Create Tool:
Create Time:1970-01-01 08:00:00
File Size:654.02 MB
File Count:499
File Hash:e8d562df62260ff0a25044d7e3177d1b6cd4b4c2
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p35-memon.pdf | 998.05 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p78-isakowitz.pdf | 873.47 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p57-mintzer.pdf | 656.61 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p45-craver.pdf | 625.98 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p67-zhao.pdf | 514.79 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p23-schank.pdf | 294.56 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p13-glass.pdf | 283.39 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p81-lohse.pdf | 273.08 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p75-acken.pdf | 267.52 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p89-tenenbaum.pdf | 229.45 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p91-kambil.pdf | 221.18 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p17-rada.pdf | 219.02 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p9-fox.pdf | 215.18 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p107-balasubramanian.pdf | 204.61 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p30-yeung.pdf | 168.68 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p26-crawford.pdf | 153.18 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p86-lincke.pdf | 134.68 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p5-crawford.pdf | 130.61 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p101-arocena.pdf | 128.82 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p112-dennis.pdf | 126.84 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p114-maurer.pdf | 122.15 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p103-takahashi.pdf | 119.32 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p99-van_heck.pdf | 115.42 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p117-senn.pdf | 109.28 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p116-turoff.pdf | 107.66 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p98-oinas-kukkonen.pdf | 95.03 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/p128-neumann.pdf | 81.98 KB |
article/!Communications of the ACM - July 1998 - Vol. 41, No. 7/content.txt | 2.25 KB |
article/!CSS/Barry - Cryptography in Home Entertainment A look at content scrambling in DVDs.mht | 183.06 KB |
article/!CSS/The DVD Content Scrambling System Explained (Part 4).mht | 129.38 KB |
article/!CSS/The DVD Content Scrambling System Explained (Part 3).mht | 124.20 KB |
article/!CSS/The DVD Content Scrambling System Explained (Part 2).mht | 111.84 KB |
article/!CSS/The DVD Content Scrambling System Explained (Part 1).mht | 102.54 KB |
article/!CSS/Stevenson - Cryptanalysis of Contents Scrambling System.mht | 23.07 KB |
article/!Multimedia and Security Workshop at ACM Multimedia 98. Bristol/Workshop ACM 98.pdf | 2.43 MB |
article/!Watermark/Bas Chassery Macq - Geometrically Invariant Watermarking Using Feature Points/Geometrically Invariant Watermarking Using Feature Points.pdf | 1.79 MB |
article/!Watermark/Bender - Applications for data hiding/afdh.pdf | 865.51 KB |
article/!Watermark/Bender - Techniques for Data Hiding/313.pdf | 421.05 KB |
article/!Watermark/Boncelet - A multiresolution watermark for digital images/10.1.1.27.9944.pdf | 769.66 KB |
article/!Watermark/Bors Pitas - Image watermarking using block site selection and DCT domain constraints/bors98image.pdf | 623.25 KB |
article/!Watermark/Bruce - A Review of Digital Watermarking/10.1.1.90.9540.pdf | 728.61 KB |
article/!Watermark/Chae Manjunath - A Robust Embedded Data from Wavelet Coefficients/10.1.1.1.6958.pdf | 1.23 MB |
article/!Watermark/Chae Manjunath - A Technique for Image Data Hiding and Reconstruction without Host Image/10.1.1.33.4939.pdf | 102.78 KB |
article/!Watermark/Chae Manjunath - Data Hiding in Video/data-hiding-in-video.pdf | 49.49 KB |
article/!Watermark/Chandramouli Memon - Digital Watermarking/10.1.1.84.6722.pdf | 182.80 KB |
article/!Watermark/Dugad Ratakonda - A new wavelet-based scheme for watermarking images/10.1.1.41.3163.pdf | 218.19 KB |
article/!Watermark/Ellinas - A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection/10.1.1.81.8931.pdf | 590.13 KB |
article/!Watermark/Gruhl Bender - Information Hiding to Foil the Casual Counterfeiter/10.1.1.35.3750.pdf | 285.48 KB |
article/!Watermark/Herrigel Voloshynovskiy Rytsar - The Watermark Template Attack/10.1.1.26.5902.pdf | 596.21 KB |
article/!Watermark/Jin - A Robust Wavelet-based Blind Digital Watermarking Algorithm/358-363.pdf | 674.18 KB |
article/!Watermark/Kim - Robustness Analysis of Patchwork Watermarking Schemes/PatchworkFinalAll.pdf | 265.12 KB |
article/!Watermark/Kundur - A robust digital image watermarking method using wavelet-based fusion/10.1.1.26.8225.pdf | 229.24 KB |
article/!Watermark/Kutter Bhattacharjee Ebrahimi - Towards second generation watermarking schemes/10.1.1.40.4961.pdf | 137.89 KB |
article/!Watermark/Meerwald - Robustness and Security of Wavelet-Based Watermarking Algorithms/10.1.1.10.4370.pdf | 740.08 KB |
article/!Watermark/Memon Wong - Protecting Digital MediaContent/p35-memon.pdf | 998.05 KB |
article/!Watermark/Miller Cox Bloom - Watermarking in the Real World An Application to DVD/10.1.1.43.3615.pdf | 88.11 KB |
article/!Watermark/Paiz - Tartan Threads A Method for the Real-time Digital Recognition/10.1.1.34.6601.pdf | 568.52 KB |
article/!Watermark/Perrig Willmott - Digital Image Watermarking in the Real World/10.1.1.42.6876.pdf | 187.35 KB |
article/!Watermark/Qi - An Efficient Wavelet-Based Watermarking Algorithm/10.1.1.100.4668.pdf | 373.55 KB |
article/!Watermark/Swanson - Robust audio watermarking using perceptual masking/audio2.pdf | 535.41 KB |
article/!Watermark/Swanson - Robust data hiding for images/10.1.1.56.1165.pdf | 258.21 KB |
article/!Watermark/Sweldens - Building Your Own Wavelets at Home/athome.pdf | 562.64 KB |
article/!Watermark/Sweldens - Wavelets and the Lifting Scheme A 5 Minute Tour/sweldens96wavelets.pdf | 158.85 KB |
article/!Watermark/Wang - A wavelet-based watermarking algorithm for ownership verification of digital images/10.1.1.20.5700.pdf | 2.15 MB |
article/!Watermark/Wang Su Kuo - Wavelet-based digital image watermarking/416AEBAA-BDB9-137E-CC2DC0DC08314475_63350.pdf | 229.78 KB |
article/!Watermark/Westfeld - F5-A Steganographic Algorithm High Capacity Despite Better Steganalysis/21370289.pdf | 232.00 KB |
article/!Watermark/Zhu - Multiresolution Watermarking For Images And Video A Unified Approach/zhu99multiresolution.pdf | 182.00 KB |
article/!Watermark/Лысенко - Построение цифрового водяного знака устойчивого к потери синхронизации/a11.7z | 710.09 KB |
article/!Watermark2/Adelsbach Sadeghi - Zero-Knowledge Watermark Detection and Proof of Ownership/Zero-Knoledge watermark.pdf | 243.30 KB |
article/!Watermark2/Agrawal Haas Kiernan - Watermarking relational data framework, algorithms and analysis/25.PDF | 217.94 KB |
article/!Watermark2/Agung Sweeney - A Method for Combating Random Geometric Attack on Image Watermarking/combat_stirmark.pdf | 64.26 KB |
article/!Watermark2/Ahn Hopper - Public-Key Steganography/public_key_steganography.pdf | 323.82 KB |
article/!Watermark2/Ahsan Kundur - Practical Data Hiding in TCP IP/ACM02.PDF | 104.14 KB |
article/!Watermark2/Anderson Kuhn - Tamper Resistance a Cautionary Note/TAMPER.PDF | 167.65 KB |
article/!Watermark2/Anderson Petitcolas - On The Limits of Steganography/steganjsac2.ps.pdf | 201.56 KB |
article/!Watermark2/Ansari Memon - The JPEG Lossless Standards/7.PDF | 212.36 KB |
article/!Watermark2/Ansari Memon - The JPEG Standard/6.PDF | 356.85 KB |
article/!Watermark2/Atallah Raskin Hempelmann Karahan Sion Topkara Triezenberg - Natural Language Watermarking and Tamperproofing/natural language watermarking.pdf | 235.31 KB |
article/!Watermark2/Atallah Sion Prabhakar - Watermarking non-media content/talk-Qual2-CS-2000.pdf | 673.81 KB |
article/!Watermark2/Atallah Sion Prabhakar - Watermarking non-media content/poster-Symposium-CERIAS-2001.pdf | 179.30 KB |
article/!Watermark2/Atallah Wagstaff - Watermarking with quadratic residues/WATER.PDF | 152.70 KB |
article/!Watermark2/Avcibas - Image Quality Statistics and Their Use in Steganalysis and Compression/avcibas01image.pdf | 663.76 KB |
article/!Watermark2/Avcibas Memon Sankur - Steganalysis Based on Image Quality Metrics/48.PDF | 221.31 KB |
article/!Watermark2/Avcibas Memon Sankur - Steganalysis Based on Image Quality Metrics/steganalysis-based-on-image.pdf | 175.21 KB |
article/!Watermark2/Avcibas Memon Sankur Sayood - A Progressive Lossless Near-Lossless Image Compression Algorithm/11 A Progressive Lossless-Near-Lossless Image Compression Algorithm.pdf | 134.38 KB |
article/!Watermark2/Avcibas Sankur Sayood - Statistical Evaluation of Image Quality Measures/avcibas02statistical.pdf | 293.24 KB |
article/!Watermark2/Baharav Shaked - Watermarking of Dither Halftoned Images/HPL-98-32.pdf | 566.40 KB |
article/!Watermark2/Barni Bartolini Cappellini Piva - Image watermarking for secure transmission over public networks/image-watermarking-for-secure.pdf | 551.50 KB |
article/!Watermark2/Bas Chassery Macq - Geometrically Invariant Watermarking Using Feature Points/Geometrically Invariant Watermarking Using Feature Points.pdf | 1.79 MB |
article/!Watermark2/Bassia Pitas - Robust audio watermarking in the time domain/Bassia98a.ps.pdf | 145.47 KB |
article/!Watermark2/Bauml Eggers Huber - A Channel Model for Watermarks Subject to Desynchronization Attacks/RB_ITG02.PDF | 213.59 KB |
article/!Watermark2/Bauml Eggers Tzschoppe Huber - A Channel Model for Watermarks Subject to Desynchronization Attacks/EI2002-4675-31.pdf | 263.22 KB |
article/!Watermark2/Benedens - Robust Watermarking and Affine Registration of 3D Meshes/Robust Watermarking of 3D Meshes.pdf | 350.11 KB |
article/!Watermark2/Berenstein - Random Transforms, Wavelets, and Application/TR_96-65.PDF | 1.50 MB |
article/!Watermark2/Bloom Alonso - SmartSearch Steganalysis/bloom03smartsearch.pdf | 34.85 KB |
article/!Watermark2/Bloom Cox Kalker Linnartz Miller Traw - Copy Protection for DVD Video/ProcIEEE1999b.pdf | 105.76 KB |
article/!Watermark2/Blundo Galdi - Steganography Using Modern Arts/12 Mozaics.pdf | 355.87 KB |
article/!Watermark2/Boneh Shaw - Collusion-Secure Fingerprinting for Digital Data/FINGER.PDF | 285.35 KB |
article/!Watermark2/Bors Pitas - Embedding parametric digital signatures in images/Bors96b.ps.pdf | 174.25 KB |
article/!Watermark2/Bors Pitas - Image watermarking using dct domain constraints/Bors96d.ps.pdf | 232.85 KB |
article/!Watermark2/Bounkong Saad Lowe - ICA based Steganography/NCRG_2002_023.pdf | 174.30 KB |
article/!Watermark2/Bounkong Saad Lowe - Independent Component Analysis for Domain Independent Watermarking/NCRG_2002_022.pdf | 154.04 KB |
article/!Watermark2/Bounkong Saad Lowe - Quantisation Effects and Watermarking Capacity/iscta2003_revised.pdf | 202.69 KB |
article/!Watermark2/Bounkong Toch Saad Lowe - ICA for Watermarking Digital Images/S_ica_watermarking_jmlr_revised.pdf | 543.03 KB |
article/!Watermark2/Bounkong Toch Saad Lowe - Structured Codebooks for SCSWatermarking/404-108.PDF | 177.52 KB |
article/!Watermark2/Brandao Queluz Rodrigues - Diversity Enhancement of Coded Spread Spectrum Video Watermarking/9.PDF | 186.00 KB |
article/!Watermark2/Brickman - Literature Survey on Audio Watermarking/LitSurveyReport.pdf | 104.43 KB |
article/!Watermark2/Brisbane Safavi-Naini Ogunbona - An Algorithm for Data Hiding Using Median Cut Segmentation/data hiding.pdf | 115.08 KB |
article/!Watermark2/Burges Platt Jana - Distortion Discriminant Analysis for Audio Fingerprinting/IEEE_SAP.PDF | 182.10 KB |
article/!Watermark2/Cano Batlle Gomez Gomes Bonnet - Audio fingerprinting concepts and applications/cano02audio.pdf | 70.74 KB |
article/!Watermark2/Cano Batlle Kalker Haitsma - A Review of Algorithms for Audio Fingerprinting/a-review-of-algorithms.pdf | 53.98 KB |
article/!Watermark2/Celik Sharma Saber Tekalp - A hierarchical image authenticationwatermark with improved localization and security/celik01hierarchical.pdf | 2.29 MB |
article/!Watermark2/Celik Sharma Tekalp Saber - Lossless Generalized-LSB Data Embedding/lossless-generalized-lsb-data.pdf | 367.21 KB |
article/!Watermark2/Celik Sharma Tekalp Saber - Reversible data hiding/reversible-data-hiding.pdf | 190.12 KB |
article/!Watermark2/Chandramouli - A Mathematical Framework for Active Steganalysis/a-mathematical-framework-for.pdf | 226.97 KB |
article/!Watermark2/Chandramouli Memon - A Distributed Detection Framework for Steganalysis/ATTAC.PDF | 122.26 KB |
article/!Watermark2/Chandramouli Memon Rabbani - Digital Watermarking/3.PDF | 182.80 KB |
article/!Watermark2/Chang Kankanhalli Guan Huang Wu - Robust image authentication using content based compression/Robust image authentication.pdf | 1.15 MB |
article/!Watermark2/Chou Pradham Pradhan Ghaoui Ramchandran - Watermarking Based On Duality With Distributed Source Coding/chou00robust.pdf | 373.48 KB |
article/!Watermark2/Cohen - Information Theoretic Analysis of Watermarking Systems/THESIS.PDF | 1.13 MB |
article/!Watermark2/Cohen Draper Martinian Wornell - Source Requantization Successive Degradation and Bit Stealing/cohen02source.pdf | 461.98 KB |
article/!Watermark2/Cohen Draper Martinian Wornell - Stealing Bits from a Quantized Source/isit-lausanne-switzerland-june.pdf | 78.00 KB |
article/!Watermark2/Cohen Lapidoth - Generalized Writing on Dirty Paper/gwdpAbs.pdf | 125.01 KB |
article/!Watermark2/Cohen Lapidoth - On the Gaussian Watermarking Game/isit_2000.pdf | 145.86 KB |
article/!Watermark2/Cohen Lapidoth - The Capacity of the Vector Gaussian Watermarking Game/isit_2001.pdf | 154.17 KB |
article/!Watermark2/Cohen Lapidoth - The Gaussian Watermarking Game/IT_FINAL.PDF | 473.77 KB |
article/!Watermark2/Cohen Lapidoth - Watermarking Capacity for Gaussian Sources/PROC.PDF | 190.65 KB |
article/!Watermark2/Cohen Zemor - Copyright Protection for Digital Data/cohen99copyright.pdf | 147.61 KB |
article/!Watermark2/Cox Kilian Leighton Shamoon - A Secure, Robust Watermark for Multimedia/CAM96.PDF | 830.32 KB |
article/!Watermark2/Cox Kilian Leighton Shamoon - Secure spread spectrum watermarking for images, audio and video/ICIP96.PDF | 265.50 KB |
article/!Watermark2/Cox Linnartz - Public watermarks and resistance to tampering/ICIP97.PDF | 135.88 KB |
article/!Watermark2/Cox Miller - A review of watermarking and the importance of perceptual modeling/EI97.PDF | 176.39 KB |
article/!Watermark2/Cox Miller - Electronic watermarking the first 50 years/MMSP01.PDF | 111.58 KB |
article/!Watermark2/Cox Miller - The first 50 years of electronic watermarking/JASP02.PDF | 112.73 KB |
article/!Watermark2/Cox Miller Bloom - Watermarking applications and their properties/ITCC00.PDF | 33.88 KB |
article/!Watermark2/Cox Miller McKellips - Watermarking as communications with side information/procieee1_99.pdf | 257.40 KB |
article/!Watermark2/Craver - On Public-Key Steganography in the Presence of an Active Warden/18 On Public-Key Steganography in the Presence.pdf | 219.30 KB |
article/!Watermark2/Cvejic Seppanen - Improving audio watermarking scheme using psychoacoustic watermark filtering/93.PDF | 32.22 KB |
article/!Watermark2/Dalbegue Baras Sidiropoulos - Compact Image Coding from Multiscale Edges/TR_98-61.PDF | 441.26 KB |
article/!Watermark2/Das Maitra - Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme/4.PDF | 368.07 KB |
article/!Watermark2/Day Jou Lee - Rotation, Scaling, and Translation Resilient Image Watermarking with Side Information at Encoder/5.PDF | 337.38 KB |
article/!Watermark2/Delannay - Digital Watermarking Algorithms Robust Against Loss of Synchronization/DigitalWatermarking Algorithms Robust Against.pdf | 4.51 MB |
article/!Watermark2/Delannay - Integrated Fingerprinting in Secure Digital Cinema Projection/delannay_OS&T01.pdf | 667.52 KB |
article/!Watermark2/Delannay Delaigle Macq Barlaud - Compensation of Geometrical Deformations for Watermark Extraction in the Digital Cinema Application/delannay_SPIE01.pdf | 199.74 KB |
article/!Watermark2/Delannay Macq - A Method for Hiding Synchronization Marks in Scale and Rotation Resilient Watermarking Schemes/delannay_SPIE02.pdf | 367.74 KB |
article/!Watermark2/Doerr Dugelay - A guide tour of video watermarking/imageComm2003.pdf | 830.03 KB |
article/!Watermark2/Doerr Dugelay - New intra-video collusion attack using mosaicing/ICME2003.PDF | 99.62 KB |
article/!Watermark2/Doerr Dugelay - Secure Background Watermarking Based on Video Mosaicing/SPIE2004.PDF | 347.39 KB |
article/!Watermark2/Doerr Dugelay - Secure Video Watermarking Via Embedding Strength Modulation/IWDW2003.PDF | 223.42 KB |
article/!Watermark2/Doerr Dugelay - Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking/doerrSP2004.pdf | 199.69 KB |
article/!Watermark2/Doerr Dugelay - Switching Between Orthogonal Watermarks for Enhanced Security Against Collusion in Video/RR_03_080.pdf | 125.07 KB |
article/!Watermark2/Doerr Dugelay - Video watermarking overview and challenges/furhtBook.pdf | 398.67 KB |
article/!Watermark2/Droogenbroeck Benedett - Techniques for a selective encryption of uncompressed and compressed images/acivs2002mvd.pdf | 519.50 KB |
article/!Watermark2/Droogenbroeck Delvaux - An entropy based technique for information embedding in images/SPS-034.PDF | 507.44 KB |
article/!Watermark2/Du Zou Lu - An Optimized Spatial Data Hiding Scheme Combined with Convolutional Codes and Hilbert Scan/Data hiding and codes.pdf | 861.52 KB |
article/!Watermark2/Dugelay Rey Doerr Csurka - Dewatermarking Based on Self-Similarities/RR_02_060.pdf | 910.28 KB |
article/!Watermark2/Dumitrescu Wu Memon - On Steganalysis of Random LSB Embedding in Images/41.PDF | 163.87 KB |
article/!Watermark2/Dumitrescu Wu Wang - Detection of LSB Steganography via Sample Pair Analysis/22.PDF | 355.31 KB |
article/!Watermark2/Eggers - Digital Watermarking Theoretic Foundation and Applications/RUEGEN.PDF | 163.78 KB |
article/!Watermark2/Eggers - Information Embedding and Digital Watermarking/stanford_jan_2002.pdf | 596.02 KB |
article/!Watermark2/Eggers Bauml Girod - A Communications Approach to Image Steganography/ei2002_stego.pdf | 185.19 KB |
article/!Watermark2/Eggers Bauml Girod - Digital Watermarking Facing Attacks by Amplitude Scaling and Additive White Noise/JJ_ITG02.PDF | 155.14 KB |
article/!Watermark2/Eggers Bauml Girod - Estimation Of Amplitude Modifications before SCS Watermark Detection/ei2002_estimD.pdf | 295.95 KB |
article/!Watermark2/Eggers Bauml Tzschoppe Girod - Inverse Mapping of SCS-Watermarked Data/inverseSCS.pdf | 125.04 KB |
article/!Watermark2/Eggers Bauml Tzschoppe Girod - Scalar Costa Scheme for Information Embedding/eggersIEEEsi20.pdf | 480.95 KB |
article/!Watermark2/Eggers Bauml Tzschoppe Huber - Applications of Information Hiding and Digital Watermarking/v3d2ECDL.pdf | 103.47 KB |
article/!Watermark2/Eggers Girod - Blind watermarking applied to image authentication/ICASSP01.PDF | 115.14 KB |
article/!Watermark2/Eggers Girod - Quantization Effects on Digital Watermarks/Eggers99a.pdf | 301.71 KB |
article/!Watermark2/Eggers Girod - Quantization Watermarking/SPIE2000.PDF | 191.73 KB |
article/!Watermark2/Eggers Girod - Robustness of Public Key Watermarking Schemes/pubkey_vortrag2.pdf | 320.77 KB |
article/!Watermark2/Eggers Girod - Watermark Detection after Quantization Attacks/Eggers99b.pdf | 178.67 KB |
article/!Watermark2/Eggers Ihlenfeldt Girod - Digital Watermarking of Chemical Structure Sets/IHW4TH.PDF | 161.48 KB |
article/!Watermark2/Eggers Su - Performance of a Practical Blind Watermarking Scheme/EI2001.PDF | 220.00 KB |
article/!Watermark2/Eggers Su Girod - A Blind Watermarking Scheme Based on Structured Codebooks/SIIA_paper.pdf | 174.81 KB |
article/!Watermark2/Eggers Su Girod - Asymmetric Watermarking Schemes/BerlinGI2000.pdf | 103.42 KB |
article/!Watermark2/Eggers Su Girod - Public keywatermarking by eigenvectors of linear transforms/eusipco2000.pdf | 81.70 KB |
article/!Watermark2/Eggers Su Girod - Robustness of a blind imagewatermarking scheme/ICIP2000.PDF | 82.53 KB |
article/!Watermark2/Emmanuel Kankanhalli - A digital rights management scheme for broadcast video/bradcast video.pdf | 313.57 KB |
article/!Watermark2/Engan Gulsrud Josefsen - Watermarking of digital mammograms without interfering with automatic detection of microcalcifications/ICIP2003.PDF | 81.68 KB |
article/!Watermark2/Eskicioglu - Quality measurement for monochrome compressed images in the past 25 years/quality-measurement-for-monochrome.pdf | 43.82 KB |
article/!Watermark2/Faridy Lyu - Higher-order Wavelet Statistics and their Application to Digital Forensics/SACV03.PDF | 2.37 MB |
article/!Watermark2/Fei Kundur Kwong - The Choice of Watermark Domain in the Presence of Compression/fei01choice.pdf | 99.75 KB |
article/!Watermark2/Fisk Papadopoulos Neil - Eliminating Steganography in Internet Traffic with Active Wardens/Eliminating Steganography In Internet Traffic.pdf | 221.70 KB |
article/!Watermark2/Fisk Papadopoulos Neil - Eliminating Steganography in Internet Traffic with Active Wardens/IH02.PDF | 98.82 KB |
article/!Watermark2/Fletcher Larkin - Direct Embedding and Detection of RST Invariant Watermarks/Direct Embedding And Detection of RST-Invariant WM.pdf | 1.16 MB |
article/!Watermark2/Foote Adcock Girgensohn - Time Base Modulation A New Approach to Watermarking Audio/FXPAL-PR-03-212.pdf | 108.40 KB |
article/!Watermark2/Fotopoulos Skodras - A subband dct approach to image watermarking/ANS-C33.PDF | 239.42 KB |
article/!Watermark2/Fourier Transform in image processing/Mathematics - FourierTransform in image processing.pdf | 650.72 KB |
article/!Watermark2/Franz - Steganography Preserving Statistical Properties/Steganography Preserving Statistical Properties.pdf | 374.92 KB |
article/!Watermark2/Fridrich - Key-Dependent Random Image Transforms and Their Applications in Image Watermarking/key-dependent-random-image.pdf | 91.17 KB |
article/!Watermark2/Fridrich Goljan Du - Lossless Data Embedding For All Image Formats/lossless_all_formats.pdf | 262.31 KB |
article/!Watermark2/Fridrich Goljan Hogea - Steganalysis of JPEG Images Breaking the F5 Algorithm/Steganalysis of JPEG Images Breaking the F5 Algorithm.pdf | 267.67 KB |
article/!Watermark2/Fridricha Goljanb Memonc Shended Wonge - On the security of the Yeung-Mintzer authentication watermark/15 ON THE SECURITY OF THE YEUNG-MINTZER.pdf | 230.86 KB |
article/!Watermark2/Gilani Skodras - Dlt-based digital image watermarking/ANS-C34.PDF | 51.55 KB |
article/!Watermark2/Gilani Skodras - Robust image watermarking by subband dlt/ANS-C41.PDF | 244.87 KB |
article/!Watermark2/Girod Hartung Horn - Multiresolution coding of image and video signals/ghh_eus98.ps.pdf | 241.77 KB |
article/!Watermark2/Goljan Fridrich Du - Distortion-Free Data Embedding for Images/Distortion Free Data Embedding For Images.pdf | 245.16 KB |
article/!Watermark2/Gomes Gomez Moreau - Resynchronization methods for audio watermarking/gomes01resynchronization.pdf | 396.69 KB |
article/!Watermark2/Gomez Cano Gomes Batlle Bonnet - Mixed Watermarking-Fingerprinting Approach for Integrity Verification of Audio Recordings/mixed-watermarking-fingerprinting-approach.pdf | 278.50 KB |
article/!Watermark2/Gonzalez Hernandez - A tutorial on digital watermarking/Tutorial on DWM 99.pdf | 384.50 KB |
article/!Watermark2/Gordy Bruton - Performance Evaluation of Digital Audio Watermarking Algorithms/Performance Evaluation of Digital Audio Watermarking Algorithms.pdf | 90.75 KB |
article/!Watermark2/Grosbois Gerbelot Ebrahimi - Authentication and access control in the JPEG 2000 compressed domain/jpeg2000_grosbois.pdf | 1.21 MB |
article/!Watermark2/Guelvouit Pateux - Wide spread spectrum watermarking with side information and interference cancellation/wide-spread-spectrum-watermarking.pdf | 671.16 KB |
article/!Watermark2/Guelvouit Pateux Guillemot - Information-theoretic resolution of perceptual WSS watermarking of non i.i.d. Gaussian signals/leguelvouit02informationtheoretic.pdf | 212.59 KB |
article/!Watermark2/Guelvouit Pateux Guillemot - Perceptual Watermarking Of Non I.i.d. Signals Based On Wide Spread Spectrum Using Side Information/leguelvouit02perceptual.pdf | 137.25 KB |
article/!Watermark2/Guo Georganas - Digital imagewatermarking for joint ownership verification without a trusted dealer/digital-image-watermarking-for.pdf | 170.16 KB |
article/!Watermark2/Guoxiang Weiwei - Image-Feature Based Second Generation Watermarking in Wavelet Domain/Image-feature wavelet WM.pdf | 98.51 KB |
article/!Watermark2/Hartung Eisert Girod - Digital Watermarking of 3D Head Model Animation Parameters/fh_imdsp98_poster.ps.pdf | 61.48 KB |
article/!Watermark2/Hartung Eisert Girod - Digital Watermarking of MPEG-4 Facial Animation Parameters/cg98.ps.pdf | 360.47 KB |
article/!Watermark2/Hartung Girod - Copyright Protection in Video Delivery Networks by Watermarking of Pre-Compressed Video/ecmast97.ps.pdf | 234.77 KB |
article/!Watermark2/Hartung Girod - Digital watermarking of MPEG-2 coded video in the bitstream domain/icassp97.ps.pdf | 145.33 KB |
article/!Watermark2/Hartung Girod - Digital Watermarking of Raw and Compressed Video/berlin.ps.pdf | 323.71 KB |
article/!Watermark2/Hartung Girod - Fast public-key watermarking of compressed video/icip97.ps.pdf | 136.60 KB |
article/!Watermark2/Hartung Girod - Watermarking of Uncompressed and Compressed Video/sig_pro_66_3.ps.pdf | 539.64 KB |
article/!Watermark2/Hartung Kutter - Multimedia Watermarking Techniques/ProcIEEEHartungKutter.pdf | 1.33 MB |
article/!Watermark2/Hartung Su Girod - Spread Spectrum Watermarking Malicious Attacks and Counterattacks/attacks.ps.pdf | 260.06 KB |
article/!Watermark2/Holliman Memon - Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes/publi_countr_wtrmrk.pdf | 708.70 KB |
article/!Watermark2/Honsinger Rabbani - Data Embedding Using Phase Dispersion/dataEmbedding.pdf | 703.95 KB |
article/!Watermark2/Hopper Langford Ahn - Companion to Provably Secure Steganography/companion-to-provably-secure.pdf | 105.14 KB |
article/!Watermark2/Hopper Langford Ahn - Provably Secure Steganography/17.PDF | 220.72 KB |
article/!Watermark2/Hwang Shih Kao Chang - Lossy Compression Tolerant Steganography/13.PDF | 224.06 KB |
article/!Watermark2/Jacobsen Solanki Madhow Manjunath Chandrasekaran - Image adaptive high volume data hiding based on scalar quantization/image-adaptive-high-volume.pdf | 203.00 KB |
article/!Watermark2/Johnson - An Introduction to Watermark Recovery from Images/NFJIDR99.PDF | 940.94 KB |
article/!Watermark2/Jung Seok Hong - An Improved Detection Technique for Spread Spectrum Audio Watermarking with a Spectral Envelope Filter/25-01-08.PDF | 763.41 KB |
article/!Watermark2/Kailasanathan Naini Ogunbona - Compression Performance of JPEG Encryption Scheme/compression-performance-of-jpeg.pdf | 99.84 KB |
article/!Watermark2/Kailasanathan Naini Ogunbona - Compression Tolerant DCT Based Image Hash/compression-tolerant-dct-based.pdf | 141.00 KB |
article/!Watermark2/Kailasanathan Safavi-Naini Ogunbona - Fragile Watermark on Critical Points/fragile-watermark-on-critical.pdf | 197.77 KB |
article/!Watermark2/Kailasanathan Safavi-Naini Ogunbona - Image Authentication Surviving Acceptable Modifications/image-authentication-surviving-acceptable.pdf | 141.30 KB |
article/!Watermark2/Kankanhalli Hau - Watermarking of Electronic Text Documents/Watermarking of text document.pdf | 146.77 KB |
article/!Watermark2/Karakos - Digital Watermarking, Fingerprinting and Compression An Information-Theoretic Perspective/PhD_2002-5.pdf | 646.19 KB |
article/!Watermark2/Karakos Papamarcou - A Relationship Between Quantization and Watermarking Rates in the Presence of Gaussian Attacks/01214075 A Relationship Between Quantization and.pdf | 956.74 KB |
article/!Watermark2/Karakos Papamarcou - A Relationship Between Quantization and Watermarking Rates in the Presence of Gaussian Attacks/TR_2001-50.pdf | 390.75 KB |
article/!Watermark2/Karakos Papamarcou - A Relationship Between Quantization and Watermarking Rates in the Presence of Gaussian Attacks/ciss2002_final.pdf | 235.59 KB |
article/!Watermark2/Karakos Papamarcou - Fingerprinting, Watermarking and Quantization of Gaussian Data/ALLERTON.PDF | 185.08 KB |
article/!Watermark2/Karakos Papamarcou - Relationship between Quantization and Distribution Rates of Digitally Watermarked Data/ISIT2000.PDF | 109.69 KB |
article/!Watermark2/Karakos Trahanias - Generalized Multichannel Image-Filtering Structures/00597278 Generalized Multichannel Image-Filtering Structures.pdf | 445.51 KB |
article/!Watermark2/Karasaridis Simoncelli - A filter design technique for steerable pyramid image transforms/karasaridis96.ps.pdf | 153.23 KB |
article/!Watermark2/Kesal Mihcak Koetter Moulin - Iteratively decodable codes for watermarking applications/kesal00iteratively.pdf | 158.65 KB |
article/!Watermark2/Kim - Audio Watermarking Techniques/Invite-Kim.pdf | 188.72 KB |
article/!Watermark2/Kim Baek Lee Suh - Robust Image Watermark Using Radon Transform and Bispectrum Invariants/Robust Image WM using Rnd Transform And Bispectrum Invariants .pdf | 248.30 KB |
article/!Watermark2/Kim Perrig Tsudik - Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups/CCS2000.PDF | 244.96 KB |
article/!Watermark2/Kirovski Attias - Audio Watermark Robustness to Desynchronization via Beat Detection/Audio WM Robustness via Beat Detection.pdf | 325.67 KB |
article/!Watermark2/Kirovski Attias - Audio Watermark Robustness to Desynchronization via Beat Detection/wmbeatfinal.pdf | 253.83 KB |
article/!Watermark2/Kirovski Drinic Potkonjak - Hypermedia-Aided Design/dac2001HAD.pdf | 284.32 KB |
article/!Watermark2/Kokes Gibson Orsak Stolpman - The method of types and lossy data-embedding/kokes00method.pdf | 325.51 KB |
article/!Watermark2/Korjik Morales-Luna - Information Hiding through Noisy Channels/Infromation Hiding Through Noisy Channels.pdf | 141.94 KB |
article/!Watermark2/Kugarajah Zhang - Multi-Dimensional Wavelet Frames/TR_95-31.PDF | 435.37 KB |
article/!Watermark2/Kundur - Implications for High Capacity Data Hiding in the Presence of Lossy Compression/kundur00implications.pdf | 82.67 KB |
article/!Watermark2/Kundur Hatzinakos - Mismatching Perceptual Models for Effective Watermarking in the Presence of Compression/kundur99mismatching.pdf | 367.66 KB |
article/!Watermark2/Kutter Petitcolas - Fair Evaluation Methods for Image Watermarking Systems/jei00-benchmark.pdf | 335.22 KB |
article/!Watermark2/Lai Kuo - Image quality measurement using the Haar wavelet/lai97image.pdf | 227.36 KB |
article/!Watermark2/Lai Kuo Li - New Image Compression Artifact Measure Using Wavelets/new-image-compression-artifact.pdf | 265.46 KB |
article/!Watermark2/Lambrecht Farrell - Perceptual Quality Metric for Digitally Coded Color Images/vdb_eusipco96b.pdf | 402.83 KB |
article/!Watermark2/Le Desmedt - Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection/CryptoAnalysis For UCLA WM Scheme.pdf | 184.05 KB |
article/!Watermark2/Le Nguyen - Digital Image Watermarking with Geometric Distortion Corrections Using the Moment Image Theory/DIWM with Geometric Distort Correct using Moment Image Theory.pdf | 121.90 KB |
article/!Watermark2/Lee - An Adaptive Digital Image Watermarking Technique for Copyright Protection/IS99-Watermarking.pdf | 173.17 KB |
article/!Watermark2/Lee Chen - Object-based image steganography using affine transformation/23.PDF | 884.07 KB |
article/!Watermark2/Lee Chen - Secure error-free steganography for jpeg images/24.PDF.!ut | 647.35 KB |
article/!Watermark2/Levy Merhav - An Image Watermarking Scheme Based on Information Theoretic Principles/HPL-2001-13.pdf | 397.89 KB |
article/!Watermark2/Levy Shaked - A Transform Domain Hardcopy Watermarking Scheme/HPL-2001-309.pdf | 184.95 KB |
article/!Watermark2/Li Chang - Security of Public Watermarking Schemes for Binary Sequences/Security of Watermarking Technicues for Binary Sequences.pdf.!ut | 170.40 KB |
article/!Watermark2/Loo - Digital Watermarking using Complex Wavelets/PatrickLooPhDThesis.pdf | 1.93 MB |
article/!Watermark2/Loo Kingsbury - Digital watermarking with complex wavelets/PL_iee00.pdf | 339.24 KB |
article/!Watermark2/Lu Huang Sze Liao - A New Watermarking Technique for Multimedia Protection/ch18.ps.pdf | 1011.13 KB |
article/!Watermark2/Lu Liao - Oblivious cocktail watermarking by sparse code shrinkage a regional- and global-based scheme/icip2000_3604.ps.pdf | 265.95 KB |
article/!Watermark2/Lu Liao - Oblivious watermarking using generalized gaussian/cvprip00.ps.pdf | 172.56 KB |
article/!Watermark2/Lyu Farid - Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines/lyu02detecting.pdf | 241.04 KB |
article/!Watermark2/McGuire - An image registration technique for recovering rotation, scale and translation parameters/Image registration.pdf | 303.72 KB |
article/!Watermark2/Meerwald - Quantization watermarking in the JPEG2000 coding pipeline/jpeg2000_meerwald.pdf | 293.17 KB |
article/!Watermark2/Meerwald Uhl - Watermark security viawavelet filter parametrization/watermark-security-via-wavelet.pdf | 622.53 KB |
article/!Watermark2/Mehrabi - Digital Watermark/Digital watermarking.pdf | 179.25 KB |
article/!Watermark2/Mei Wong Memon - Data Hiding in Binary Text Documents/51.PDF.!ut | 149.85 KB |
article/!Watermark2/Memon Neuhoff Shende - Optimizing prediction gain in axial symmetric scans/54.PDF.!ut | 63.52 KB |
article/!Watermark2/Memon Sayood - Facsimile/fax_compress.pdf | 187.32 KB |
article/!Watermark2/Merhav - On Random Coding Error Exponents of Watermarking Codes/HPL-98-169.pdf | 255.25 KB |
article/!Watermark2/Miller Cox Bloom - Informed embedding exploiting image and detector information during watermark insertion/ICIP00.PDF | 109.15 KB |
article/!Watermark2/Miller Cox Linnartz - A review of watermarking principles and practices/bookchapter99.pdf | 230.44 KB |
article/!Watermark2/Miller Doerr Cox - Applying Informed Coding and Embedding to Design a Robust, High Capacity Watermark/millerIP2003.pdf | 516.17 KB |
article/!Watermark2/Miller Doerr Cox - Dirty-paper trellis codes forwatermarking/icip02 v2.pdf | 406.86 KB |
article/!Watermark2/Miller Doerr Cox - Dirty-paper trellis codes forwatermarking/miller2002.pdf | 117.69 KB |
article/!Watermark2/Miller Doerr Cox - Informed Embedding for Multi-bit Watermarks/multi-bit watermarks.pdf | 190.81 KB |
article/!Watermark2/Miller Rodriguez Cox - Audio Fingerprinting Nearest Neighbor Search in High Dimensional Binary Spaces/MMSP02.PDF | 129.59 KB |
article/!Watermark2/Mintzer Braudaway Bell - Opportunities for Watermarking Standards/MINTZER.PDF | 656.61 KB |
article/!Watermark2/Moulin - The role of information theory in watermarking and its application to image watermarking/Information theory in WM.PDF.!ut | 263.86 KB |
article/!Watermark2/Moulin Koetter - Data-Hiding Codes/ProcIEEE05.pdf | 1.24 MB |
article/!Watermark2/Muntean Grivel Nafornita Najim - Audio digital watermarking for copyright protection/L13.PDF | 199.57 KB |
article/!Watermark2/Muntean Grivel Najim - Watermark space partition for digital audio blind watermarking/PAPER25.PDF | 250.06 KB |
article/!Watermark2/Nagai Ikehara Kaneko Kurematsu - Generalized Unequal Length Lapped Orthogonal Transform for Subband Image Coding/ullotnagai.pdf | 907.44 KB |
article/!Watermark2/Nakai - Semi Fragile Watermarking Based on Wavelet Transform/semifragile.pdf | 133.07 KB |
article/!Watermark2/Nakamura Tachibana Kobayashi - Automatic music monitoring and boundary detection for broadcast using audio watermarking/Taiga_EI02Paper.pdf | 96.24 KB |
article/!Watermark2/Natarajan - Robust Public Key Watermarking of Digital Images/HPL-97-118.pdf | 192.07 KB |
article/!Watermark2/Newman Moskowitz Chang Brahmadesam - A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis/A Steganographic Embedding Undetectable.pdf | 261.05 KB |
article/!Watermark2/Nikolaidis Pitas - Copyright protection of images using robust digital signatures/icassp96.ps.pdf | 191.93 KB |
article/!Watermark2/Nikolaidis Pitas - Facial feature extraction and pose determination/NikolaidisA99a.pdf | 297.45 KB |
article/!Watermark2/Noda Spaulding Shirazi Niimi Kawaguchi - Bit-Plane Decomposition Steganography Combined with JPEG2000 Compression/Bit-Plane Decomposition Steganography + JPEG2000.pdf | 315.48 KB |
article/!Watermark2/Oh Seok Hong Youn - New Echo Embedding Technique for Robust and Imperceptible Audio Watermarking/PAP672.PDF | 192.30 KB |
article/!Watermark2/Ohbuchi Mukaiyama Takahashi - A Frequency-Domain Approach to Watermarking 3D Shapes/26.PDF | 603.39 KB |
article/!Watermark2/Osberger Bergmann Maeder - An automatic image quality assessment technique incorporatinghigher level perceptual factors/an-automatic-image-quality.pdf | 675.29 KB |
article/!Watermark2/Osberger Maeder Bergmann - A Technique For Image Quality Assessment Based On A Human Visual System Model/osberger98technique.pdf | 445.48 KB |
article/!Watermark2/Osberger Maeder McLean - A Computational Model of the Human Visual System for Image Quality Assessment/osberger97computational.pdf | 216.88 KB |
article/!Watermark2/Ozer Ramkumar Akansu - A New Method for Detection of Watermarks in Geometrically Distorted Images/PAPER2.PDF | 381.04 KB |
article/!Watermark2/Pan Wu - A Novel Data Hiding Method for Two-Color Images/@10 A Novel Data Hiding Method for Two-Color.pdf | 224.34 KB |
article/!Watermark2/Park Kim Kang Han - Digital Geographical Map Watermarking Using Polyline Interpolation/geagraphical map watermarking.pdf | 171.57 KB |
article/!Watermark2/Pereira - Robust Digital Image Watermarking/Pereira_thesis2000.pdf | 893.14 KB |
article/!Watermark2/Pereira Pun - A Framework for Optimal Adaptive DCT Watermarks/PereiraPun_eusipco2000.pdf | 114.00 KB |
article/!Watermark2/Pereira Voloshynoskiy Pun - Optimal Transform Domain Watermark Embedding Via Linear Programming/PereiraVoloshynovskiyPun_sigProc2001.pdf | 263.04 KB |
article/!Watermark2/Pereira Voloshynovskiy Madueno Marchand-Maillet Pun - Second generation benchmarking and application oriented evaluation/PereiraVoloshynovskiyMaduenoMarchandPun_ihw2001.pdf | 190.46 KB |
article/!Watermark2/Perez-Gonzalez Balado - Multidimensional Distortion-Compensated Dither Modulation/25780087.pdf | 280.10 KB |
article/!Watermark2/Perrig Canetti Song Tygar - Efficient and Secure Source Authentication for Multicast/NDSS.PDF | 139.54 KB |
article/!Watermark2/Perrig Canetti Tygar Song - Efficient Authentication and Signing of Multicast Streams over Lossy Channels/STREAM.PDF | 254.17 KB |
article/!Watermark2/Perrig Song Tygar - ELK a New Protocol for Efficient Large-Group Key Distribution/ELK.PDF | 172.53 KB |
article/!Watermark2/Petitcolas Anderson - Evaluation of copyright marking systems/ieeemm99-evaluation.pdf | 145.86 KB |
article/!Watermark2/Petrovic Winograd Jemili Metois - Data hiding within audio signals/ILJA6.PDF | 297.98 KB |
article/!Watermark2/Picard - Probabilistic Argumentation Systems Applied to Information Retrieval/phd_thesis.pdf | 1.36 MB |
article/!Watermark2/Picard Robert - Neural Networks Functions for Public Key Watermarking/wat_IH01.pdf | 299.88 KB |
article/!Watermark2/Picard Robert - On the public key watermarking issue/wat_spie_PK.pdf | 191.09 KB |
article/!Watermark2/Pitas - A Method For Signature Casting On Digital Images/Pitas96a.ps.pdf | 141.51 KB |
article/!Watermark2/Pitas Kaskalis - Applying Signatures on Digital Images/Kaskalis95.ps.pdf | 144.28 KB |
article/!Watermark2/Podilchuk Delp - Digital Watermarking Algorithms and Applications/DWM - Algorithms & Applications.pdf | 1.15 MB |
article/!Watermark2/Provos - Defending Against Statistical Steganalysis/provos01defending.pdf | 310.21 KB |
article/!Watermark2/Radhakrishnan Memon - Audio Content Authentication Based on Psycho-Acoustic Model/44.PDF | 117.87 KB |
article/!Watermark2/Radhakrishnan Memon - On the security of the sari image authentication system/SARI_CSVT.pdf | 124.72 KB |
article/!Watermark2/Rajaratnam Memon - Analysis of lsb based image steganography techniques/46.PDF | 68.14 KB |
article/!Watermark2/Rey Doerr Csurka Dugelay - Toward generic image dewatermarking/REY2002.PDF | 979.44 KB |
article/!Watermark2/Reyzin Russell - More Efficient Provably Secure Steganography/reyzin03more.pdf | 185.71 KB |
article/!Watermark2/Richter Leier Banzhaf Rauhe - Private and Public Key DNA steganography/PubKey.pdf | 216.05 KB |
article/!Watermark2/Roche Dugelay Molva - Multi-resolution access control algorithm based on fractal coding/@1499 MULTI{RESOLUTION ACCESS CONTROL ALGORITHM BASED ON.pdf | 425.51 KB |
article/!Watermark2/Sequeira Kundur - Communication and Information Theory in Watermarking A Survey/communication-and-information-theory.pdf | 198.73 KB |
article/!Watermark2/Setyawan - Attacks on Watermarking Systems/Watermark_Attacks.pdf | 215.92 KB |
article/!Watermark2/Setyawan Lagendijk - Extended Differential Energy Watermarking XDEW algorithm for low bit-rate video watermarking/extended-differential-energy-watermarking.pdf | 250.41 KB |
article/!Watermark2/Shaked Baharav - Watermark Rate and the Distortion of Error Diffused Halftones/HPL-98-89R1.pdf | 392.11 KB |
article/!Watermark2/Shaked Levy Baharav Yen - A Visually Significant Two Dimensional Barcode/HPL-2000-164R1.pdf | 115.43 KB |
article/!Watermark2/Shanmugasundaram Memon - Automatic Reassembly of Document Fragments via Data Compression/42.PDF | 201.32 KB |
article/!Watermark2/Sharp - An Implementation of Key-Based Digital Signal Steganography/Key Based Steganography.pdf | 1.13 MB |
article/!Watermark2/Shimanovsky Feng Potkonjak - Hiding Data in DNA/Hiding Data in DNA.pdf | 194.73 KB |
article/!Watermark2/Shimizu - Performance Analysis of Data Hiding/performance analysis.pdf | 153.41 KB |
article/!Watermark2/Silvestre Hurley Furon - Robustness and Efficiency of Non-linear Side-Informed Watermarking/Robustness And Efficiency Of Non-linear WM.pdf | 242.20 KB |
article/!Watermark2/Simoncelli Freeman - The steerable pyramid a flexible architecture for multi-scale derivative computation/simoncelli95b.ps.pdf | 62.79 KB |
article/!Watermark2/Simoncelli Freeman Adelson Heeger - Shiftable Multi-scale Transforms/simoncelli91.ps.pdf | 579.58 KB |
article/!Watermark2/Sion - Power A Metric for Evaluating Watermarking Algorithms/sion2002wmpower.pdf | 102.82 KB |
article/!Watermark2/Sion - Watermarking Multi-Content Aggregates/talk-UNLV-2002.pdf | 767.62 KB |
article/!Watermark2/Sion - Watermarking non-media content/talk-Seminar-CERIAS-2001.pdf | 574.08 KB |
article/!Watermark2/Sion Atallah - Attacking Digital Watermarks/sion2003wmbounds.pdf | 290.83 KB |
article/!Watermark2/Sion Atallah Prabhakar - Key Commitment in Multimedia Watermarking/TR-CERIAS-2002-30.pdf | 137.09 KB |
article/!Watermark2/Sion Atallah Prabhakar - On Watermarking Numeric Sets/TR-CERIAS-2001-60.pdf | 235.50 KB |
article/!Watermark2/Sion Atallah Prabhakar - On Watermarking Semi-Structures/on-watermarking-semi-structures.pdf | 447.31 KB |
article/!Watermark2/Sion Atallah Prabhakar - Rights Protection for Relational Data/sion2003wmdb-tkde.pdf | 279.59 KB |
article/!Watermark2/Sion Atallah Prabhakar - Rights Protection for Relational Data/sion2002wmdb-sigmod.pdf | 229.71 KB |
article/!Watermark2/Sion Atallah Prabhakar - Watermarking Relational Databases/TR-CERIAS-2002-28.pdf | 311.39 KB |
article/!Watermark2/Sojka - A New Algorithm for Direct Corner Detection in Digital Images/techrep.zip | 1.49 MB |
article/!Watermark2/Sojka - A New Algorithm for Direct Corner Detection in Digital Images/part1.pdf | 276.34 KB |
article/!Watermark2/Solachidis Nikolaidis Pitas - Fourier descriptors watermarking of vector graphics images/Solachidis00c.ps.pdf | 102.90 KB |
article/!Watermark2/Solachidis Nikolaidis Pitas - Watermarking polygonal lines using fourier descriptors/Solachidis00a.ps.pdf | 191.02 KB |
article/!Watermark2/Solachidis Pitas - Circularly symmetric watermark embedding in 2-D DFT domain/Solachidis99a.pdf | 90.13 KB |
article/!Watermark2/Solachidis Pitas - Self-similar ring shaped watermark embedding in 2-D DFT domain/Solachidis00b.ps.pdf | 163.88 KB |
article/!Watermark2/Solanki Jacobsen Chandrasekaran Madhow Manjunath - High-volume data hiding in images introducing perceptual criteria into quantization based embedding/solanki02highvolume.pdf | 66.67 KB |
article/!Watermark2/Stern Tillich - Automatic Detection of a Watermarked Document Using a Private Key/Automatic Detection of Watermark Using The Private Key.pdf | 218.51 KB |
article/!Watermark2/Stone Tao McGuire - Analysis of image registration noise due to rotationally dependent aliasing/Image aliasing.pdf | 392.16 KB |
article/!Watermark2/Su - Data Embedding and Digital Watermarking/SU.PDF | 573.40 KB |
article/!Watermark2/Su Eggers Girod - Analysis of digital watermarks subjected to optimum linear filtering and additive noise/SIGPROseg2001.pdf | 547.08 KB |
article/!Watermark2/Su Eggers Girod - Capacity of digital watermarks subjected to an optimal collusion attack/DIWA_EUS2000SU.pdf | 131.95 KB |
article/!Watermark2/Su Eggers Girod - Illustration of the Duality Between Channel Coding and Rate Distortion with Side Information/asilomar_duality.pdf | 257.45 KB |
article/!Watermark2/Su Eggers Girod - Optimum Attack on DigitalWatermarks and its Defense/asilomar_attack.pdf | 99.28 KB |
article/!Watermark2/Su Hartung Girod - A Channel Model for a Watermark Attack/ei99.ps.pdf | 212.08 KB |
article/!Watermark2/Su Wang Kuo - An Integrated Approach to Image Watermarking and JPEG-2000 Compression/watermarking & JPEG2000.pdf | 862.84 KB |
article/!Watermark2/Suel Memon - Algorithms for Delta Compression and Remote File Synchronization/DELTA.PDF | 157.72 KB |
article/!Watermark2/Sugihara - Practical Capacity of DigitalWatermarks/Practical Capasity Of Digital Watermark.pdf | 1.41 MB |
article/!Watermark2/Sun Cui Wang - Research on Technology of Chaos Secrecy Communications in Digital Watermarking/2.PDF | 144.81 KB |
article/!Watermark2/Swanson Zhu Tewfik - Multiresolution Scene-Based Video Watermarking Using Perceptual Models/16sac04-swanson.pdf | 283.48 KB |
article/!Watermark2/Tachibana - Audio Watermarking for Live Performance/Ryuki_EI03Paper.pdf | 249.62 KB |
article/!Watermark2/Tachibana - Improving Audio Watermark Robustness Using Stretched Patterns against Geometric Distortion/improving aoudio watermarks.pdf | 178.28 KB |
article/!Watermark2/Tang - Audio Watermarking An Overview/vdo_2002_12_05_ChihWeiTang_AudioWM.pdf | 415.40 KB |
article/!Watermark2/Tefas Nikolaidis Solachidis Tsekeridou Pitas - Performance analysis ofwatermarking schemes based on skew tent chaotic sequences/Tefas01c.pdf | 131.51 KB |
article/!Watermark2/Tefas Pitas - Image authentication and tamper proofing using mathematical morphology/Tefas00d.ps.pdf | 114.41 KB |
article/!Watermark2/Tefas Pitas - Image authentication using chaoticmixing systems/Tefas00c.ps.pdf | 222.31 KB |
article/!Watermark2/Tefas Pitas - Multi-bit imagewatermarking robust to geometric distortions/Tefas00a.ps.pdf | 95.51 KB |
article/!Watermark2/Thilak Nosratinia - Signal Design for Robust Watermarking on ISI Channels/asilomar02_vimal.pdf | 214.81 KB |
article/!Watermark2/Toch Lowe Saad - Watermarking of audio signals using Independent Component Analysis/wedel03_ica.pdf | 70.40 KB |
article/!Watermark2/Trahanias Karakos Venetsanopoulos - Directional processing of color images theory and experimental results/00503905 Directional processing of color images.pdf | 1.61 MB |
article/!Watermark2/Trappe Wu Liu - Anti-Collusion Fingerprinting for Multimedia/TR_2002-17.pdf | 682.11 KB |
article/!Watermark2/Trivedi Chandramouli - Active Steganalysis of Sequential Steganography/active-steganalysis-of-sequential.pdf | 518.74 KB |
article/!Watermark2/Tsekeridou - Theoretic performance analysis of a watermarking system/Tsekeridou01b.pdf | 881.50 KB |
article/!Watermark2/Tsekeridou Nikolaidis Sidiropoulos Pitas - Copyright protection of still images using self-similar chaotic watermarks/Tsekeridou00d.ps.pdf | 1.04 MB |
article/!Watermark2/Tsekeridou Pitas - Wavelet-based self-similarwatermarking for still images/Tsekeridou00a.ps.pdf | 213.05 KB |
article/!Watermark2/Tsekeridou Solachidis Nikolaidis Tefas Pitas - Bernoulli shift generated chaotic watermarks theoretic investigation/Tsekeridou01a.pdf | 107.29 KB |
article/!Watermark2/Tsekeridou Solachidis Nikolaidis Tefas Pitas - Theoretic investigation of the use of watermark signals derived from bernoulli chaotic sequences/Tsekeridou01c.pdf | 442.30 KB |
article/!Watermark2/Uludag - Visual Data Watermarking Based on Sinusoidal Signal Embedding/uludag01visual.pdf | 1.71 MB |
article/!Watermark2/Uludag Arslan - Audio watermarking using dc level shifting/uludag01audio.pdf | 239.96 KB |
article/!Watermark2/Venkatesan Kesal - Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks/Cryptanalysis of Discrete-Sequence Spread.pdf | 299.62 KB |
article/!Watermark2/Venkatesan Koon Jakubowski Moulin - Robust image hashing/ICIP00Hash.pdf | 51.19 KB |
article/!Watermark2/Voloshynovskiy Deguillaume Pun - Content Adaptive Watermarking Based On A Stochastic Multiresolution Image Modeling/VoloshynovskiyDeguillaumePun_es2000.pdf | 268.17 KB |
article/!Watermark2/Voloshynovskiy Herrigel Baumgaertner Pun - A Stochastic Approach to Content Adaptive Digital Image Watermarking/VoloshynovskiyHerrigelBaumgaertnerPun_wih99.pdf | 891.72 KB |
article/!Watermark2/Voloshynovskiy Herrigel Pun - Blur-Deblur Attack against Document Protection Systems Based on Digital Watermarking/Blur Deblur Attack on watermarking.pdf | 254.74 KB |
article/!Watermark2/Voloshynovskiy Pereira Pun Eggers Su - Attacks on Digital Watermarks Classification, Estimation-based Attacks and Benchmarks/IEEEcom2.pdf | 278.32 KB |
article/!Watermark2/Voyatzis Nikolaidis Pitas - Copyright protection of multimedia documents from theory to application/Voyatzis98c.ps.pdf | 275.84 KB |
article/!Watermark2/Voyatzis Nikolaidis Pitas - Digital watermarking an overview/Voyatzis98a.ps.pdf | 187.01 KB |
article/!Watermark2/Voyatzis Pitas - Application of toral automorphisms in image watermarking/Voyatzis96b.pdf | 294.02 KB |
article/!Watermark2/Voyatzis Pitas - Chaotic mixing of digital images and applications to watermarking/Voyatzis96a.ps.pdf | 286.37 KB |
article/!Watermark2/Voyatzis Pitas - Chaotic Watermarks for Embedding in the Spatial Digital Image Domain/Voyatzis98b.ps.pdf | 220.43 KB |
article/!Watermark2/Voyatzis Pitas - Digital Image Watermarking using Mixing Systems/voyatzis98digital.pdf | 550.99 KB |
article/!Watermark2/Voyatzis Pitas - Embedding Robust Watermarks by Chaotic Mixing/Voyatzis97a.ps.pdf | 158.53 KB |
article/!Watermark2/Wang Shamma - Zero-crossings and noise supression in auditory wavelet transformations/TR_92-94.PDF | 1.40 MB |
article/!Watermark2/Wang Su Kuo - Wavelet-based digital image watermarking/wavelet based WM.pdf | 229.78 KB |
article/!Watermark2/Wang Wiederhold - WaveMark Digital Image Watermarking Using Daubechies Wavelets and Error Correcting Coding/wang98wavemark.pdf | 935.68 KB |
article/!Watermark2/Wang Yang - Watermark Embedding Mechanism Using Modulus-based for Intellectual Property Protection on Image Data/Watermark embedding mechanism.pdf | 267.66 KB |
article/!Watermark2/Watson - The Cortex Transform Rapid Computation of Simulated Neural Images/CortexTransform.pdf | 1.49 MB |
article/!Watermark2/Westfeld - Detecting Low Embedding Rates/Detecting Low Embedding Rates.pdf | 414.48 KB |
article/!Watermark2/Westfeld - F5 A Steganographic Algorithm High Capacity Despite Better Steganalysis/F5 - Steganographic Algorithm.pdf | 232.00 KB |
article/!Watermark2/Wu Kuo - Fragile speech watermarking based on exponential scale quantization for tamper detection/fragile-speech-watermarking-based.pdf | 95.46 KB |
article/!Watermark2/Wu Kuo - Fragile speech watermarking for content integrity verification/fragile-speech-watermarking-for.pdf | 146.66 KB |
article/!Watermark2/Wu Kuo - Speech content authentication integrated with celp speech coders/wu01speech.pdf | 75.56 KB |
article/!Watermark2/Wu Su Kuo - Robust and efficient digital audio watermarking using audio content analysis/robust-and-efficient-digital.pdf | 319.54 KB |
article/!Watermark2/Yang Liao Hsieh - Watermarking MPEG-4 2D Mesh Animation in Multiresolution Analysis/8.PDF | 111.05 KB |
article/!Watermark2/Yongliang Gao Yao Song - Secure Watermark Verification Scheme/secure watermark verification.pdf | 65.03 KB |
article/!Watermark2/Zane - Efficient Watermark Detection and Collusion Security/Efficient Detection.pdf | 650.68 KB |
article/!Watermark2/Zhang Ping - A Fast and Effective Steganalytic Technique against JSteg-like Algorithms/zhang03fast.pdf | 1.32 MB |
article/!Watermark2/Zhang Xiong Wang - Hiding a Logo Watermark in an Image for Its Copyright Protection/1 Hiding a Logo Watermark in an Image for Its.pdf | 12.45 KB |
article/!Watermark2/Zhuang Baras - Existence and Construction of Optimal Wavelet Basis for Signal Representation/TR_94-28.PDF | 1.86 MB |
article/!Watermark2/Zhuang Baras - Optimal Wavelet Basis Selection for Signal Representation/TR_94-3.PDF | 231.78 KB |
article/!Wavelet/Calderbank Daubechies Sweldens Yeo - Wavelet transforms that map integers to integers/Integer to integer DWT.PDF | 273.62 KB |
article/!Wavelet/Chao - Reversible wavelet transform for image compression/wavelet transform for image compression.ps | 875.30 KB |
article/!Wavelet/Forsberg Johansson - Wavelets and Wavelet Packets/forsberg99wavelets.pdf | 2.21 MB |
article/!Wavelet/Polikar - The wavelet tutorial/Polikar - The wavelet tutorial.7z | 43.59 KB |
article/!Wavelet/Sweldens - The lifting scheme a construction of second generation wavelets/Lifting Scheme - second generation wavelet.PDF | 327.33 KB |
article/!Wavelet/Sweldens - The Lifting Scheme A New Philosophy in Biorthogonal Wavelet Constructions/Biorthogonal wavelet construction.pdf | 173.38 KB |
article/!Wavelet/Sweldens - Wavelets and the Lifting Scheme A 5 Minute Tour/Quick wavelet tour.pdf | 158.70 KB |
article/!Wavelet/Zhu Yang Tewfik Kieffer - Efficient coding of wavelet trees and its applications in image coding/wavelet trees in image coding.ps | 235.75 KB |
article/!Wavelet/Левкович-Маслюк Переберин - Курс по Вейвлет анализу/wavelet.7z | 914.56 KB |
article/!Wavelet/Хорун - Введение в теорию вэйвлетов/Wavelet.7z | 281.25 KB |
article/!Wavelet Analysis and Its Applications Second International Conference Proceedings/wavelet_analysis_.pdf | 11.21 MB |
article/AACS Introduction and Common Cryptographic Elements/AACS_Spec_Common_0.91.pdf | 536.78 KB |
article/Chen Ge Zhang Kurose Towsley - On Dynamic Subset Difference Revocation Scheme/10.1.1.3.7551.pdf | 256.26 KB |
article/DELL - blu-ray disc next-generation optical storage protecting content on the bd-rom/brcp.pdf | 255.33 KB |
article/Dodis Fazio - Public Key Broadcast Encryption for Stateless Receivers/10.1.1.67.2744.pdf | 222.49 KB |
article/Duan Canny - How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack/10.1.1.71.8680.pdf | 528.09 KB |
article/Fazio - On Cryptographic Techniques for Digital Rights Management/10.1.1.74.4329.pdf | 1.22 MB |
article/Frolova Simakov - Matching with Invariant Features/ppt-InvariantFeatures.pdf | 3.29 MB |
article/MPEG/mpeg.ZIP | 770.32 KB |
article/Naor Naor Lotspiech - Revocation and Tracing Schemes for Stateless Receivers/2nl.pdf | 2.15 MB |
article/Wallace - The JPEG Still Picture Compression Standard/Wallace.JPEG.pdf | 77.20 KB |
article/Арифметическое кодирование/arithm.rar | 16.74 KB |
article/Заметки Крикса об алгоритме декодирования JPEG/jpeg-rus.zip | 25.78 KB |
book/Cichocki Amar - Introduction to Blind Signal Processing Problems and Applications/WILEY - Introduction to Blind Signal Processing Problems & Applications.pdf | 4.50 MB |
book/Cichocki Amari - Adaptive Blind Signal And Image Processing/Cichocki, Amari - Adaptive Blind Signal And Image Processing - Wiley.pdf | 24.01 MB |
book/Cole - Hiding in Plain Sight Steganography and the Art of Covert Communication/Hiding.In.Plain.Sight.Steganography.And.The.Art.Of.Covert.Communication.eBook-LiB.pdf | 7.67 MB |
book/Cox Miller Bloom Fridrich Kalker - Digital Watermarking and Steganography/Digital Watermarking and Steganography.pdf | 10.01 MB |
book/Erhardt Ferron - Theory and Applications of Digital Image Processing/Theory and Applications of Digital Image Processing.pdf | 708.84 KB |
book/Farid - Fundamentals of Image Processing/[ebook] (Computer Graphics) Fundamentals of Image Processing.pdf | 1.29 MB |
book/Hayes - Digital Signal Processing/McGraw-Hill - Digital Signal Processing (Schaum's Outlines, OCR) - 1999 - (By Laxxuss).pdf | 6.71 MB |
book/Image Processing Toolbox For Use with MATLAB User’s Guide/MATLAB Image Processing Toolbox.pdf | 10.59 MB |
book/Ingle Proakis - Digital Signal Processing Using Matlab V4/Digital Signal Processing Using Matlab V4 (Ingle & Proakis 1997).pdf | 12.21 MB |
book/Jahne - Digital Image Processing/Springer-- Digital Image Processing- Bernd Jahne.pdf | 19.80 MB |
book/Menezes - Handbook of applied cryptography/Alfred J. Menezes - Handbook of applied cryptography (eng).pdf | 4.63 MB |
book/Menezes - Handbook of applied cryptography/A.Menezes,_ Handbook of applied cryptography.djvu | 3.81 MB |
book/Mertins - Signal Analysis Wavelets, Filter Banks, Time-Frequency Transforms and Applications/Signal Analysis - Wavelets, Filter Banks, Time-Frequency Transforms and Applications.pdf | 12.01 MB |
book/Pratt - Digital image processing/Addison Wesley - Digital Image Processing (2nd Edition).pdf | 17.47 MB |
book/Rabiner Schafer - Digital Processing Of Speech Signals/Prentice Hall - Digital Processing Of Speech Signals.pdf | 35.66 MB |
book/Ritter Wilson - Handbook of Computer Vision Algorithms in Image Algebra/(Ebook) Algorithms - Handbook Of Computer Vision Algorithms In Image Algebra.pdf | 19.85 MB |
book/Rowe - Multivariable Bayesian statistics Models for source separation and signal unmixing/Rowe D.B. Multivariable Bayesian statistics.. models for source separation and signal unmixing (C.djv | 1.48 MB |
book/Russ - Image processing handbook/CRC Press - Image Processing Handbook, 3rd Edition.pdf | 97.00 MB |
book/Sangwine Horn - Colour Image Processing Handboook/Colour Image Processing Handboook, Sangwine and Horn(Edts.).pdf | 23.62 MB |
book/Stark - Wavelets and Digital Image Processing/Wavelets & Digital Image Processing.pdf | 356.49 KB |
book/Айфичер Джервис - Цифровая обработка сигналов/Айфичер Э. Джервис Б. Цифровая обработка сигналов. Практический подход. 2-е издание.djvu | 9.30 MB |
book/Анисимов Курганов Злобин - Распознавание и цифровая обработка изображений/Raspozn_i_obrab.djvu | 5.09 MB |
book/Астафьева - Вейвлет-анализ основы теории и примеры применения/Astafeva1996ru.djvu | 653.95 KB |
book/Баричев Серов - Основы современной криптографии/Barichev.Osnovi Sovremennoj Kryptografii.djvu | 813.57 KB |
book/Бердышев Петрак - Аппроксимация функций Сжатие численной информации/Berdyshev Petrak - Approksimaciya funkcij (1999).djvu | 2.89 MB |
book/Брассар - Современная криптология/Brassar Zh. (_Brassard_) Sovremennaja kriptologija (1999)(ru)(T)(178s).djvu | 1.96 MB |
book/Брейсуэлл - Преобразование Хартли/hartley.djvu | 1.87 MB |
book/Брюс Шнайер - Прикладная криптография/2.PDF | 610.43 KB |
book/Брюс Шнайер - Прикладная криптография/4.PDF | 537.69 KB |
book/Брюс Шнайер - Прикладная криптография/7.PDF | 508.43 KB |
book/Брюс Шнайер - Прикладная криптография/6.PDF | 385.85 KB |
book/Брюс Шнайер - Прикладная криптография/5.PDF | 382.97 KB |
book/Брюс Шнайер - Прикладная криптография/3.PDF | 347.97 KB |
book/Брюс Шнайер - Прикладная криптография/9.PDF | 341.15 KB |
book/Брюс Шнайер - Прикладная криптография/8.PDF | 77.20 KB |
book/Брюс Шнайер - Прикладная криптография/1.PDF | 60.44 KB |
book/Гонсалес Вудс - Цифровая обработка изображения/Gonzalez.Woods.Digital.Image.Processing.djvu | 17.84 MB |
book/Гонсалес Вудс Эддинс - Цифровая обработка изображений в среде MATLAB/dipum.djvu | 11.69 MB |
book/Грузман Киричук Косых Перетягин Спектор - Цифровая обработка изображений в информационных системах/Цифровая обработка изображений в информационных системах.pdf | 42.64 MB |
book/Добеши - Десять лекций о вейвлетах/dleex.djvu | 2.58 MB |
book/Зубов - Совершенные шифры/Зубов А.Ю. - Совершенные шифры (2003)(T)(O).djvu | 1.01 MB |
book/Миано - Форматы и алгоритмы сжатия изображений в действии/Miano-AlgZhat.djvu | 3.36 MB |
book/Новиков - Основы вейвлет анализа сигналов/glava1.pdf | 971.13 KB |
book/Новиков - Основы вейвлет анализа сигналов/glava3.pdf | 775.09 KB |
book/Новиков - Основы вейвлет анализа сигналов/glava21.pdf | 725.13 KB |
book/Новиков - Основы вейвлет анализа сигналов/glava22.pdf | 618.61 KB |
book/Новиков - Основы вейвлет анализа сигналов/titul.pdf | 324.43 KB |
book/Новиков - Основы вейвлет анализа сигналов/contens.pdf | 22.41 KB |
book/Прэтт - Цифровая обработка изображений/Прэтт Уильям_Цифровая обработка изображений.djvu | 11.81 MB |
book/Рябко Фионов - Основы современной криптографии/The_base_of_modern_cryptography.djvu | 7.65 MB |
book/Скворцов - Триангуляция Делоне и её применение/09.pdf | 2.54 MB |
book/Уэлстид - Фракталы и вейвлеты для сжатия изображений в действии/FractalWavelet.djvu | 6.61 MB |
book/Уэлстид - Фракталы и вейвлеты для сжатия изображений в действии/fractalCD.rar | 581.37 KB |
book/Цифровая стеганография/stego.zip | 1.64 MB |
book/Чуи - введение в вейвлеты/Chui K. (_C.K.Chui_) Vvedenie v vejvlety (Mir, 2001)(ru)(K)(T)(412s)_MNw_.djvu | 2.92 MB |
book/Яне - Цифровая обработка изображений/DIPyane.djvu | 12.07 MB |
book/Ярославский - Введение в цифровую обработку изображений/Jaroslavski-CifrObrab.djvu | 4.35 MB |
No trackers found |
TorrentBank
Copyright © 2024