메뉴 건너뛰기




Volumn 2, Issue , 2003, Pages 985-988

Dynamic ownership verification

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; MULTIMEDIA SIGNAL PROCESSING; WATERMARKING;

EID: 33744539229     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICICS.2003.1292606     Document Type: Conference Paper
Times cited : (3)

References (9)
  • 1
    • 0038715139 scopus 로고    scopus 로고
    • Digital image watermarking for joint ownership
    • Huiping Guo, and Nicolas D. Georganas, "Digital Image Watermarking for Joint Ownership," 10th ACM Conference on Multimedia, pp362-371,2002.
    • (2002) th ACM Conference on Multimedia , pp. 362-371
    • Guo, H.1    Georganas, N.D.2
  • 3
    • 0032074580 scopus 로고    scopus 로고
    • Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
    • Scott Craver, Nasir Memon, Boon-Lock Yeo. Minerva M. Yeung, "Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications, " IEEE Journal on Selected Areas in Communications, 16(4):573-586,1998
    • (1998) IEEE Journal on Selected Areas in Communications , vol.16 , Issue.4 , pp. 573-586
    • Craver, S.1    Memon, N.2    Yeo, B.-L.3    Yeung, M.M.4
  • 6
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • Ping Wah Wong, and Nasir Memon, "Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification," IEEE Transactions on Image Processing, vol. 10, pp. 1593 -1601,2001
    • (2001) IEEE Transactions on Image Processing , vol.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2
  • 7
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to Share a Secret, " Communications of the ACM", 22(11):612-613, 1979
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 8
    • 4944240675 scopus 로고    scopus 로고
    • Authenticated key exchange provably secure against the man-in-the-middle attack
    • Anna M. Johnston 1 and Peter S. Gemmell, "Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack," Journal of Ciyptology, 15(2): 139-148,2002
    • (2002) Journal of Ciyptology , vol.15 , Issue.2 , pp. 139-148
    • Johnston, A.M.1    Gemmell, P.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.