-
1
-
-
84947903916
-
Proving ownership of digital content
-
Springer Lecture Notes in Computer Science
-
A. Adelsbach, B. Pfitzmann, A. Sadeghi, "Proving Ownership of Digital Content", in Proceedings of the Third International Workshop on Information Hiding, Springer Lecture Notes in Computer Science, vol. 1768, 2000, pp. 117-133.
-
(2000)
Proceedings of the Third International Workshop on Information Hiding
, vol.1768
, pp. 117-133
-
-
Adelsbach, A.1
Pfitzmann, B.2
Sadeghi, A.3
-
2
-
-
0242581588
-
Advanced techniques for dispute resolving and authorship proofs on digital works
-
A. Adelsbach, A. Sadeghi, "Advanced Techniques for Dispute Resolving and Authorship Proofs on Digital Works", in Proceedings of the SPIE vol. 5020, Security and Watermarking of Multimedia Contents V, 2003, pp. 677-688.
-
(2003)
Proceedings of the SPIE Vol. 5020, Security and Watermarking of Multimedia Contents V
, vol.5020
, pp. 677-688
-
-
Adelsbach, A.1
Sadeghi, A.2
-
3
-
-
18844425175
-
On the insecurity of non-invertible watermarking schemes for dispute resolving
-
to appear
-
A. Adelsbach, S. Katzenbeisser, A. Sadeghi, "On the Insecurity of Non-Invertible Watermarking Schemes for Dispute Resolving", International Workshop on Digital Watermarking (IWDW'03), Proceedings, to appear.
-
International Workshop on Digital Watermarking (IWDW'03), Proceedings
-
-
Adelsbach, A.1
Katzenbeisser, S.2
Sadeghi, A.3
-
6
-
-
0032074580
-
Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications
-
S. Craver, N. Memon, B. L. Yeo, M. M. Yeung, "Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks and Implications", in IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, 1998, pp. 573-586.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 573-586
-
-
Craver, S.1
Memon, N.2
Yeo, B.L.3
Yeung, M.M.4
-
8
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali, R. Rivest: "A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks", in SIAM Journal on Computing, vol. 17, no. 2, 1988, pp. 281-308.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
11
-
-
0036031141
-
Securing symmetric watermarking schemes against protocol attacks
-
S. Katzenbeisser, H. Veith, "Securing Symmetric Watermarking Schemes Against Protocol Attacks", in Proceedings of the SPIE vol. 4675, Security and Watermarking of Multimedia Contents IV, 2002, pp. 260-268.
-
(2002)
Proceedings of the SPIE Vol. 4675, Security and Watermarking of Multimedia Contents IV
, vol.4675
, pp. 260-268
-
-
Katzenbeisser, S.1
Veith, H.2
-
13
-
-
0033701078
-
The watermark copy attack
-
M. Kutter, S. Voloshynovskiy, A. Herrigel, "The Watermark Copy Attack" in Proceedings of the SPIE vol. 3971, Security and Watermarking of Multimedia Contents II, 2000, pp. 371-380.
-
(2000)
Proceedings of the SPIE Vol. 3971, Security and Watermarking of Multimedia Contents II
, vol.3971
, pp. 371-380
-
-
Kutter, M.1
Voloshynovskiy, S.2
Herrigel, A.3
-
14
-
-
0032155522
-
Watermarking schemes and protocols for protecting rightful ownership and customer's rights
-
L. Qiao, K. Nahrstedt, "Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights", in Journal of Visual Communication and Image Representation, vol. 9, No. 3, 1998, pp. 194-210.
-
(1998)
Journal of Visual Communication and Image Representation
, vol.9
, Issue.3
, pp. 194-210
-
-
Qiao, L.1
Nahrstedt, K.2
-
15
-
-
0033601674
-
Non-invertible watermarking methods for MPEG encoded audio
-
L. Qiao, K. Nahrstedt, "Non-Invertible Watermarking Methods for MPEG Encoded Audio", in Proceedings of the SPIE vol. 3675, Security and Watermarking of Multimedia Contents, 1999, pp. 194-202.
-
(1999)
Proceedings of the SPIE Vol. 3675, Security and Watermarking of Multimedia Contents
, vol.3675
, pp. 194-202
-
-
Qiao, L.1
Nahrstedt, K.2
|