-
1
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I. J. Cox, F. Kilian, F. T. Leighton, and T. G. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Transaction on Image Processing, vol. 6, no. 12, pp. 1673-1687, 1997.
-
(1997)
IEEE Transaction on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, F.2
Leighton, F.T.3
Shamoon, T.G.4
-
2
-
-
0004166728
-
Can invisible watermarks resolve rightful ownerships
-
IBM Research Institute
-
S. Craver, N. Memon, B. Yeo, and M. Yeung, "Can invisible watermarks resolve rightful ownerships," in Technical Report RC 20509. 1997, IBM Research Institute.
-
(1997)
Technical Report
, vol.RC 20509
-
-
Craver, S.1
Memon, N.2
Yeo, B.3
Yeung, M.4
-
3
-
-
84947903916
-
Proving ownership of digital content
-
Springer-Verlag
-
A. Adelsbach, B. Pfitzmann, and A. R. Sadeghi, "Proving ownership of digital content," in Proc. of IHW'99, Lecture Notes in Computer Science. 2000, vol. 1768, pp. 126-141, Springer-Verlag.
-
(2000)
Proc. of IHW'99, Lecture Notes in Computer Science
, vol.1768
, pp. 126-141
-
-
Adelsbach, A.1
Pfitzmann, B.2
Sadeghi, A.R.3
-
6
-
-
33745836553
-
On the insecurity of non-invertible watermarking schemes for dispute resolving
-
A. Adelsbach, S. Katzenbeisser, and A. Sadegi, "On the insecurity of non-invertible watermarking schemes for dispute resolving," in Proc. of IWDW, 2003.
-
(2003)
Proc. of IWDW
-
-
Adelsbach, A.1
Katzenbeisser, S.2
Sadegi, A.3
-
8
-
-
33745864183
-
Security engineering for zero-knowledge watermark detection
-
A. Adelsbach, M. Rohe, and A. Sadeghi, "Security engineering for zero-knowledge watermark detection," in Proc. of WIAMIS'05, 2005.
-
(2005)
Proc. of WIAMIS'05
-
-
Adelsbach, A.1
Rohe, M.2
Sadeghi, A.3
-
9
-
-
14844320058
-
Overcoming the obstacles of zero-knowledge watermark detection
-
A. Adelsbach, M. Rohe, and A. Sadeghi, "Overcoming the obstacles of zero-knowledge watermark detection," in Proc. of ACM Multimedia and Security Workshop, 2004, pp. 46-55.
-
(2004)
Proc. of ACM Multimedia and Security Workshop
, pp. 46-55
-
-
Adelsbach, A.1
Rohe, M.2
Sadeghi, A.3
-
10
-
-
0033701078
-
The watermark copy attack
-
M. Kutter, S. Voloshynovskiy, and A. Herrigel, "The watermark copy attack," in Proc. of SPIE: Security and Watermarking of Multimedia Contents II, 2000, vol. 3971, pp. 371-380.
-
(2000)
Proc. of SPIE: Security and Watermarking of Multimedia Contents II
, vol.3971
, pp. 371-380
-
-
Kutter, M.1
Voloshynovskiy, S.2
Herrigel, A.3
-
11
-
-
0032074580
-
Resolving rightful ownership with invisible watermarking techniques: Limitation, attacks, and implications
-
S. Craver N. Memon B. Yeo and M. Yeung, "Resolving rightful ownership with invisible watermarking techniques: Limitation, attacks, and implications," IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 573-586, 1998.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 573-586
-
-
Craver, S.1
Memon, N.2
Yeo, B.3
Yeung, M.4
-
12
-
-
0032155522
-
Watermarking methods for mpeg encoded video: Towards resolving rightful ownership
-
L. Qiao and K. Nahrstedt, "Watermarking methods for mpeg encoded video: Towards resolving rightful ownership," in Proc. of ICMCS, 1998, vol. 9, pp. 194-210.
-
(1998)
Proc. of ICMCS
, vol.9
, pp. 194-210
-
-
Qiao, L.1
Nahrstedt, K.2
-
13
-
-
0031385945
-
On resolving rightful ownerships of digital images by invisible watermarks
-
IEEE
-
W. Zeng and B. Liu, "On resolving rightful ownerships of digital images by invisible watermarks," in Proc. of ICIP. 1997, pp. 552-555, IEEE.
-
(1997)
Proc. of ICIP
, pp. 552-555
-
-
Zeng, W.1
Liu, B.2
-
16
-
-
2642530198
-
A robust protocol for proving ownerhsip of multimedia content
-
M. Ramkumar and A. N. Akansu, "A robust protocol for proving ownerhsip of multimedia content," IEEE Transactions on Multimedia, vol. 6, no. 3, pp. 469-478, 2004.
-
(2004)
IEEE Transactions on Multimedia
, vol.6
, Issue.3
, pp. 469-478
-
-
Ramkumar, M.1
Akansu, A.N.2
-
17
-
-
35048823370
-
On the possibility of non-invertible watermark schemes
-
Springer-Verlag
-
Q. Li and E. Chang, "On the possibility of non-invertible watermark schemes," in Proc. of IHW'04, Lecture Notes in Computer Science. 2004, vol. 3200, pp. 13-24, Springer-Verlag.
-
(2004)
Proc. of IHW'04, Lecture Notes in Computer Science
, vol.3200
, pp. 13-24
-
-
Li, Q.1
Chang, E.2
|