X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/bibliographie.git/blobdiff_plain/8b404168f8d12dfcdfd506fac694406f6b8c45c6..1972a1712401045673b61f1064092180ea794c78:/bib/biblioand.bib?ds=inline diff --git a/bib/biblioand.bib b/bib/biblioand.bib index 018ed0d..b119611 100644 --- a/bib/biblioand.bib +++ b/bib/biblioand.bib @@ -1,6 +1,163 @@ % This file was created with JabRef 2.3.1. % Encoding: ANSI_X3.4-1968 + +@article{BDCC16, +year={2015}, +journal={Multimedia Tools and Applications}, +title={Blind digital watermarking in PDF documents using Spread Transform Dither Modulation.}, +publisher={Springer US}, +author={Bitar, Ahmad and Darazi, Rony and Couchot, Jean-François and +Couturier, Raphaël}, +note={to appear}, +} + + + +@inproceedings{CW99, +author = {Chen, Brian and Wornell, Gregory W.}, +title = {Provably robust digital watermarking}, +journal = {Proc. SPIE}, +volume = {3845}, +number = {}, +pages = {43-54}, +year = {1999}, +doi = {10.1117/12.371232}, +URL = { http://dx.doi.org/10.1117/12.371232}, +eprint = {} +} + +@INPROCEEDINGS{DM10, +author={Darazi, R. and Hu, R. and Macq, B.}, +booktitle={Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on}, +title={Applying Spread Transform Dither Modulation for 3D-mesh watermarking by using perceptual models}, +year={2010}, +pages={1742-1745}, +keywords={transforms;watermarking;3D-mesh watermarking;curvature;perceptual models;spherical coordinates system;spread transform dither modulation;Computer aided manufacturing;Humans;Laboratories;Quantization;Remote sensing;Robustness;Signal generators;Signal processing;Visual system;Watermarking;3D meshes;Human Visual System (HVS);Quantization Index Modulation(QIM);Watermarking}, +doi={10.1109/ICASSP.2010.5495455}, +ISSN={1520-6149}, +month={March},} + +@INPROCEEDINGS{WLSYNW13, +author={Wan, Wenbo and Liu, Ju and Sun, Jiande and Yang,XiaoHui and Nie, Xiushan and Wang, Feng }, +booktitle={Image Processing (ICIP), 2013 20th IEEE International Conference on}, +title={Logarithmic Spread-Transform Dither Modulation watermarking Based on Perceptual Model}, +year={2013}, +pages={4522-4526}, +keywords={inverse transforms;quantisation (signal);random processes;vectors;watermarking;LQIM;LSTDM-WM;inverse transform;logarithmic quantization function;logarithmic quantization index modulation;logarithmic spread-transform dither modulation based on perceptual model;logarithmic spread-transform dither modulation watermarking;quantization-based watermarking method;quantized signal;random vector;volumetric scaling attack;watermark data;watermark embedding;watermarked signal;Digital Watermarking;LQIM;LSTDM-MW;STDM;Watson's perceptual model}, +doi={10.1109/ICIP.2013.6738931}, +month={Sept},} + + +@article{CW01, +year={2001}, +issn={0922-5773}, +journal={Journal of VLSI signal processing systems for signal, image and video technology}, +volume={27}, +number={1-2}, +title={Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia}, +publisher={Kluwer Academic Publishers}, +keywords={digital watermarking; information embedding; quantization index modulation; dither modulation; distortion compensation}, +author={Chen, Brian and Wornell, Gregory W.}, +pages={7--33} +} + +@InProceedings{WT08, + author = {Wang, C. T. and Tsai, W. H. }, + title = {Data hiding in PDF files and applications by Imperceivable modifications of PDF object parameters}, + OPTcrossref = {}, + OPTkey = {}, + booktitle = {Proceedings of 2008 Conference on Computer Vision, Graphics and Image Processing}, + year = {2008}, + OPTeditor = {}, + OPTvolume = {}, + OPTnumber = {}, + OPTseries = {}, + pages = {1--6}, + OPTmonth = {}, + OPTaddress = {}, + OPTorganization = {}, + OPTpublisher = {}, + OPTnote = {}, + OPTannote = {} +} + +@article{DBLP:journals/sigpro/LeeT10, + author = {I{-}Shi Lee and + Wen{-}Hsiang Tsai}, + title = {A new approach to covert communication via {PDF} files}, + journal = {Signal Processing}, + volume = {90}, + number = {2}, + pages = {557--565}, + year = {2010}, + url = {http://dx.doi.org/10.1016/j.sigpro.2009.07.022}, + doi = {10.1016/j.sigpro.2009.07.022}, + timestamp = {Wed, 13 Jan 2010 11:24:36 +0100}, + biburl = {http://dblp.uni-trier.de/rec/bib/journals/sigpro/LeeT10}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + + +@Article{LLGC13, + author = {Lin, H. F. and Lu, L. W. and Gun, C. Y. and Chen, C. Y.}, + title = {A Copyright Protection Scheme Based on PDF}, + journal = {International Journal of Innovative Computing, Information and Control}, + year = {2013}, + OPTkey = {}, + volume = {9}, + number = {1}, + pages = {1--6}, + OPTmonth = {}, + note = {ISSN 1349-4198}, + OPTannote = {} +} + +@Misc{ACDV12, + author = { Alizadeh, F. and Canceill, N. and Dabkiewicz, S. and Vandevenne, D.}, + title = {Using Steganography to hide messages inside PDF files}, + howpublished = {SSN Project Report}, + month = dec, + year = {2012}, + OPTnote = {34p,} +} + +@InProceedings{PD2008, + author = {POR, L. Y. and Delina, B.}, + title = {Information Hiding: A New Approach in Text Steganography}, + booktitle = {7th WSEAS Int. Conf. on APPLIED COMPUTER $\&$ APPLIED COMPUTATIONAL SCIENCE}, + year = {2008}, + OPTeditor = {}, + OPTvolume = {}, + OPTnumber = {}, + OPTseries = {}, + OPTpages = {}, + month = apr, + OPTaddress = {}, + OPTorganization = {}, + OPTpublisher = {}, + OPTnote = {}, + OPTannote = {} +} + +@article{DBLP:journals/tifs/PevnyBF10, + author = {Tom{\'{a}}s Pevn{\'{y}} and + Patrick Bas and + Jessica J. Fridrich}, + title = {Steganalysis by subtractive pixel adjacency matrix}, + journal = {{IEEE} Transactions on Information Forensics and Security}, + volume = {5}, + number = {2}, + pages = {215--224}, + year = {2010}, + url = {http://dx.doi.org/10.1109/TIFS.2010.2045842}, + doi = {10.1109/TIFS.2010.2045842}, + timestamp = {Sat, 25 Sep 2010 12:20:13 +0200}, + biburl = {http://dblp.uni-trier.de/rec/bib/journals/tifs/PevnyBF10}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + + @INPROCEEDINGS{rifq/others03, author = {Rifqi, Maria and Detyniecki, Marcin and Bouchon-Meunier, Bernadette}, x-lip6teams = {APA}, @@ -1546,6 +1703,10 @@ author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš}, language={English} } + + + + @inproceedings{conf/wifs/HolubF12, added-at = {2013-01-23T00:00:00.000+0100}, author = {Holub, Vojtech and Fridrich, Jessica J.}, @@ -1565,7 +1726,17 @@ language={English} year = 2012 } - +@proceedings{conf/wifs/2012, + title = {2012 {IEEE} International Workshop on Information Forensics and Security, + {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012}, + publisher = {{IEEE}}, + year = {2012}, + url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6395850}, + isbn = {978-1-4673-2285-0}, + timestamp = {Wed, 23 Jan 2013 20:32:42 +0100}, + biburl = {http://dblp.uni-trier.de/rec/bib/conf/wifs/2012}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} @article{FillerJF11, @@ -2218,6 +2389,17 @@ keywords = "Fuzzy edge detector" OPTannote = {} } +@inproceedings{DBLP:dblp_conf/mediaforensics/KodovskyPF10, + author = {Jan Kodovský and + Tomás Pevný and + Jessica J. Fridrich}, + title = {Modern steganalysis can detect YASS.}, + booktitle = {Media Forensics and Security}, + year = {2010}, + pages = {754102}, + ee = {http://dx.doi.org/10.1117/12.838768} +} + @article{DBLP:journals/tifs/KodovskyFH12, author = {Jan Kodovsk{\'y} and Jessica J. Fridrich and