-
1
-
-
84947903916
-
Proving ownership of digital content
-
Proceedings of the Third International Workshop on Information Hiding
-
A. Adelsbach, B. Pfitzmarm, A. Sadeghi, "Proving Ownership of Digital Content", in Proceedings of the Third International Workshop on Information Hiding, Springer Lecture Notes in Computer Science, vol. 1768, 2000, pp. 117-133.
-
(2000)
Springer Lecture Notes in Computer Science
, vol.1768
, pp. 117-133
-
-
Adelsbach, A.1
Pfitzmanm, B.2
Sadeghi, A.3
-
2
-
-
0032688068
-
Multilinearization data structure for image browsing
-
February
-
S. Craver, B-L. Yeo, and M.M. Yeung, "Multilinearization Data Structure for Image Browsing," in Proceedings of SPIE vol. 3656, Storage and Retrieval of Image and Video Databases, February 1999, pp. 155-166.
-
(1999)
Proceedings of SPIE vol. 3656, Storage and Retrieval of Image and Video Databases
, vol.3656
, pp. 155-166
-
-
Craver, S.1
Yeo, B.-L.2
Yeung, M.M.3
-
3
-
-
35248829262
-
Zero knowledge watermark detection
-
Proceedings of the Third International Workshop on Information Hiding
-
S. Craver, "Zero Knowledge Watermark Detection", in Proceedings of the Third International Workshop on Information Hiding, Springer Lecture Notes in Computer Science, vol. 1768, 2000, pp. 101-116.
-
(2000)
Springer Lecture Notes in Computer Science
, vol.1768
, pp. 101-116
-
-
Craver, S.1
-
4
-
-
84904255553
-
Copyright protection protocols based on asymmetric watermarking: The ticket concept
-
S. Craver, S. Katzenbeisser, "Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept", to appear in Communications and Multimedia Security 2001.
-
(2001)
Communications and Multimedia Security
-
-
Craver, S.1
Katzenbeisser, S.2
-
5
-
-
84944403312
-
An asymmetric public detection watermarking technique
-
Proceedings of the Third International Workshop on Information Hiding
-
P. Duhamel, T. Furon, "An Asymmetric Public Detection Watermarking Technique", in Proceedings of the Third International Workshop on Information Hiding, Springer Lecture Notes in Computer Science, vol. 1768, 2000, pp. 89-100.
-
(2000)
Springer Lecture Notes in Computer Science
, vol.1768
, pp. 89-100
-
-
Duhamel, P.1
Furon, T.2
-
6
-
-
84937053333
-
Public key watermarking by eigenvectors of linear transforms
-
Tampere, Finland, April
-
J.J. Eggers, J.K. Su, B. Girod, "Public Key Watermarking by Eigenvectors of Linear Transforms", in Proceedings of the European Signal Processing Conference, Tampere, Finland, April 2000.
-
(2000)
Proceedings of the European Signal Processing Conference
-
-
Eggers, J.J.1
Su, J.K.2
Girod, B.3
-
7
-
-
38049186824
-
Asymmetric watermarking schemes
-
Proceedings, Springer Verlag
-
J.J. Eggers, J.K. Su, B. Girod, "Asymmetric Watermarking Schemes", in Sicherheit in Mediendaten, GMD Jahrestagung, Proceedings, Springer Verlag, 2000.
-
(2000)
Sicherheit in Mediendaten, GMD Jahrestagung
-
-
Eggers, J.J.1
Su, J.K.2
Girod, B.3
-
8
-
-
0031335088
-
Fast public-key watermarking of compressed video
-
F. Hartung, B. Girod, "Fast Public-Key Watermarking of Compressed Video", in International Conference on Image Processing (ICIP'97), vol. I, 1997, pp. 528-531.
-
(1997)
International Conference on Image Processing (ICIP'97)
, vol.1
, pp. 528-531
-
-
Hartung, F.1
Girod, B.2
-
9
-
-
0032072064
-
Watermarking of uncompressed and compressed video
-
May
-
F. Hartung, B. Girod, "Watermarking of Uncompressed and Compressed Video", in Signal Processing, vol. 66, no. 3, May 1998, pp. 283-301.
-
(1998)
Signal Processing
, vol.66
, Issue.3
, pp. 283-301
-
-
Hartung, F.1
Girod, B.2
-
10
-
-
0033601672
-
Spread spectrum watermarking: Malicious attacks and counterattacks
-
F. Hartung, J.K. Su, and B. Girod, "Spread Spectrum Watermarking: Malicious Attacks and Counterattacks," in Proceedings of the SPIE 3657, Security and Watermarking of Multimedia Contents, 1999, pp. 147-158.
-
(1999)
Proceedings of the SPIE 3657, Security and Watermarking of Multimedia Contents
, vol.3657
, pp. 147-158
-
-
Hartung, F.1
Su, J.K.2
Girod, B.3
-
12
-
-
0034483631
-
Cocktail watermarking for digital image protection
-
C-S. Lu, S-K. Huang, C-J. Sze, and H.-Y.M. Liao, "Cocktail Watermarking for Digital Image Protection," IEEE Transactions on Multimedia, vol. 2, no. 4, 2000, pp. 209-224.
-
(2000)
IEEE Transactions on Multimedia
, vol.2
, Issue.4
, pp. 209-224
-
-
Lu, C.-S.1
Huang, S.-K.2
Sze, C.-J.3
Liao, H.-Y.M.4
-
13
-
-
84957877979
-
Attacks on copyright marking systems
-
Proceedings of the Second International Workshop on Information Hiding
-
F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, "Attacks on Copyright Marking Systems", in Proceedings of the Second International Workshop on Information Hiding, Springer Lecture Notes in Computer Science, vol. 1525, 1998, pp. 218-238.
-
(1998)
Springer Lecture Notes in Computer Science
, vol.1525
, pp. 218-238
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
15
-
-
0010872969
-
-
Crypto-Gram Newsletter 11
-
B. Schneier, DVD Encryption Broken, Crypto-Gram Newsletter 11/1999, available online at http://www.counterpane.com/crypto-gram-9911.html.
-
(1999)
DVD Encryption Broken
-
-
Schneier, B.1
-
17
-
-
0032684844
-
Key independent watermark detection
-
Florence, June
-
R.G. van Schyndel, A.Z. Tirkel, I.D. Svalbe, "Key independent watermark detection", in Proceedings of the IEEE International Conference on Multimedia Computing and Systems, volume 1, Florence, June 1999.
-
(1999)
Proceedings of the IEEE International Conference on Multimedia Computing and Systems
, vol.1
-
-
Van Schyndel, R.G.1
Tirkel, A.Z.2
Svalbe, I.D.3
|