-
1
-
-
0038715139
-
Digital image watermarking for joint ownership
-
Huiping Guo, and Nicolas D. Georganas, "Digital Image Watermarking for Joint Ownership," 10th ACM Conference on Multimedia, pp362-371,2002.
-
(2002)
th ACM Conference on Multimedia
, pp. 362-371
-
-
Guo, H.1
Georganas, N.D.2
-
2
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I. J. Cox, J. Kilian, T. Leighton, and T. G. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans, on Image Processing, 6(12):1673-1687,1997.
-
(1997)
IEEE Trans, on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.G.4
-
3
-
-
0032074580
-
Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
-
Scott Craver, Nasir Memon, Boon-Lock Yeo. Minerva M. Yeung, "Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications, " IEEE Journal on Selected Areas in Communications, 16(4):573-586,1998
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 573-586
-
-
Craver, S.1
Memon, N.2
Yeo, B.-L.3
Yeung, M.M.4
-
5
-
-
0003192454
-
A watermarking technique for the protection of digital images TPR
-
IOS Press
-
A. Piva, M Bami, F. Bartollni, V. Cappellini, "A Watermarking Technique for the Protection of Digital Images TPR, " Advances in Information Technologies: The Business Challenge, IOS Press, pp. 636-643,1998
-
(1998)
Advances in Information Technologies: The Business Challenge
, pp. 636-643
-
-
Piva, A.1
Bami, M.2
Bartollni, F.3
Cappellini, V.4
-
6
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
Ping Wah Wong, and Nasir Memon, "Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification," IEEE Transactions on Image Processing, vol. 10, pp. 1593 -1601,2001
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
7
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to Share a Secret, " Communications of the ACM", 22(11):612-613, 1979
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
8
-
-
4944240675
-
Authenticated key exchange provably secure against the man-in-the-middle attack
-
Anna M. Johnston 1 and Peter S. Gemmell, "Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack," Journal of Ciyptology, 15(2): 139-148,2002
-
(2002)
Journal of Ciyptology
, vol.15
, Issue.2
, pp. 139-148
-
-
Johnston, A.M.1
Gemmell, P.S.2
-
9
-
-
85012908743
-
One-way accumulators: A decentralized alternative to digital signatures
-
Josh Benaloh, and Michael de Mare, "One-Way Accumulators: A Decentralized Alternative to Digital Signatures," Eurocrypto'1993, Lecture Notes in Computer Sciences 765, pp.274-285
-
Eurocrypto'1993, Lecture Notes in Computer Sciences
, vol.765
, pp. 274-285
-
-
Benaloh, J.1
De Mare, M.2
|