-
2
-
-
0030384775
-
"Techniques for data hiding"
-
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding" IBM Syst. J., vol. 35, no. 3-4, pp. 313-336, 1996.
-
(1996)
IBM Syst. J.
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
4
-
-
84957670625
-
"Collusion-secure fingerprinting for digital data"
-
D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," in Proc. Advances in Cryptology, vol. LNCS 963, 1995, pp. 452-65.
-
(1995)
Proc. Advances in Cryptology
, vol.LNCS963
, pp. 452-465
-
-
Boneh, D.1
Shaw, J.2
-
5
-
-
0032162672
-
"Collusion-secure fingerprinting for digital data"
-
Sep
-
D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," IEEE Trans. Inf. Theory, vol. 44, no. 5, pp. 1897-1905, Sep. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
6
-
-
0034188648
-
"Tracing traitors"
-
May
-
B. Chor, A. Fiat, M. Naor, and B. Pinkas, "Tracing traitors," IEEE Trans. Inf. Theory, vol. 46, no. 3, pp. 893-910, May 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.3
, pp. 893-910
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
Pinkas, B.4
-
7
-
-
4544310181
-
"A secure multicast protocol with copyright protection"
-
Apr
-
H. Chu, L. Qiao, and K. Nahrstedt, "A secure multicast protocol with copyright protection," ACM SIGCOMM Comput. Commun. Rev., vol. 32, no. 2, pp. 42-60, Apr. 2002.
-
(2002)
ACM SIGCOMM Comput. Commun. Rev.
, vol.32
, Issue.2
, pp. 42-60
-
-
Chu, H.1
Qiao, L.2
Nahrstedt, K.3
-
9
-
-
0031362116
-
"Secure spread spectrum watermarking for multimedia"
-
Dec
-
I. Cox, J. Kilian, F. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673-87, Dec. 1997.
-
(1997)
IEEE Trans. Image Process.
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.1
Kilian, J.2
Leighton, F.3
Shamoon, T.4
-
10
-
-
0000676728
-
"Combining digital watermarkds and collusion secure fingerprints fro digital images"
-
J. Dittmann, P. Schmitt, E. Saar, J. Schwenk, and J. Ueberberg, "Combining digital watermarkds and collusion secure fingerprints fro digital images," SPIE J. Electron. Imag., vol. 9, pp. 456-67, 2000.
-
(2000)
SPIE J. Electron. Imag.
, vol.9
, pp. 456-467
-
-
Dittmann, J.1
Schmitt, P.2
Saar, E.3
Schwenk, J.4
Ueberberg, J.5
-
12
-
-
84957610906
-
"A note on the limits of collusion-resistant watermarks"
-
F. Ergun, J. Kilian, and R. Kumar, "A note on the limits of collusion-resistant watermarks," in Proc. Eurocrypt, 1999, pp. 140-49.
-
(1999)
Proc. Eurocrypt
, pp. 140-149
-
-
Ergun, F.1
Kilian, J.2
Kumar, R.3
-
13
-
-
0032634857
-
"Multimedia watermarking techniqures"
-
Jul
-
F. Hartung and M. Kutter, "Multimedia watermarking techniqures," Proc. IEEE, vol. 87, no. 7, pp. 1079-1107, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1079-1107
-
-
Hartung, F.1
Kutter, M.2
-
14
-
-
0003195355
-
"Recovery of watermarks from distorted images"
-
N. Johnson, Z. Duric, and S. Jajodia, "Recovery of watermarks from distorted images," in Proc. 3rd Int. Information Hiding Workshop, 1999, pp. 361-375.
-
(1999)
Proc. 3rd Int. Information Hiding Workshop
, pp. 361-375
-
-
Johnson, N.1
Duric, Z.2
Jajodia, S.3
-
15
-
-
84890411878
-
"Resistance of digital watermarks to collusive attacks"
-
Aug
-
J. Kilian, T. Leighton, L. Matheson, T. Shamoon, R. Tarjan, and F. Zane, "Resistance of digital watermarks to collusive attacks" in Proc. IEEE Int. Symp. Information Theory, Aug. 1998, pp. 271-271.
-
(1998)
Proc. IEEE Int. Symp. Information Theory
, pp. 271
-
-
Kilian, J.1
Leighton, T.2
Matheson, L.3
Shamoon, T.4
Tarjan, R.5
Zane, F.6
-
17
-
-
0035335388
-
"Rotation, scale, and translation resilient public watermarking for images"
-
May
-
C. Lin, M. Wu, J. Bloom, M. Miller, I. Cox, and Y. Lui, "Rotation, scale, and translation resilient public watermarking for images," IEEE Trans. Image Process., vol. 10, no. 5, pp. 767-782, May 2001.
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.5
, pp. 767-782
-
-
Lin, C.1
Wu, M.2
Bloom, J.3
Miller, M.4
Cox, I.5
Lui, Y.6
-
18
-
-
0010889487
-
"A reliability model for detection of electronic watermarks in digital images"
-
Oct
-
J. Linnartz, A. Kalker, G. Depovere, and R. Beuker, "A reliability model for detection of electronic watermarks in digital images," in Proc. Benelux Symp. Communication Theory, Oct. 1997, pp. 202-209.
-
(1997)
Proc. Benelux Symp. Communication Theory
, pp. 202-209
-
-
Linnartz, J.1
Kalker, A.2
Depovere, G.3
Beuker, R.4
-
19
-
-
20444389517
-
"Robust, content-dependent, high-fidelity watermark for tracking in digital cinema"
-
presented at the Security and Watermarking of Multimedia Contents V, P. W. Wong and E. J. Delp, Eds
-
J. Lubin, J. Bloom, and H. Cheng, "Robust, content-dependent, high-fidelity watermark for tracking in digital cinema," presented at the Security and Watermarking of Multimedia Contents V, P. W. Wong and E. J. Delp, Eds., 2003, http://www.geocities.com/Jeffrey_Bloom/research/ lubin03-spie.pdf.
-
(2003)
-
-
Lubin, J.1
Bloom, J.2
Cheng, H.3
-
20
-
-
20444381456
-
"Anonymous fingerprinting"
-
IBM Research, Res. Rep. RZ 2881
-
B. Pfitzmann and M. Waidner, "Anonymous fingerprinting" IBM Research, Res. Rep. RZ 2881, 1996.
-
(1996)
-
-
Pfitzmann, B.1
Waidner, M.2
-
22
-
-
0032072279
-
"Image adaptive watermarking using visual models"
-
May
-
C. Podilchuk and W. Zeng, "Image adaptive watermarking using visual models," IEEE J. Sel. Areas Commun., vol. 16, no. 5, pp. 525-540, May 1998.
-
(1998)
IEEE J. Sel. Areas Commun.
, vol.16
, Issue.5
, pp. 525-540
-
-
Podilchuk, C.1
Zeng, W.2
-
23
-
-
20444370385
-
"Appendix 3B: The Gaussian integral Q(x)"
-
Upper Saddle River, NJ: Prentice-Hall
-
M. Simon, S. Hinedi, and W. Lindsey, "Appendix 3B: The Gaussian integral Q(x)," in Digital Communication Techniques: Signal Design and Detection. Upper Saddle River, NJ: Prentice-Hall, 1995.
-
(1995)
Digital Communication Techniques: Signal Design and Detection
-
-
Simon, M.1
Hinedi, S.2
Lindsey, W.3
-
24
-
-
0003538515
-
"Analysis of attacks on image watermarks with randomized coefficients"
-
NEC Res. Inst., Princeton, NJ, Tech. Rep. 96-045
-
H. Stone, "Analysis of attacks on image watermarks with randomized coefficients," NEC Res. Inst., Princeton, NJ, Tech. Rep. 96-045, 1996.
-
(1996)
-
-
Stone, H.1
-
25
-
-
84937053497
-
"Capacity of digital watermarks subjected to an optimal collusion attack"
-
presented at the Eur. Signal Processing Conf., Sep
-
J. Su, J. Eggers, and B. Girod, "Capacity of digital watermarks subjected to an optimal collusion attack," presented at the Eur. Signal Processing Conf., Sep. 2000.
-
(2000)
-
-
Su, J.1
Eggers, J.2
Girod, B.3
-
26
-
-
0038527384
-
"Anti-collusion fingerprinting for multimedia"
-
Apr
-
W. Trappe, M. Wu, Z. J. Wang, and K. J. R. Liu, "Anti-collusion fingerprinting for multimedia," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1069-1087, Apr. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.4
, pp. 1069-1087
-
-
Trappe, W.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
-
27
-
-
85032751604
-
"Review paper: Collusion resistant fingerprinting for multimedia"
-
Feb
-
M. Wu, W. Trappe, Z. J. Wang, and K. J. R. Liu, "Review paper: Collusion resistant fingerprinting for multimedia," IEEE Signal Process. Mag., vol. 21, no. 2, pp. 15-27, Feb. 2004.
-
(2004)
IEEE Signal Process. Mag.
, vol.21
, Issue.2
, pp. 15-27
-
-
Wu, M.1
Trappe, W.2
Wang, Z.J.3
Liu, K.J.R.4
-
28
-
-
11844303521
-
"Group-oriented finger-printing for multimedia forensics"
-
Z. J. Wang, M. Wu, W. Trappe, and K. J. R. Liu, "Group-oriented finger-printing for multimedia forensics," EURASIP J. Appl. Signal Process., vol. 14, pp. 2153-2173, 2004.
-
(2004)
EURASIP J. Appl. Signal Process.
, vol.14
, pp. 2153-2173
-
-
Wang, Z.J.1
Wu, M.2
Trappe, W.3
Liu, K.J.R.4
-
30
-
-
84937541590
-
"Improved Boneh-Shaw content fingerprinting"
-
Berlin, Germany: Springer-Verlag, LNCS 2020
-
Y. Yacobi, "Improved Boneh-Shaw content fingerprinting," in CT-RSA 2001. Berlin, Germany: Springer-Verlag, 2001, LNCS 2020, pp. 378-91.
-
(2001)
CT-RSA 2001
, pp. 378-391
-
-
Yacobi, Y.1
-
31
-
-
8844258240
-
"Efficient watermark detection and collusion security"
-
Feb
-
F. Zane, "Efficient watermark detection and collusion security," in Proc. 4th Int. Conf. Financial Cryptography, Feb. 2000, pp. 21-32.
-
(2000)
Proc. 4th Int. Conf. Financial Cryptography
, pp. 21-32
-
-
Zane, F.1
-
32
-
-
18844450187
-
"Forensic Analysis of Nonlinear Collusion on Independent Multimedia Fingerprints"
-
May
-
H. V. Zhao, M. Wu, Z. J. Wang, and K. J. R. Liu, "Forensic Analysis of Nonlinear Collusion on Independent Multimedia Fingerprints" IEEE Trans. Image Process., vol. 14, no. 5, pp. 646-661, May 2005.
-
(2005)
IEEE Trans. Image Process.
, vol.14
, Issue.5
, pp. 646-661
-
-
Zhao, H.V.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
|