-
2
-
-
0037937458
-
A checksum-based corruption detection techniques
-
D. Barbara, R. Goel, and S. Jajodia A checksum-based corruption detection techniques J. Comput. Security 11 3 2003 315 329
-
(2003)
J. Comput. Security
, vol.11
, Issue.3
, pp. 315-329
-
-
Barbara, D.1
Goel, R.2
Jajodia, S.3
-
3
-
-
18844446391
-
A fragile watermark error detection scheme for wireless video communications
-
M. Chen, Y. He, and R. Lagendijk A fragile watermark error detection scheme for wireless video communications IEEE Trans. Multimedia August 2003 315 329
-
(2003)
IEEE Trans. Multimedia
, pp. 315-329
-
-
Chen, M.1
He, Y.2
Lagendijk, R.3
-
4
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I.J. Cox, J. Kilian, T. Leighton, and T.G. Shamoon Secure spread spectrum watermarking for multimedia IEEE Trans. Image Process. 6 12 1997 1673 1687
-
(1997)
IEEE Trans. Image Process.
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.G.4
-
5
-
-
2442542018
-
Authentic data publication over the internet
-
August 21-23
-
P. Devanbu, M. Gertz, C. Martel, S. Stubblebine, Authentic data publication over the internet, in: Proc. 14th IFIP 11.3 Working Conf. in Database Security, August 21-23, 2000, pp. 102-112.
-
(2000)
Proc. 14th IFIP 11.3 Working Conf. in Database Security
, pp. 102-112
-
-
Devanbu, P.1
Gertz, M.2
Martel, C.3
Stubblebine, S.4
-
7
-
-
0034765589
-
Invertible authentication
-
January
-
J. Fridrich, M. Goljan, M. Du, Invertible authentication, in: Proc. of SPIE, Security and Watermarking of Multimedia Contents, January 2001.
-
(2001)
Proc. of SPIE, Security and Watermarking of Multimedia Contents
-
-
Fridrich, J.1
Goljan, M.2
Du, M.3
-
9
-
-
18844420548
-
Tamper detection and localization for categorical data using fragile watermarks
-
October
-
Y. Li, H. Guo, S. Jajodia, Tamper detection and localization for categorical data using fragile watermarks, in: The 4th ACM Workshop on Digital Rights Management, CCS04, October 2004.
-
(2004)
The 4th ACM Workshop on Digital Rights Management, CCS04
-
-
Li, Y.1
Guo, H.2
Jajodia, S.3
-
10
-
-
18844407290
-
Constructing a virtual primary key for fingerprinting relational data
-
October
-
Y. Li, V. Swarup, S. Jajodia, Constructing a virtual primary key for fingerprinting relational data, in: Proc. ACM Workshop on Digital Rights Management, October 2003, pp. 133-141.
-
(2003)
Proc. ACM Workshop on Digital Rights Management
, pp. 133-141
-
-
Li, Y.1
Swarup, V.2
Jajodia, S.3
-
11
-
-
18844455217
-
A robust watermarking scheme for relational data
-
December
-
Y. Li, V. Swarup, S. Jajodia, A robust watermarking scheme for relational data, in: Proc. the 13th Workshop on Information Technology and Engineering, December 2003, pp. 195-200.
-
(2003)
Proc. the 13th Workshop on Information Technology and Engineering
, pp. 195-200
-
-
Li, Y.1
Swarup, V.2
Jajodia, S.3
-
15
-
-
0032075445
-
Robust image watermarking in the spatial domain
-
N. Nikolaidis, and I. Pitas Robust image watermarking in the spatial domain Signal Process. 66 3 1998 385 403
-
(1998)
Signal Process.
, vol.66
, Issue.3
, pp. 385-403
-
-
Nikolaidis, N.1
Pitas, I.2
-
18
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
P. Samarati Protecting respondents' identities in microdata release IEEE Trans. Knowledge Data Eng. 13 6 2001 1010 1027
-
(2001)
IEEE Trans. Knowledge Data Eng.
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
19
-
-
1942517830
-
Dual domain watermarking for authentication and compression of cultural heritage images
-
Y. Zhao, P. Campisi, and D. Kundur Dual domain watermarking for authentication and compression of cultural heritage images IEEE Trans. Image Process. 13 3 2004 430 448
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.3
, pp. 430-448
-
-
Zhao, Y.1
Campisi, P.2
Kundur, D.3
|