-
1
-
-
1442357607
-
Watermark detection with zero-knowledge disclosure
-
Spriger-Verlag
-
A. Adelsbach, S. Katzenbeisser, and A.-R. Sadeghi. Watermark detection with zero-knowledge disclosure. In Multimedia Systems, volume 9, pages 266-278. Spriger-Verlag, 2003.
-
(2003)
Multimedia Systems
, vol.9
, pp. 266-278
-
-
Adelsbach, A.1
Katzenbeisser, S.2
Sadeghi, A.-R.3
-
2
-
-
14844320058
-
Overcoming the obstacles of zero-knowledge watermark detection
-
Magdeburg, Germany
-
A. Adelsbach, M. Rohe, and A.-R. Sadeghi. Overcoming the obstacles of zero-knowledge watermark detection. In Proceedings of ACM Multimedia and Security Workshop, pages 46-55, Magdeburg, Germany, 2004.
-
(2004)
Proceedings of ACM Multimedia and Security Workshop
, pp. 46-55
-
-
Adelsbach, A.1
Rohe, M.2
Sadeghi, A.-R.3
-
3
-
-
33646128241
-
Non-interactive watermark detection for a correlation-based watermarking scheme
-
Communications and Multimedia Security: 9th IFIP TC-6 TC-11International Conference, CMS 2005. Spriger-Verlag, September
-
A. Adelsbach, M. Rohe, and A.-R. Sadeghi. Non-interactive watermark detection for a correlation-based watermarking scheme. In Communications and Multimedia Security: 9th IFIP TC-6 TC-11International Conference, CMS 2005, volume 3677 of Lecture Notes in Computer Science, pages 129-139. Spriger-Verlag, September 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3677
, pp. 129-139
-
-
Adelsbach, A.1
Rohe, M.2
Sadeghi, A.-R.3
-
4
-
-
84944404911
-
Zero-knowledge watermark detection and proof of ownership
-
Information Hiding - 4th International Workshop, IHW 2001. Spriger-Verlag
-
A. Adelsbach and A.-R. Sadeghi. Zero-knowledge watermark detection and proof of ownership. In Information Hiding - 4th International Workshop, IHW 2001, volume 2137 of Lecture Notes in Computer Science, pages 273-288. Spriger-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2137
, pp. 273-288
-
-
Adelsbach, A.1
Sadeghi, A.-R.2
-
6
-
-
84983104598
-
On defining proofs of knowledge
-
Proceedings of CRYPTO'92. Springer-Verlag
-
M. Bellare and O. Goldreich. On defining proofs of knowledge. In Proceedings of CRYPTO'92, volume 740 of Lecture, Notes in Computer Science, pages 390-420. Springer-Verlag, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.740
, pp. 390-420
-
-
Bellare, M.1
Goldreich, O.2
-
7
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
ACM Press
-
M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of ACM Computer and Comm. Security, pages 62-73. ACM Press, 1993.
-
(1993)
Proceedings of ACM Computer and Comm. Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
84948973732
-
Efficient proofs that a committed number lies in an interval
-
EUROCRYPT 2000. Spriger-Verlag
-
F. Boudot. Efficient proofs that a committed number lies in an interval. In EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science, pages 431-444. Spriger-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 431-444
-
-
Boudot, F.1
-
9
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
May
-
B. Chen and G. Wornell. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory, 47:1423-1443, May 2001.
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.2
-
10
-
-
33645680170
-
The blind newton sensitivity attack
-
E. J. D. III and P. W. Wong, editors, Proc. of SPIE, San José, USA, January
-
P. Comesaña, L. Pérez-Freire, and F. Pérez- González. The blind newton sensitivity attack. In E. J. D. III and P. W. Wong, editors, Security, Steganography, and Watermarking of Multimedia Contents VIII, Proc. of SPIE, San José, USA, January 2006.
-
(2006)
Security, Steganography, and Watermarking of Multimedia Contents VIII
-
-
Comesaña, P.1
Pérez-Freire, L.2
Pérez-González, F.3
-
11
-
-
84947937393
-
A secure, robust watermark for multimedia. in R. Anderson, editor
-
Information Hiding-First International Workshop. Springer-Verlag, May/June
-
I. Cox, J. Kilian, T. Leighton, and T. Shamoon. A secure, robust watermark for multimedia. In R. Anderson, editor, Information Hiding-First International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 175-190. Springer-Verlag, May/June 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1174
, pp. 175-190
-
-
Cox, I.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
12
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Proceedings of CRYPTO'94. Spriger-Verlag
-
R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Proceedings of CRYPTO'94, volume 839 of Lecture Notes in Computer Science, pages 174-187. Spriger-Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
13
-
-
35248829262
-
Zero-knowledge watermark detection
-
S. Craver. Zero-knowledge watermark detection. In Information Hiding, pages 101-116, 1999.
-
(1999)
Information Hiding
, pp. 101-116
-
-
Craver, S.1
-
14
-
-
1442310343
-
Commitment schemes and zero-knowledge protocols
-
Lectures on data security, Modern Cryptology in Theory and Practise. Springer-Verlag, July
-
I. Damgård. Commitment schemes and zero-knowledge protocols. In Lectures on data security, Modern Cryptology in Theory and Practise, volume 1561 of Lecture Notes in Comuter Science, pages 63-86. Springer-Verlag, July 1998.
-
(1998)
Lecture Notes in Comuter Science
, vol.1561
, pp. 63-86
-
-
Damgård, I.1
-
15
-
-
84958774556
-
A statistically-hiding integer commitment scheme based on groups with hidden order
-
ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security. Spriger-Verlag, December
-
I. Damgård and E. Fujisaki. A statistically-hiding integer commitment scheme based on groups with hidden order. In ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security, volume 2501 of Lecture Notes in Computer Science, pages 125-142. Spriger-Verlag, December 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2501
, pp. 125-142
-
-
Damgård, I.1
Fujisaki, E.2
-
16
-
-
0024611659
-
The knowledge complexity of interactive proof-systems
-
S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof-systems. In SIAM Journal of Computing, volume 18, pages 186-208, 1989.
-
(1989)
SIAM Journal of Computing
, vol.18
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
17
-
-
0033882559
-
Dct-domain watermarking techniques for still images: Detector performance analysis and a new structure
-
January. Special Issue on Image and Video Processing for Digital Libraries
-
J. R. Hernández, M. Amado, and F. Pérez-González. Dct-domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Transactions on Image Processing, 9(1):55-68, January 2000. Special Issue on Image and Video Processing for Digital Libraries.
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, Issue.1
, pp. 55-68
-
-
Hernández, J.R.1
Amado, M.2
Pérez-González, F.3
-
18
-
-
0345058958
-
On diophantine complexity and statistical zero-knowledge arguments
-
ASIACRYPT 2003. Spriger-Verlag, November
-
H. Lipmaa. On diophantine complexity and statistical zero-knowledge arguments. In ASIACRYPT 2003, volume 2894 of Lecture Notes in Computer Science, pages 398-415. Spriger-Verlag, November 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2894
, pp. 398-415
-
-
Lipmaa, H.1
-
19
-
-
21844449699
-
Detection in quantization-based watermarking: Performance and security issues
-
E. J. D. III and P. W. Wong, editors, Security, Steganography, and Watermarking of Multimedia Contents VII, San José, USA, January
-
L. Pérez-Freire, P. Comesaña, and F. Pérez- González. Detection in quantization-based watermarking: performance and security issues. In E. J. D. III and P. W. Wong, editors, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681 of Proc. of SPIE, pages 721-733, San José, USA, January 2005.
-
(2005)
Proc. of SPIE
, vol.5681
, pp. 721-733
-
-
Pérez-Freire, L.1
Comesaña, P.2
Pérez-González, F.3
-
20
-
-
0038188753
-
Performance analysis of existing and new methods for data hiding with known-host information in additive channels
-
April
-
F. Pérez-González, F. Balado, and J. R. Hernández. Performance analysis of existing and new methods for data hiding with known-host information in additive channels. IEEE Transactions on Signal Processing, 51:960-980, April 2003.
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, pp. 960-980
-
-
Pérez-González, F.1
Balado, F.2
Hernández, J.R.3
-
21
-
-
33645680169
-
Zero-knowledge st-dm watermarking
-
E. J. D. III and P. W. Wong, editors, San José, California, USA, January
-
A. Piva, V. Cappellini, D. Corazzi, A. D. Rosa, C. Orlandi, and M. Barni. Zero-knowledge st-dm watermarking. In E. J. D. III and P. W. Wong, editors, Security, Steganography, and Watermarking of Multimedia Contents VIII, SPIE, San José, California, USA, January 2006.
-
(2006)
Security, Steganography, and Watermarking of Multimedia Contents VIII, SPIE
-
-
Piva, A.1
Cappellini, V.2
Corazzi, D.3
Rosa, A.D.4
Orlandi, C.5
Barni, M.6
|