-
2
-
-
0030384775
-
Techniques for data hiding
-
BENDER, W., GRUHL, D., MORIMOTO, N., AND LU, A. 1996. Techniques for data hiding. IBM Syst. J. 35, 3/4, 313-336.
-
(1996)
IBM Syst. J.
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
4
-
-
85008047913
-
Protecting ownership rights through digital watermarking
-
BERGHEL, H. AND O'GORMAN, L. 1996. Protecting ownership rights through digital watermarking. IEEE Comput. 29, 7, 101-103.
-
(1996)
IEEE Comput.
, vol.29
, Issue.7
, pp. 101-103
-
-
Berghel, H.1
O'Gorman, L.2
-
6
-
-
0032637701
-
Copyright protection for the electronic distribution of text documents
-
BRASSIL, J. T., Low, S., AND MAXEMCHUK, N. F. 1999. Copyright protection for the electronic distribution of text documents. Proceedings of the IEEE, 87, 7, 1181-1196.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1181-1196
-
-
Brassil, J.T.1
Low, S.2
Maxemchuk, N.F.3
-
7
-
-
0033905408
-
Ip protection of dsp algorithms for system on chip implementation
-
CHAPMAN, R. AND DURRANI, T. S. 2000. Ip protection of dsp algorithms for system on chip implementation. IEEE Trans. Signal Process. 48, 3, 854-861.
-
(2000)
IEEE Trans. Signal Process.
, vol.48
, Issue.3
, pp. 854-861
-
-
Chapman, R.1
Durrani, T.S.2
-
9
-
-
0029696313
-
A secure, imperceptible yet perceptually salient, spread spectrum watermark for multimedia
-
Cox, I. J., KILIAN, J., LEIGHTON, T., AND SHAMOON, T. 1996. A secure, imperceptible yet perceptually salient, spread spectrum watermark for multimedia. In Proceedings of IEEE Southcon. 192-197.
-
(1996)
Proceedings of IEEE Southcon
, pp. 192-197
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
10
-
-
0004166728
-
Can invisible watermarks resolve rightful ownerships?
-
RC 20509, 1996
-
CRAVER, S., MEMON, N., YEO, B. L., AND YEUNG, M. M. 1996. Can invisible watermarks resolve rightful ownerships? IBM Tech. rep., RC 20509, 1996.
-
(1996)
IBM Tech. Rep.
-
-
Craver, S.1
Memon, N.2
Yeo, B.L.3
Yeung, M.M.4
-
15
-
-
0032634857
-
Multimedia watermarking techniques
-
HARTUNG, F. AND KUTTER, M. 1999. Multimedia watermarking techniques. In Proceedings of the IEEE 87, 1079-1107.
-
(1999)
Proceedings of the IEEE
, vol.87
, pp. 1079-1107
-
-
Hartung, F.1
Kutter, M.2
-
16
-
-
0002253064
-
Placement watermarking of standard-cell designs
-
IRBY, D. L., NEWBOULD, R. D., CAROTHERS, J. D., AND RODRIOUEZ, J. J. 2001. Placement watermarking of standard-cell designs. In IEEE Southwest Symposium on Mixed-Signal Design. 116-120.
-
(2001)
IEEE Southwest Symposium on Mixed-signal Design
, pp. 116-120
-
-
Irby, D.L.1
Newbould, R.D.2
Carothers, J.D.3
Rodriouez, J.J.4
-
17
-
-
0001047763
-
Optimization by simulated annealing: An experimental evaluation, Part II
-
JOHNSON, D. S., ARAGON, C. R., MCGEOCH, L. A., AND SCHEVON, C. 1991. Optimization by simulated annealing: An experimental evaluation, Part II. Operat. Res. 39, 3, 378-406.
-
(1991)
Operat. Res.
, vol.39
, Issue.3
, pp. 378-406
-
-
Johnson, D.S.1
Aragon, C.R.2
Mcgeoch, L.A.3
Schevon, C.4
-
18
-
-
0003482562
-
-
Kluwer Academic, Boston, MA
-
JOHNSON, N. F., DURIC, Z., AND JAJODIA, S. 2001. Information Hiding: Steganography and Watermarking - Attacks and Countermeasures. Kluwer Academic, Boston, MA.
-
(2001)
Information Hiding: Steganography and Watermarking - Attacks and Countermeasures
-
-
Johnson, N.F.1
Duric, Z.2
Jajodia, S.3
-
19
-
-
0035472848
-
Constraint-based watermarking techniques for design ip protection
-
KAHNG, A. B., LACH, J., MANGIONE-SMITH, W. H., AND MANTIK, S. 2001. Constraint-based watermarking techniques for design ip protection. IEEE Trans. Comput.-Aid. Design Integrat. Circuits Syst. 20, 10, 1236-1252.
-
(2001)
IEEE Trans. Comput.-aid. Design Integrat. Circuits Syst.
, vol.20
, Issue.10
, pp. 1236-1252
-
-
Kahng, A.B.1
Lach, J.2
Mangione-Smith, W.H.3
Mantik, S.4
-
22
-
-
0031628756
-
Protecting ownership rights of a loss-less image coder through hierarchical watermarking
-
KIM, H. J., MANGIONE-SMITH, W. H., AND POTKONJAK, M. 1998. Protecting ownership rights of a loss-less image coder through hierarchical watermarking. In Workshop on Signal Processing Systems, 73-82.
-
(1998)
Workshop on Signal Processing Systems
, pp. 73-82
-
-
Kim, H.J.1
Mangione-Smith, W.H.2
Potkonjak, M.3
-
23
-
-
0032320166
-
Intellectual property protection by watermarking combinational logic synthesis solutions
-
KIROVSKI, D., HWANG, Y., POTKONJAK, M., AND CONG, J. 1998. Intellectual property protection by watermarking combinational logic synthesis solutions. In Proceedings of the IEEE/ACM International Conference on Computer-Aided Design. 194-198.
-
(1998)
Proceedings of the IEEE/ACM International Conference on Computer-aided Design.
, pp. 194-198
-
-
Kirovski, D.1
Hwang, Y.2
Potkonjak, M.3
Cong, J.4
-
25
-
-
0141517673
-
Local watermarks: Methodology and application to behavioral synthesis
-
KIROVSKI, D. AND POTKONJAK, M. 2003. Local watermarks: Methodology and application to behavioral synthesis. IEEE Trans. VLSI CAD 22, 9, 1277-1284.
-
(2003)
IEEE Trans. VLSI CAD
, vol.22
, Issue.9
, pp. 1277-1284
-
-
Kirovski, D.1
Potkonjak, M.2
-
26
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Lecture Notes in Computer Science
-
KOCHER, P. C. 1996. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Lecture Notes in Computer Science, Advances in Cryptology, CRYPTO, 104-113.
-
(1996)
Advances in Cryptology, CRYPTO
, pp. 104-113
-
-
Kocher, P.C.1
-
27
-
-
84939573910
-
Differential power analysis: Leaking secrets
-
KOCHER, P. C. 1999. Differential power analysis: Leaking secrets. Lecture Notes in Computer Science, 388-397.
-
(1999)
Lecture Notes in Computer Science
, pp. 388-397
-
-
Kocher, P.C.1
-
28
-
-
33745185330
-
Behavioral synthesis techniques for intellectual property protection
-
UCLA Computer Science Department
-
KOUSHANFAR, F., HONG, I., AND POTKONJAK, M. 2003. Behavioral synthesis techniques for intellectual property protection. Tech. Rep., UCLA Computer Science Department.
-
(2003)
Tech. Rep.
-
-
Koushanfar, F.1
Hong, I.2
Potkonjak, M.3
-
29
-
-
84947210876
-
Intellectual property metering
-
KOUSHANFAR, F., Qu, G., AND POTKONJAK, M. 2001. Intellectual property metering. In IHW Information Hiding Workshop, 2137, 87-102.
-
(2001)
IHW Information Hiding Workshop
, vol.2137
, pp. 87-102
-
-
Koushanfar, F.1
Qu, G.2
Potkonjak, M.3
-
30
-
-
0034334788
-
Chip detectives [reverse engineering]
-
KUMAGAI, J. 2000. Chip detectives [reverse engineering], IEEE Spectrum 37, 11, 43-48.
-
(2000)
IEEE Spectrum
, vol.37
, Issue.11
, pp. 43-48
-
-
Kumagai, J.1
-
31
-
-
0036121722
-
A vision-based masking model for spread-spectrum image watermarking
-
KUTTER, M. AND WINKLER, S. A. 2002. A vision-based masking model for spread-spectrum image watermarking. IEEE Trans. Image Process. 11, 1, 16-25.
-
(2002)
IEEE Trans. Image Process.
, vol.11
, Issue.1
, pp. 16-25
-
-
Kutter, M.1
Winkler, S.A.2
-
33
-
-
0035473102
-
Fingerprinting techniques for field-programmable gate array intellectual property protection
-
LACH, J., MANGIONE-SMITH, W. H., AND POTKONJAK, M. 2001. Fingerprinting techniques for field-programmable gate array intellectual property protection. IEEE Trans. Comput.-Aid. Design Integrat. Circuits Syst. 20, 10, 1253-1261.
-
(2001)
IEEE Trans. Comput.-aid. Design Integrat. Circuits Syst.
, vol.20
, Issue.10
, pp. 1253-1261
-
-
Lach, J.1
Mangione-Smith, W.H.2
Potkonjak, M.3
-
39
-
-
0037075572
-
Watermarking ics for ip protection
-
NEWBOULD, R. D., CAROTHERS, J. D., AND RODRIGUEZ, J. J. 2002. Watermarking ics for ip protection. Electron. Letters 38, 6, 272-274.
-
(2002)
Electron. Letters
, vol.38
, Issue.6
, pp. 272-274
-
-
Newbould, R.D.1
Carothers, J.D.2
Rodriguez, J.J.3
-
40
-
-
0002670792
-
Mixed signal design watermarking for ip protection
-
NEWBOULD, R. D., IRBY, D. L., CAROTHERS, J. D., AND RODRIGUEZ, J. J. 2001. Mixed signal design watermarking for ip protection. In IEEE Southwest Symposium on Mixed-Signal Design. 110-115.
-
(2001)
IEEE Southwest Symposium on Mixed-signal Design
, pp. 110-115
-
-
Newbould, R.D.1
Irby, D.L.2
Carothers, J.D.3
Rodriguez, J.J.4
-
41
-
-
33745225188
-
A shape-preserving data embedding algorithm for nurbs curves and surfaces
-
OHBUCHI, R., MASUDA, H., AND AONO, M. 2000. A shape-preserving data embedding algorithm for nurbs curves and surfaces. Trans. Inform. Process. Soc. Japan 41, 3, 559-569.
-
(2000)
Trans. Inform. Process. Soc. Japan
, vol.41
, Issue.3
, pp. 559-569
-
-
Ohbuchi, R.1
Masuda, H.2
Aono, M.3
-
42
-
-
0035440030
-
Techniques for the creation of digital watermarks in sequential circuit designs
-
OLIVEIRA, A. L. 2001. Techniques for the creation of digital watermarks in sequential circuit designs. IEEE Trans. Comput.-Aid. Design Integrat Circuits Syst. 20, 9, 1101-1117.
-
(2001)
IEEE Trans. Comput.-aid. Design Integrat Circuits Syst.
, vol.20
, Issue.9
, pp. 1101-1117
-
-
Oliveira, A.L.1
-
44
-
-
0026172137
-
Fast prototyping of data path intensive architectures
-
RABAEY, J., CHU, C., HOANG, P., AND POTKONJAK, M. 1991. Fast prototyping of data path intensive architectures. IEEE Design and Test of Comput. 8, 2, 40-51.
-
(1991)
IEEE Design and Test of Comput.
, vol.8
, Issue.2
, pp. 40-51
-
-
Rabaey, J.1
Chu, C.2
Hoang, P.3
Potkonjak, M.4
-
45
-
-
0032597904
-
Hierarchical watermarking for protection of dsp filter cores
-
RASHID, A., ASHEH, J., MANGIONE-SMITH, W. H., AND POTKONJAK, M. 1999. Hierarchical watermarking for protection of dsp filter cores. In Custom Integrated Circuits Conference. 39-42.
-
(1999)
Custom Integrated Circuits Conference
, pp. 39-42
-
-
Rashid, A.1
Asheh, J.2
Mangione-Smith, W.H.3
Potkonjak, M.4
-
46
-
-
0003851399
-
-
John Wiley and Sons, New York, NY
-
SCHNEIER, B. 1996. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley and Sons, New York, NY.
-
(1996)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
47
-
-
85013986121
-
Object-based transparent video watermarking
-
SWANSON, M. D., ZHU, B., CHAU, B., AND TEWFIK, A. H. 1997. Object-based transparent video watermarking. In IEEE Workshop on Multimedia Signal Processing. 369-374.
-
(1997)
IEEE Workshop on Multimedia Signal Processing
, pp. 369-374
-
-
Swanson, M.D.1
Zhu, B.2
Chau, B.3
Tewfik, A.H.4
-
50
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
WAGNER, D., FOSTER, J. S., BREWER, E. A., AND AIKEN, A. 2000. A first step towards automated detection of buffer overrun vulnerabilities. In Network and Distributed System Security Symposium.
-
(2000)
Network and Distributed System Security Symposium
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
51
-
-
84947291784
-
Computational forensic techniques for intellectual property protection
-
WONG, J. L., KIROVSKI, D., AND POTKONJAK, M. 2001. Computational forensic techniques for intellectual property protection. In Information Hiding Workshop, 2137, 71-86.
-
(2001)
Information Hiding Workshop
, vol.2137
, pp. 71-86
-
-
Wong, J.L.1
Kirovski, D.2
Potkonjak, M.3
-
52
-
-
0032754443
-
Watermarking 3d objects for verification
-
YEO, B. AND YEUNG, M. M. 1999. Watermarking 3d objects for verification. IEEE Comput. Graph. Applica. 19, 1, 36-45.
-
(1999)
IEEE Comput. Graph. Applica.
, vol.19
, Issue.1
, pp. 36-45
-
-
Yeo, B.1
Yeung, M.M.2
-
53
-
-
85015855132
-
Digital watermarking for high-quality imaging
-
YEUNG, M. M., MINTZEH, F. C., BRAUDAWAY, G. W., AND RAO, A. R. 1997. Digital watermarking for high-quality imaging. In IEEE Workshop on Multimedia Signal Processing. 357-362.
-
(1997)
IEEE Workshop on Multimedia Signal Processing
, pp. 357-362
-
-
Yeung, M.M.1
Mintzeh, F.C.2
Braudaway, G.W.3
Rao, A.R.4
|