory in Watermarking: A Survey}, author = {A Sequeira and D Kundur}, editor = {A G Tescher and B. Vasudev and V M Bove}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/SeqKunSPIE01.pdf http://dx.doi.org/10.1117/12.448206}, year = {2001}, date = {2001-08-01}, booktitle = {Proc. SPIE Multimedia Systems and Applications IV}, volume = {4518}, pages = {216-227}, address = {Denver, Colorado}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Yu, H H; Kundur, D; Lin, C -Y Spies, Thieves, and Lies: The Battle for Multimedia in the Digital Era Journal Article IEEE Multimedia, 8 (3), pp. 8-12, 2001. @article{YuKunLinMMM01, title = {Spies, Thieves, and Lies: The Battle for Multimedia in the Digital Era}, author = {H H Yu and D Kundur and C -Y Lin}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/YuKunLinMMM01.pdf http://dx.doi.org/10.1109/93.939993}, year = {2001}, date = {2001-07-01}, journal = {IEEE Multimedia}, volume = {8}, number = {3}, pages = {8-12}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Fei, C; Kundur, D; Kwong, R Transform-Based Hybrid Data Hiding for Improved Robustness in the Presence of Perceptual Coding Inproceedings Schmalz, M S (Ed.): Proc. SPIE Mathematics of Data/Image Coding, Compression and Encryption IV, with Applications, pp. 203-212, San Diego, California, 2001. @inproceedings{FeiKunKwoSPIE01, title = {Transform-Based Hybrid Data Hiding for Improved Robustness in the Presence of Perceptual Coding}, author = {C Fei and D Kundur and R Kwong}, editor = {M S Schmalz}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/FeiKunKwoSPIE01.pdf http://dx.doi.org/10.1117/12.449583}, year = {2001}, date = {2001-07-01}, booktitle = {Proc. SPIE Mathematics of Data/Image Coding, Compression and Encryption IV, with Applications}, volume = {4475}, pages = {203-212}, address = {San Diego, California}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Fei, Chuhong The Choice of Transform for Robust Watermarking in the Presence of Lossy Compression 2001. Abstract | BibTeX | Tags: drm, MS Thesis, thesis @masterthesis{FeiMAScThesis01, title = {The Choice of Transform for Robust Watermarking in the Presence of Lossy Compression}, author = {Chuhong Fei}, year = {2001}, date = {2001-04-01}, address = {Toronto, Canada}, school = {University of Toronto}, abstract = {Digital watermarking technology is an approach for the protection of digital information against illegal duplication and manipulation. In this thesis, we concentrate on the problem of robust watermarking in the presence of lossy compression. We investigate how the embedding of the watermark signal in a suitable transform domain can improve performance. Two typical classes of watermarking techniques are considered: one is the spread spectrum watermarking method, the other is the quantization based watermarking method. Based on a communication paradigm for watermarking, we present and information-theoretic approach to estimate the number of watermark bits that can be reliably hidden. The best domain for watermarking is determined to maximize the watermark channel capacity. Based on the advantages and disadvantages of both watermarking methods, a novel hybrid watermarking technique is proposed which combines the best of both spread spectrum and quantization based methods.}, keywords = {drm, MS Thesis, thesis}, pubstate = {published}, tppubtype = {masterthesis} } Digital watermarking technology is an approach for the protection of digital information against illegal duplication and manipulation. In this thesis, we concentrate on the problem of robust watermarking in the presence of lossy compression. We investigate how the embedding of the watermark signal in a suitable transform domain can improve performance. Two typical classes of watermarking techniques are considered: one is the spread spectrum watermarking method, the other is the quantization based watermarking method. Based on a communication paradigm for watermarking, we present and information-theoretic approach to estimate the number of watermark bits that can be reliably hidden. The best domain for watermarking is determined to maximize the watermark channel capacity. Based on the advantages and disadvantages of both watermarking methods, a novel hybrid watermarking technique is proposed which combines the best of both spread spectrum and quantization based methods. |
Fei, C; Kundur, D; Kwong, R The Choice of Watermark Domain in the Presence of Compression Inproceedings Proc. IEEE International Conference on Information Technology: Coding and Computing (ITCC), pp. 79-84, Las Vegas, Nevada, 2001. @inproceedings{FeiKunKwoITCC01, title = {The Choice of Watermark Domain in the Presence of Compression}, author = {C Fei and D Kundur and R Kwong}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/FeiKunKwoITCC01.pdf http://dx.doi.org/10.1109/ITCC.2001.918769}, year = {2001}, date = {2001-04-01}, booktitle = {Proc. IEEE International Conference on Information Technology: Coding and Computing (ITCC)}, pages = {79-84}, address = {Las Vegas, Nevada}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
2000 |
Kundur, D Energy Allocation for High-Capacity Watermarking in the Presence of Compression Inproceedings Proc. IEEE International Conference on Image Processing (ICIP), pp. 423-426, Vancouver, Canada, 2000. @inproceedings{KunICIP00, title = {Energy Allocation for High-Capacity Watermarking in the Presence of Compression}, author = {D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunICIP00.pdf http://dx.doi.org/10.1109/ICIP.2000.900985}, year = {2000}, date = {2000-09-01}, booktitle = {Proc. IEEE International Conference on Image Processing (ICIP)}, volume = {1}, pages = {423-426}, address = {Vancouver, Canada}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D Water-filling for Watermarking? Inproceedings Proc. IEEE International Conference on Multimedia and Expo (ICME), pp. 1287-1290, New York City, New York, 2000. @inproceedings{KunICME00, title = {Water-filling for Watermarking?}, author = {D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunICME00.pdf http://dx.doi.org/10.1109/ICME.2000.871002}, year = {2000}, date = {2000-08-01}, booktitle = {Proc. IEEE International Conference on Multimedia and Expo (ICME)}, pages = {1287-1290}, address = {New York City, New York}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D Implications for High Capacity Data Hiding in the Presence of Lossy Compression Inproceedings Proc. IEEE International Conference on Information Technology: Coding and Computing (ITCC), pp. 16-21, Las Vegas, Nevada, 2000. Links | BibTeX | Tags: drm, forensics @inproceedings{KunITCC00, title = {Implications for High Capacity Data Hiding in the Presence of Lossy Compression}, author = {D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunITCC00.pdf http://dx.doi.org/10.1109/ITCC.2000.844177}, year = {2000}, date = {2000-03-01}, booktitle = {Proc. IEEE International Conference on Information Technology: Coding and Computing (ITCC)}, pages = {16-21}, address = {Las Vegas, Nevada}, keywords = {drm, forensics}, pubstate = {published}, tppubtype = {inproceedings} } |
1999 |
Kundur, D; Hatzinakos, D Attack Characterization for Effective Watermarking Inproceedings Proc. IEEE International Conference on Image Processing (ICIP), pp. 240-244, Kobe, Japan, 1999. @inproceedings{KunHatICIP99, title = {Attack Characterization for Effective Watermarking}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatICIP99.pdf http://dx.doi.org/10.1109/ICIP.1999.822892}, year = {1999}, date = {1999-10-01}, booktitle = {Proc. IEEE International Conference on Image Processing (ICIP)}, volume = {4}, pages = {240-244}, address = {Kobe, Japan}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D Improved Digital Watermarking through Diversity and Attack Characterization Inproceedings Proc. Workshop on Multimedia Security at ACM Multimedia `99, pp. 53-58, Orlando, Florida, 1999. @inproceedings{KunMMSec99, title = {Improved Digital Watermarking through Diversity and Attack Characterization}, author = {D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunMMSec99.pdf}, year = {1999}, date = {1999-10-01}, booktitle = {Proc. Workshop on Multimedia Security at ACM Multimedia `99}, pages = {53-58}, address = {Orlando, Florida}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D; Hatzinakos, D Mismatching Perceptual Models for Effective Watermarking in the Presence of Compression Inproceedings Tescher, A G (Ed.): Proc. SPIE Multimedia Systems and Applications II, pp. 29-42, Boston, Massachusetts, 1999. @inproceedings{KunHatSPIE99, title = {Mismatching Perceptual Models for Effective Watermarking in the Presence of Compression}, author = {D Kundur and D Hatzinakos}, editor = {A G Tescher}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatSPIE99.pdf http://dx.doi.org/10.1117/12.371227}, year = {1999}, date = {1999-09-01}, booktitle = {Proc. SPIE Multimedia Systems and Applications II}, volume = {3845}, pages = {29-42}, address = {Boston, Massachusetts}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D; Hatzinakos, D Digital Watermarking for Telltale Tamper-Proofing and Authentication Journal Article Proceedings of the IEEE Special Issue on Identification and Protection of Multimedia Information, 87 (7), pp. 1167-1180, 1999. Links | BibTeX | Tags: drm, forensics @article{KunHatProcIEEE99, title = {Digital Watermarking for Telltale Tamper-Proofing and Authentication}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatProcIEEE99.pdf http://dx.doi.org/10.1109/5.771070}, year = {1999}, date = {1999-07-01}, journal = {Proceedings of the IEEE Special Issue on Identification and Protection of Multimedia Information}, volume = {87}, number = {7}, pages = {1167-1180}, keywords = {drm, forensics}, pubstate = {published}, tppubtype = {article} } |
1998 |
Kundur, D; Hatzinakos, D Improved Robust Watermarking through Attack Characterization Journal Article Optics Express Special Issue on Digital Watermarking, 3 (12), pp. 485-490, 1998. @article{KunHatOE98, title = {Improved Robust Watermarking through Attack Characterization}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatOE98.pdf http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-3-12-485}, year = {1998}, date = {1998-12-07}, journal = {Optics Express Special Issue on Digital Watermarking}, volume = {3}, number = {12}, pages = {485-490}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Kundur, D; Hatzinakos, D Towards a Telltale Watermarking Technique for Tamper-Proofing Inproceedings Proc. IEEE International Conference on Image Processing (ICIP), pp. 409-413, 1998. Links | BibTeX | Tags: drm, forensics @inproceedings{KunHatICIP98, title = {Towards a Telltale Watermarking Technique for Tamper-Proofing}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatICIP98.pdf http://dx.doi.org/10.1109/ICIP.1998.723403}, year = {1998}, date = {1998-10-01}, booktitle = {Proc. IEEE International Conference on Image Processing (ICIP)}, volume = {2}, pages = {409-413}, keywords = {drm, forensics}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D; Hatzinakos, D Digital Watermarking using Multiresolution Wavelet Decomposition Inproceedings Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2969-2972, Seattle, Washington, 1998. @inproceedings{KunHatICASSP98, title = {Digital Watermarking using Multiresolution Wavelet Decomposition}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatICASSP98.pdf http://dx.doi.org/10.1109/ICASSP.1998.678149}, year = {1998}, date = {1998-05-01}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, volume = {5}, pages = {2969-2972}, address = {Seattle, Washington}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
1997 |
Kundur, D; Hatzinakos, D A Robust Digital Image Watermarking Method using Wavelet-Based Fusion Inproceedings Proc. IEEE International Conference on Image Processing (ICIP), pp. 544-547, Santa Barbara, California, 1997. Links | BibTeX | Tags: drm, fusion @inproceedings{KunHatICIP97, title = {A Robust Digital Image Watermarking Method using Wavelet-Based Fusion}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatICIP97.pdf http://dx.doi.org/10.1109/ICIP.1997.647970}, year = {1997}, date = {1997-10-01}, booktitle = {Proc. IEEE International Conference on Image Processing (ICIP)}, volume = {1}, pages = {544-547}, address = {Santa Barbara, California}, keywords = {drm, fusion}, pubstate = {published}, tppubtype = {inproceedings} } |