-
1
-
-
1442357607
-
"Watermark detection with zero-knowledge disclosure"
-
A. Adelsbach, S. Katzenbeisser, and A. R. Sadeghi, "Watermark detection with zero-knowledge disclosure," in ACM Multimedia Syst., 2003, vol. 9.
-
(2003)
ACM Multimedia Syst.
, vol.9
-
-
Adelsbach, A.1
Katzenbeisser, S.2
Sadeghi, A.R.3
-
2
-
-
0041320695
-
"A general framework for robust watermarking security"
-
M. Barni, F. Bartolini, and T. Furon, "A general framework for robust watermarking security," Signal Processing, vol. 83, pp. 2069-2084, 2003.
-
(2003)
Signal Processing
, vol.83
, pp. 2069-2084
-
-
Barni, M.1
Bartolini, F.2
Furon, T.3
-
3
-
-
0032656890
-
"Copy protection for DVD video"
-
Jul
-
J.A. Bloom, I. J. Cox, T. Kalker, J. P. Linnartz, M. L. Miller, and C. B. S. Traw, "Copy protection for DVD video," Proc. IEEE, vol. 87, no. 7, pp. 1267-1276, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1267-1276
-
-
Bloom, J.A.1
Cox, I.J.2
Kalker, T.3
Linnartz, J.P.4
Miller, M.L.5
Traw, C.B.S.6
-
4
-
-
35248829262
-
"Zero knowledge watermark detection"
-
Spring,Lecture Notes in Computer Science
-
S. Craver, "Zero knowledge watermark detection," in Proc. 3rd Int. Workshop on Information Hiding, vol. 1768, Spring 2000, pp. 101-116. Lecture Notes in Computer Science.
-
(2000)
Proc. 3rd Int. Workshop on Information Hiding
, vol.1768
, pp. 101-116
-
-
Craver, S.1
-
5
-
-
0032074580
-
"Resolving rightful ownership with invisible watermarking teachniques: Limitations, attacks, and implications"
-
Dec
-
S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung, "Resolving rightful ownership with invisible watermarking teachniques: Limitations, attacks, and implications," IEEE J. Select. Areas Commun., vol. 16, no. 9, pp. 573-587, Dec. 1998.
-
(1998)
IEEE J. Select. Areas Commun.
, vol.16
, Issue.9
, pp. 573-587
-
-
Craver, S.1
Memon, N.2
Yeo, B.L.3
Yeung, M.M.4
-
6
-
-
0031362116
-
"Secure spread spectrum watermarking for multimedia"
-
Dec
-
I. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Processing, vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
8
-
-
0032075477
-
"Some general methods for tampering with watermarks"
-
May
-
I. Cox and J. P. Linnartz, "Some general methods for tampering with watermarks," IEEE J. Select. Areas Commu., vol. 16, no. 4, pp. 587-593, May 1998.
-
(1998)
IEEE J. Select. Areas Commu.
, vol.16
, Issue.4
, pp. 587-593
-
-
Cox, I.1
Linnartz, J.P.2
-
9
-
-
0032625842
-
"Watermarking as communication with side information"
-
Jul
-
I. Cox, M. Miller, and A. Mckellips, "Watermarking as communication with side information," Proc. IEEE, vol. 87, pp. 1127-1141, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, pp. 1127-1141
-
-
Cox, I.1
Miller, M.2
McKellips, A.3
-
10
-
-
84937053333
-
"Public key watermarking by eigenvectors of linear transforms"
-
Tampere, Finland, Sep
-
J. Eggers, J. Su, and B. Girod, "Public key watermarking by eigenvectors of linear transforms," in Proc. Eur. Signal Process. Conf., Tampere, Finland, Sep. 2000.
-
(2000)
Proc. Eur. Signal Process. Conf.
-
-
Eggers, J.1
Su, J.2
Girod, B.3
-
11
-
-
0038134257
-
"An unified approach of asymmetric watermarking schemes"
-
P. W. Wong and E. Delp, Eds., San Jose, CA, Jan
-
T. Furon, I. Venturini, and P. Duhamel, "An unified approach of asymmetric watermarking schemes," in Proc, SPIE: Security and Watermarking of Multimedia Contents III, P. W. Wong and E. Delp, Eds., San Jose, CA, Jan. 2000.
-
(2000)
Proc, SPIE: Security and Watermarking of Multimedia Contents III
-
-
Furon, T.1
Venturini, I.2
Duhamel, P.3
-
12
-
-
0037851028
-
"An asymmetric watermarking method"
-
Apr
-
T. Furon and P. Duhamel, "An asymmetric watermarking method," IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 981-995, Apr. 2003.
-
(2003)
IEEE Trans. Signal Processing
, vol.51
, Issue.4
, pp. 981-995
-
-
Furon, T.1
Duhamel, P.2
-
13
-
-
0031335088
-
"Fast public-key watermarking of compressed video"
-
Santa Barbara, CA, Oct
-
F. Hartung and B. Girod, "Fast public-key watermarking of compressed video," in Proc. IEEE Int. Conf. Image Processing, Santa Barbara, CA, Oct. 1997, pp. 528-531.
-
(1997)
Proc. IEEE Int. Conf. Image Processing
, pp. 528-531
-
-
Hartung, F.1
Girod, B.2
-
14
-
-
33646216327
-
"Watermark estimation through detector observations"
-
Leuven, Belgium, Mar
-
T. Kalker, "Watermark estimation through detector observations," in Proc. IEEE Benelux Signal Processing Symp., Leuven, Belgium, Mar. 1998.
-
(1998)
Proc. IEEE Benelux Signal Processing Symp.
-
-
Kalker, T.1
-
15
-
-
0038488814
-
"A security risk for publicly available watermark detectors"
-
Veldhoven, The Netherlands, May
-
T. Kalker, "A security risk for publicly available watermark detectors," in Proc. Benelux Information Theory Symp., Veldhoven, The Netherlands, May 1998.
-
(1998)
Proc. Benelux Information Theory Symp.
-
-
Kalker, T.1
-
16
-
-
0003185688
-
"La cryptographie militaire"
-
Jan
-
A. Kerckhoffs, "La cryptographie militaire," J. Sci. Militaires, vol. 9, pp. 5-38, Jan. 1883.
-
(1883)
J. Sci. Militaires
, vol.9
, pp. 5-38
-
-
Kerckhoffs, A.1
-
17
-
-
0033701078
-
"Watermark copy attack"
-
P. W. Wong and E. Delp, Eds., San Jose, CA, Jan
-
M. Kutter, S. Voloshynovskiy, and A. Herrigel, "Watermark copy attack," in SPIE Security and Watermarking of Multimedia Contents III, P. W. Wong and E. Delp, Eds., San Jose, CA, Jan. 2000.
-
(2000)
SPIE Security and Watermarking of Multimedia Contents III
-
-
Kutter, M.1
Voloshynovskiy, S.2
Herrigel, A.3
-
19
-
-
0006916993
-
"Computing the probability of false watermark detection"
-
Dresden, Germany, Sep
-
M. L. Miller and J. A. Bloom, "Computing the probability of false watermark detection," in Proc. Workshop on Information Hiding, Dresden, Germany, Sep. 1999.
-
(1999)
Proc. Workshop on Information Hiding
-
-
Miller, M.L.1
Bloom, J.A.2
-
20
-
-
33646221402
-
"A mathematical appraoch to watermarking and data hiding"
-
Thessaloniki, Greece
-
P. Moulin and E. Delp, "A mathematical appraoch to watermarking and data hiding," in IEEE ICIP. Thessaloniki, Greece, 2001.
-
(2001)
IEEE ICIP
-
-
Moulin, P.1
Delp, E.2
-
21
-
-
0038527382
-
"The zero-rate spread-spectrum watermarking game"
-
Apr
-
P. Moulin and A. Ivanovic, "The zero-rate spread-spectrum watermarking game," IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 1098-1117, Apr. 2003.
-
(2003)
IEEE Trans. Signal Processing
, vol.51
, Issue.4
, pp. 1098-1117
-
-
Moulin, P.1
Ivanovic, A.2
-
22
-
-
84957877979
-
"Attacks on copyright marking systems"
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Attacks on copyright marking systems," Lecture Notes on Computer Science 1525: Information Hiding, pp. 218-238, 1998.
-
(1998)
Lecture Notes on Computer Science 1525: Information Hiding
, pp. 218-238
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
26
-
-
0032684844
-
"Key independent watermark detection"
-
Florence, Italy, Jun
-
R. Van Schyndel, A. Tirkel, and I. Svalbe, "Key independent watermark detection," in Proc. Int. Conf. Multimedia Comput. Syst., vol. 1, Florence, Italy, Jun. 1999.
-
(1999)
Proc. Int. Conf. Multimedia Comput. Syst.
, vol.1
-
-
Schyndel, R.1
Tirkel, A.2
Svalbe, I.3
-
27
-
-
0001796928
-
"Developments in steganography"
-
A. Pfitzmann, Ed., Dresden, Germany, Sep
-
J. Smith and C. Dodge, "Developments in steganography," in Proc. 3rd Int. Workshop on Information Hidding, A. Pfitzmann, Ed., Dresden, Germany, Sep. 1999, pp. 77-87.
-
(1999)
Proc. 3rd Int. Workshop on Information Hidding
, pp. 77-87
-
-
Smith, J.1
Dodge, C.2
-
28
-
-
23044530428
-
"Automatic detection of a watermarked document using a private key"
-
I. S. Moskowitz, Ed., Pittsburgh, PA, Apr
-
J. Stern and J. P. Tillich, "Automatic detection of a watermarked document using a private key," in Proc. 4th Int. Workshop on Information Hiding, vol. 2137, I. S. Moskowitz, Ed., Pittsburgh, PA, Apr. 2001.
-
(2001)
Proc. 4th Int. Workshop on Information Hiding
, vol.2137
-
-
Stern, J.1
Tillich, J.P.2
-
29
-
-
0032069486
-
"Robust audio watermarking using perceptual masking"
-
May
-
M. Swanson, B. Zhu, A. Tewfik, and L. Boney, "Robust audio watermarking using perceptual masking," Signal Processing, vol. 66, no. 3, pp. 337-355, May 1998.
-
(1998)
Signal Processing
, vol.66
, Issue.3
, pp. 337-355
-
-
Swanson, M.1
Zhu, B.2
Tewfik, A.3
Boney, L.4
-
30
-
-
0038527384
-
"Anti-Collusion fingerprinting for multimedia"
-
Apr
-
W. Trapper, M. Wu, Z. Wang, and K. J. R. Liu, "Anti-Collusion fingerprinting for multimedia," IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 1069-1087, Apr. 2003.
-
(2003)
IEEE Trans. Signal Processing
, vol.51
, Issue.4
, pp. 1069-1087
-
-
Trapper, W.1
Wu, M.2
Wang, Z.3
Liu, K.J.R.4
-
31
-
-
0036651037
-
"Enhancing image watermarking methods with/without reference images by optimization on second order statistics"
-
Jul
-
J. Tzeng, W. L. Hwang, and I. Liang Chern, "Enhancing image watermarking methods with/without reference images by optimization on second order statistics," IEEE Trans. Image Processing, vol. 11, pp. 771-782, Jul. 2002.
-
(2002)
IEEE Trans. Image Processing
, vol.11
, pp. 771-782
-
-
Tzeng, J.1
Hwang, W.L.2
Liang Chern, I.3
-
32
-
-
84947911018
-
"A stochastic approach to content adaptive digital image watermarking"
-
Dresden, Germany, Sep
-
S. Voloshynovskiy, A. Herrigel, N. Baumgaertner, and T. Pun, "A stochastic approach to content adaptive digital image watermarking," in Proc. 3rd Int. Workshop on Information Hiding, Dresden, Germany, Sep. 1999, pp. 211-236.
-
(1999)
Proc. 3rd Int. Workshop on Information Hiding
, pp. 211-236
-
-
Voloshynovskiy, S.1
Herrigel, A.2
Baumgaertner, N.3
Pun, T.4
-
33
-
-
0032664574
-
"Perceptual watermarks for digital images and video"
-
Jul
-
R. B. Wolfgang, C. I. Podilchuk, and E. J. Delp, "Perceptual watermarks for digital images and video," in Proc. IEEE, vol. 87, Jul. 1999, pp. 1108-1126.
-
(1999)
Proc. IEEE
, vol.87
, pp. 1108-1126
-
-
Wolfgang, R.B.1
Podilchuk, C.I.2
Delp, E.J.3
-
34
-
-
0043201448
-
"Digital watermarking"
-
Jul
-
M. M. Yeung, "Digital watermarking," Commun. ACM, vol. ACM 41, no. 7, pp. 31-33, Jul. 1998.
-
(1998)
Commun. ACM
, vol.ACM41
, Issue.7
, pp. 31-33
-
-
Yeung, M.M.1
|