-
1
-
-
18844428863
-
Analysis of security vulnerabilities in the movie production and distribution process
-
October
-
S. Byers, L. Cranor, D. Korman, P. McDaniel, and E. Cronin. Analysis of security vulnerabilities in the movie production and distribution process. In Proceedings of the ACM Workshop on Digital Rights Management, pages 1-12, October 2003.
-
(2003)
Proceedings of the ACM Workshop on Digital Rights Management
, pp. 1-12
-
-
Byers, S.1
Cranor, L.2
Korman, D.3
McDaniel, P.4
Cronin, E.5
-
2
-
-
14844294682
-
-
Certimark. http://www.certimark.org.
-
-
-
-
3
-
-
14844296809
-
-
Checkmark, http://watermarking.unige.ch/checkmark.
-
Checkmark
-
-
-
8
-
-
4744372403
-
Secure background watermarking based on video mosaicing
-
Security, Steganography and Watermarking of Multimedia Contents VI, January
-
G. Doërr and J.-L. Dugelay. Secure background watermarking based on video mosaicing. In Security, Steganography and Watermarking of Multimedia Contents VI, volume 5306 of Proceedings of SPIE, January 2004.
-
(2004)
Proceedings of SPIE
, vol.5306
-
-
Doërr, G.1
Dugelay, J.-L.2
-
10
-
-
14844307684
-
-
DVD Copy Control Association, http://www.dvdcca.org.
-
-
-
-
12
-
-
0027316601
-
A fractal-based image block-coding algorithm
-
April
-
M. Gharavi-Alkhansari and T. Huang. A fractal-based image block-coding algorithm. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, volume V, pages 345-348, April 1993.
-
(1993)
Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing
, vol.5
, pp. 345-348
-
-
Gharavi-Alkhansari, M.1
Huang, T.2
-
13
-
-
0033601672
-
Spread spectrum watermarking: Malicious attacks and counterattacks
-
Security and Watermarking of Multimedia Contents, January
-
F. Hartung, J. Su, and B. Girod. Spread spectrum watermarking: Malicious attacks and counterattacks. In Security and Watermarking of Multimedia Contents, volume 3657 of Proceedings of SPIE, pages 147-158, January 1999.
-
(1999)
Proceedings of SPIE
, vol.3657
, pp. 147-158
-
-
Hartung, F.1
Su, J.2
Girod, B.3
-
14
-
-
0034775170
-
The watermark template attack
-
Security and Watermarking of Multimedia Contents III, January
-
A. Herrigel, S. Voloshynovskiy, and Y. Rytsar. The watermark template attack. In Security and Watermarking of Multimedia Contents III, volume 4314 of Proceedings of SPIE, pages 394-405, January 2001.
-
(2001)
Proceedings of SPIE
, vol.4314
, pp. 394-405
-
-
Herrigel, A.1
Voloshynovskiy, S.2
Rytsar, Y.3
-
15
-
-
0033703673
-
Robust frame-dependent video watermarking
-
Security and Watermarking of Multimedia Contents II, January
-
M. Holliman, W. Macy, and M. Yeung. Robust frame-dependent video watermarking. In Security and Watermarking of Multimedia Contents II, volume 3971 of Proceedings of SPIE, pages 186-197, January 2000.
-
(2000)
Proceedings of SPIE
, vol.3971
, pp. 186-197
-
-
Holliman, M.1
Macy, W.2
Yeung, M.3
-
16
-
-
0025629441
-
A novel fractal block-coding technique for digital images
-
April
-
A. Jacquin. A novel fractal block-coding technique for digital images. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, volume IV, pages 2225-2228, April 1990.
-
(1990)
Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing
, vol.4
, pp. 2225-2228
-
-
Jacquin, A.1
-
18
-
-
14844330359
-
Digital compression and coding of continuous-tone still images
-
JPEG Standard. ISO/IEC, February
-
JPEG Standard. Digital compression and coding of continuous-tone still images. In JTC1/SC29/WG1 10918-1. ISO/IEC, February 1994.
-
(1994)
JTC1/SC29/WG1 10918-1
-
-
-
19
-
-
84947260435
-
Robust covert communication over a public audio channel using spread spectrum
-
Proceedings of the Fourth International Workshop on Information Hiding, April
-
D. Kirovski and H. Malvar. Robust covert communication over a public audio channel using spread spectrum. In Proceedings of the Fourth International Workshop on Information Hiding, volume 2137 of Lecture Notes on Computer Science, pages 354-368, April 2001.
-
(2001)
Lecture Notes on Computer Science
, vol.2137
, pp. 354-368
-
-
Kirovski, D.1
Malvar, H.2
-
20
-
-
0038104797
-
Blind pattern matching attack on watermarking systems
-
April
-
D. Kirovski and F. Petitcolas. Blind pattern matching attack on watermarking systems. IEEE Transactions on Signal Processing, 51(4):1045-1053, April 2003.
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, Issue.4
, pp. 1045-1053
-
-
Kirovski, D.1
Petitcolas, F.2
-
21
-
-
35248891551
-
Replacement attack on arbitrary watermarking systems
-
Proceedings of the ACM Digital Rights Management Workshop, July
-
D. Kirovski and F. Petitcolas. Replacement attack on arbitrary watermarking systems. In Proceedings of the ACM Digital Rights Management Workshop, volume 2696 of Lecture Notes on Computer Science, pages 177-189, July 2003.
-
(2003)
Lecture Notes on Computer Science
, vol.2696
, pp. 177-189
-
-
Kirovski, D.1
Petitcolas, F.2
-
22
-
-
0032653659
-
Watermarking resisting to translation, rotation and scaling
-
Multimedia Systems and Applications, November
-
M. Kutter. Watermarking resisting to translation, rotation and scaling. In Multimedia Systems and Applications, volume 3528 of Proceedings of SPIE, pages 423-431, November 1998.
-
(1998)
Proceedings of SPIE
, vol.3528
, pp. 423-431
-
-
Kutter, M.1
-
23
-
-
0033601691
-
A fair benchmark for image watermarking systems
-
Security and Watermarking of Multimedia Contents, January
-
M. Kutter and F. Petitcolas. A fair benchmark for image watermarking systems. In Security and Watermarking of Multimedia Contents, volume 3657 of Proceedings of SPIE, pages 226-239, January 1999.
-
(1999)
Proceedings of SPIE
, vol.3657
, pp. 226-239
-
-
Kutter, M.1
Petitcolas, F.2
-
24
-
-
77952728684
-
Removing spatial spread spectrum watermarks by nonlinear filtering
-
September
-
G. Langelaar, R. Lagendijk, and J. Biemond. Removing spatial spread spectrum watermarks by nonlinear filtering. In Proceedings of the European Signal Processing Conference, volume IV, pages 2281-2284, September 1998.
-
(1998)
Proceedings of the European Signal Processing Conference
, vol.4
, pp. 2281-2284
-
-
Langelaar, G.1
Lagendijk, R.2
Biemond, J.3
-
25
-
-
0026396367
-
An inner product space approach to image coding by contractive transformations
-
May
-
G. Øien, S. Lepsay, and T. Ramstad. An inner product space approach to image coding by contractive transformations. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, volume III, pages 2773-2776, May 1991.
-
(1991)
Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing
, vol.3
, pp. 2773-2776
-
-
Øien, G.1
Lepsay, S.2
Ramstad, T.3
-
26
-
-
14844283254
-
-
OpenWatermark. http://www.openwatermark.org.
-
-
-
-
27
-
-
14844295926
-
-
Optimark. http://poseidon.csd.auth.gr/optimark.
-
Optimark
-
-
-
28
-
-
0032074148
-
Rotation, scale and translation invariant digital image watermarking
-
May
-
J. Ó Ruanaidh and T. Pun. Rotation, scale and translation invariant digital image watermarking. Signal Processing, 68(3):303-317, May 1998.
-
(1998)
Signal Processing
, vol.68
, Issue.3
, pp. 303-317
-
-
Ruanaidh, J.O.1
Pun, T.2
-
29
-
-
84957877979
-
Attacks on copyright marking systems
-
Proceedings of the Second International Workshop on Information Hiding, April
-
F. Petitcolas, R. Anderson, and M. Kuhn. Attacks on copyright marking systems. In Proceedings of the Second International Workshop on Information Hiding, volume 1525 of Lecture Notes on Computer Science, pages 219-239, April 1998.
-
(1998)
Lecture Notes on Computer Science
, vol.1525
, pp. 219-239
-
-
Petitcolas, F.1
Anderson, R.2
Kuhn, M.3
-
30
-
-
17344389146
-
The blind pattern matching attack on watermarking systems
-
May
-
F. Petitcolas and D. Kirovski. The blind pattern matching attack on watermarking systems. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, volume IV, pages 3740-3743, May 2002.
-
(2002)
Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing
, vol.4
, pp. 3740-3743
-
-
Petitcolas, F.1
Kirovski, D.2
-
32
-
-
0036452598
-
Toward generic image dewatermarking?
-
September
-
C. Rey, G. Doërr, J.-L. Dugelay, and G. Csurka. Toward generic image dewatermarking? In Proceedings of the IEEE International Conference on Image Processing, volume III, pages 633-636, September 2002.
-
(2002)
Proceedings of the IEEE International Conference on Image Processing
, vol.3
, pp. 633-636
-
-
Rey, C.1
Doërr, G.2
Dugelay, J.-L.3
Csurka, G.4
-
33
-
-
35048819204
-
Model-based steganography
-
Proceedings of the Second International Workshop on Digital Watermarking, October
-
P. Sallee. Model-based steganography. In Proceedings of the Second International Workshop on Digital Watermarking, volume 2939 of Lecture Notes in Computer Science, pages 154-167, October 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2939
, pp. 154-167
-
-
Sallee, P.1
-
34
-
-
14844287748
-
-
Secure Digital Music Initiative, http://www.sdmi.org.
-
-
-
-
35
-
-
14844338297
-
-
Stirmark. http://www.petitcolas.net/fabien/watermarking/stirmark.
-
Stirmark
-
-
-
36
-
-
0036999125
-
Power-spectrum condition for energy-efficient watermarking
-
December
-
J. Su and B. Girod. Power-spectrum condition for energy-efficient watermarking. IEEE Transactions on Multimedia, 4(4):551-560, December 2002.
-
(2002)
IEEE Transactions on Multimedia
, vol.4
, Issue.4
, pp. 551-560
-
-
Su, J.1
Girod, B.2
-
37
-
-
0033688391
-
Generalized watermarking attack based on watermark estimation and perceptual remodulation
-
Security and Watermarking of Multimedia Contents II, January
-
S. Voloshynovskiy, S. Pereira, A. Herrigel, N. Baumgärtner, and T. Pun. Generalized watermarking attack based on watermark estimation and perceptual remodulation. In Security and Watermarking of Multimedia Contents II, volume 3971 of Proceedings of SPIE, pages 358-370, January 2000.
-
(2000)
Proceedings of SPIE
, vol.3971
, pp. 358-370
-
-
Voloshynovskiy, S.1
Pereira, S.2
Herrigel, A.3
Baumgärtner, N.4
Pun, T.5
-
38
-
-
0035369792
-
Attack modeling: Towards a second generation watermarking benchmark
-
June
-
S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun. Attack modeling: Towards a second generation watermarking benchmark. Signal Processing, 81(6):1177-1214, June 2001.
-
(2001)
Signal Processing
, vol.81
, Issue.6
, pp. 1177-1214
-
-
Voloshynovskiy, S.1
Pereira, S.2
Iquise, V.3
Pun, T.4
-
39
-
-
14844314068
-
-
Contact Professor E. Delp, Purdue University, USA
-
Watermark Evaluation Testbed (WET). Contact Professor E. Delp, Purdue University, USA.
-
Watermark Evaluation Testbed (WET)
-
-
-
40
-
-
0033348144
-
Attacks on digital watermarks
-
October
-
M. Wu and B. Liu. Attacks on digital watermarks. In Proceedings of 33th Asilomar Conference on Signals, Systems, and Computers, volume II, pages 1508-1512, October 1999.
-
(1999)
Proceedings of 33th Asilomar Conference on Signals, Systems, and Computers
, vol.2
, pp. 1508-1512
-
-
Wu, M.1
Liu, B.2
|