메뉴 건너뛰기




Volumn 4475, Issue , 2001, Pages 172-182

Security analysis of public-key watermarking schemes

Author keywords

Asymmetric watermarking; Copyright protection; Public key watermarking; Watermarking protocols

Indexed keywords

COPYRIGHTS; NETWORK PROTOCOLS; PROBABILISTIC LOGICS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 0035763272     PISSN: 0277786X     EISSN: None     Source Type: Journal    
DOI: 10.1117/12.449579     Document Type: Article
Times cited : (21)

References (17)
  • 1
    • 84947903916 scopus 로고    scopus 로고
    • Proving ownership of digital content
    • Proceedings of the Third International Workshop on Information Hiding
    • A. Adelsbach, B. Pfitzmarm, A. Sadeghi, "Proving Ownership of Digital Content", in Proceedings of the Third International Workshop on Information Hiding, Springer Lecture Notes in Computer Science, vol. 1768, 2000, pp. 117-133.
    • (2000) Springer Lecture Notes in Computer Science , vol.1768 , pp. 117-133
    • Adelsbach, A.1    Pfitzmanm, B.2    Sadeghi, A.3
  • 3
    • 35248829262 scopus 로고    scopus 로고
    • Zero knowledge watermark detection
    • Proceedings of the Third International Workshop on Information Hiding
    • S. Craver, "Zero Knowledge Watermark Detection", in Proceedings of the Third International Workshop on Information Hiding, Springer Lecture Notes in Computer Science, vol. 1768, 2000, pp. 101-116.
    • (2000) Springer Lecture Notes in Computer Science , vol.1768 , pp. 101-116
    • Craver, S.1
  • 4
    • 84904255553 scopus 로고    scopus 로고
    • Copyright protection protocols based on asymmetric watermarking: The ticket concept
    • S. Craver, S. Katzenbeisser, "Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept", to appear in Communications and Multimedia Security 2001.
    • (2001) Communications and Multimedia Security
    • Craver, S.1    Katzenbeisser, S.2
  • 5
    • 84944403312 scopus 로고    scopus 로고
    • An asymmetric public detection watermarking technique
    • Proceedings of the Third International Workshop on Information Hiding
    • P. Duhamel, T. Furon, "An Asymmetric Public Detection Watermarking Technique", in Proceedings of the Third International Workshop on Information Hiding, Springer Lecture Notes in Computer Science, vol. 1768, 2000, pp. 89-100.
    • (2000) Springer Lecture Notes in Computer Science , vol.1768 , pp. 89-100
    • Duhamel, P.1    Furon, T.2
  • 9
    • 0032072064 scopus 로고    scopus 로고
    • Watermarking of uncompressed and compressed video
    • May
    • F. Hartung, B. Girod, "Watermarking of Uncompressed and Compressed Video", in Signal Processing, vol. 66, no. 3, May 1998, pp. 283-301.
    • (1998) Signal Processing , vol.66 , Issue.3 , pp. 283-301
    • Hartung, F.1    Girod, B.2
  • 13
    • 84957877979 scopus 로고    scopus 로고
    • Attacks on copyright marking systems
    • Proceedings of the Second International Workshop on Information Hiding
    • F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, "Attacks on Copyright Marking Systems", in Proceedings of the Second International Workshop on Information Hiding, Springer Lecture Notes in Computer Science, vol. 1525, 1998, pp. 218-238.
    • (1998) Springer Lecture Notes in Computer Science , vol.1525 , pp. 218-238
    • Petitcolas, F.A.P.1    Anderson, R.J.2    Kuhn, M.G.3
  • 15
    • 0010872969 scopus 로고    scopus 로고
    • Crypto-Gram Newsletter 11
    • B. Schneier, DVD Encryption Broken, Crypto-Gram Newsletter 11/1999, available online at http://www.counterpane.com/crypto-gram-9911.html.
    • (1999) DVD Encryption Broken
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.