메뉴 건너뛰기




Volumn , Issue , 2005, Pages 93-101

Watermarking and ownership problem: A revisit

Author keywords

Additive watermarking; Counterfeit ownership; Ownership; Ownership deadlock; Theft of ownership; Watermarking

Indexed keywords

ADDITIVE WATERMARKING; COUNTERFEIT OWNERSHIP; OWNERSHIP; OWNERSHIP DEADLOCK; THEFT OF OWNERSHIP;

EID: 33745838992     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1102546.1102563     Document Type: Conference Paper
Times cited : (13)

References (17)
  • 2
    • 0004166728 scopus 로고    scopus 로고
    • Can invisible watermarks resolve rightful ownerships
    • IBM Research Institute
    • S. Craver, N. Memon, B. Yeo, and M. Yeung, "Can invisible watermarks resolve rightful ownerships," in Technical Report RC 20509. 1997, IBM Research Institute.
    • (1997) Technical Report , vol.RC 20509
    • Craver, S.1    Memon, N.2    Yeo, B.3    Yeung, M.4
  • 6
    • 33745836553 scopus 로고    scopus 로고
    • On the insecurity of non-invertible watermarking schemes for dispute resolving
    • A. Adelsbach, S. Katzenbeisser, and A. Sadegi, "On the insecurity of non-invertible watermarking schemes for dispute resolving," in Proc. of IWDW, 2003.
    • (2003) Proc. of IWDW
    • Adelsbach, A.1    Katzenbeisser, S.2    Sadegi, A.3
  • 8
    • 33745864183 scopus 로고    scopus 로고
    • Security engineering for zero-knowledge watermark detection
    • A. Adelsbach, M. Rohe, and A. Sadeghi, "Security engineering for zero-knowledge watermark detection," in Proc. of WIAMIS'05, 2005.
    • (2005) Proc. of WIAMIS'05
    • Adelsbach, A.1    Rohe, M.2    Sadeghi, A.3
  • 11
    • 0032074580 scopus 로고    scopus 로고
    • Resolving rightful ownership with invisible watermarking techniques: Limitation, attacks, and implications
    • S. Craver N. Memon B. Yeo and M. Yeung, "Resolving rightful ownership with invisible watermarking techniques: Limitation, attacks, and implications," IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 573-586, 1998.
    • (1998) IEEE Journal on Selected Areas in Communications , vol.16 , Issue.4 , pp. 573-586
    • Craver, S.1    Memon, N.2    Yeo, B.3    Yeung, M.4
  • 12
    • 0032155522 scopus 로고    scopus 로고
    • Watermarking methods for mpeg encoded video: Towards resolving rightful ownership
    • L. Qiao and K. Nahrstedt, "Watermarking methods for mpeg encoded video: Towards resolving rightful ownership," in Proc. of ICMCS, 1998, vol. 9, pp. 194-210.
    • (1998) Proc. of ICMCS , vol.9 , pp. 194-210
    • Qiao, L.1    Nahrstedt, K.2
  • 13
    • 0031385945 scopus 로고    scopus 로고
    • On resolving rightful ownerships of digital images by invisible watermarks
    • IEEE
    • W. Zeng and B. Liu, "On resolving rightful ownerships of digital images by invisible watermarks," in Proc. of ICIP. 1997, pp. 552-555, IEEE.
    • (1997) Proc. of ICIP , pp. 552-555
    • Zeng, W.1    Liu, B.2
  • 16
    • 2642530198 scopus 로고    scopus 로고
    • A robust protocol for proving ownerhsip of multimedia content
    • M. Ramkumar and A. N. Akansu, "A robust protocol for proving ownerhsip of multimedia content," IEEE Transactions on Multimedia, vol. 6, no. 3, pp. 469-478, 2004.
    • (2004) IEEE Transactions on Multimedia , vol.6 , Issue.3 , pp. 469-478
    • Ramkumar, M.1    Akansu, A.N.2
  • 17
    • 35048823370 scopus 로고    scopus 로고
    • On the possibility of non-invertible watermark schemes
    • Springer-Verlag
    • Q. Li and E. Chang, "On the possibility of non-invertible watermark schemes," in Proc. of IHW'04, Lecture Notes in Computer Science. 2004, vol. 3200, pp. 13-24, Springer-Verlag.
    • (2004) Proc. of IHW'04, Lecture Notes in Computer Science , vol.3200 , pp. 13-24
    • Li, Q.1    Chang, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.