-
1
-
-
0034769637
-
Unified approach of asymmetric watermarking schemes. Security and watermarking of multimedia contents III
-
P.W. WONG and E. Delp, eds.
-
Furon, T., Venturini, I., Duhamel, P. Unified approach of asymmetric watermarking schemes. Security and watermarking of multimedia contents III, P.W. WONG and E. Delp, eds., Proc. SPIE, col 4314 (2001), pp 269-279.
-
(2001)
Proc. SPIE
, vol.4314
, pp. 269-279
-
-
Furon, T.1
Venturini, I.2
Duhamel, P.3
-
2
-
-
0036565541
-
Managing Copyright in Open Networks
-
Piva, A., Bartolini, F., Barni, M.: Managing Copyright in Open Networks, IEEE Internet Computing, (2002).
-
(2002)
IEEE Internet Computing
-
-
Piva, A.1
Bartolini, F.2
Barni, M.3
-
3
-
-
0032155522
-
Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights
-
Qian, L. Nahrstedt, K. Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights. Journal of Visual Communications and Image Representation, Vol. 9. No. 3 (1998) 194-202.
-
(1998)
Journal of Visual Communications and Image Representation
, vol.9
, Issue.3
, pp. 194-202
-
-
Qian, L.1
Nahrstedt, K.2
-
4
-
-
85013705270
-
A Buyer- Seller Watermarking Protocol
-
Electronic Proceedings. Los Angeles, USA
-
Memon, N., Wong, P. A Buyer- Seller Watermarking Protocol, IEEE Signal Processing Society. Electronic Proceedings. Los Angeles, USA (1998).
-
(1998)
IEEE Signal Processing Society
-
-
Memon, N.1
Wong, P.2
-
6
-
-
0005943436
-
Modeling security threats
-
Schneier, B. Modeling security threats, Dr. Dobb's Journal (1999). http://www.schneier.com/paper-attacktrees-ddj-ft.html
-
(1999)
Dr. Dobb's Journal
-
-
Schneier, B.1
-
7
-
-
18844415476
-
Copyright protection protocols for multimedia distribution based on trusted hardware
-
Cracow, Poland
-
Tomsich, P., Katzenbeisser, S.: Copyright protection protocols for multimedia distribution based on trusted hardware. PROMS 2000. Cracow, Poland (2000). Pag. 249-25
-
(2000)
PROMS 2000
, pp. 249-325
-
-
Tomsich, P.1
Katzenbeisser, S.2
-
8
-
-
0036565541
-
Managing Copyright in Open Networks
-
Piva, A., Bartolini, F., Barni, M.: Managing Copyright in Open Networks, IEEE Internet Computing, (2002).
-
(2002)
IEEE Internet Computing
-
-
Piva, A.1
Bartolini, F.2
Barni, M.3
-
10
-
-
84957618930
-
A new watermarking method using high frequency components to guide the insertion process in the spatial domain
-
Springer Verlang, Ljubljana, Slovenia
-
Goirizelaia. I., Unzilla, J.J.: A new watermarking method using high frequency components to guide the insertion process in the spatial domain. Lectures Notes in Computer Science. Springer Verlang, Ljubljana, Slovenia (1999).
-
(1999)
Lectures Notes in Computer Science
-
-
Goirizelaia, I.1
Unzilla, J.J.2
-
11
-
-
33644600904
-
Information Hiding: Techniques for steganography and digital watermarking
-
Katzenbesisser, S. Peticolas, F.A.P.: Information Hiding: techniques for steganography and digital watermarking. Artech House (2000).
-
(2000)
Artech House
-
-
Katzenbesisser, S.1
Peticolas, F.A.P.2
-
13
-
-
84957877979
-
Attacks on copyright marking systems
-
Springer-Verlag, Portland Oregon, USA
-
Peticolas, F.A.P., Anderson, R.J., Jun, M.G.: Attacks on copyright marking systems. Lecture Notes in Computer Science, Vol. 1525. Springer-Verlag, Portland Oregon, USA (1998) 415-438
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 415-438
-
-
Peticolas, F.A.P.1
Anderson, R.J.2
Jun, M.G.3
-
14
-
-
0032074580
-
Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications
-
Craver, S. Memon, B., Yeo, L. Yeung, M.M.: Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications. IEEE Journal of Selected Areas in Communication, 16 (1998). 573-586.
-
(1998)
IEEE Journal of Selected Areas in Communication
, vol.16
, pp. 573-586
-
-
Craver, S.1
Memon, B.2
Yeo, L.3
Yeung, M.M.4
-
15
-
-
0035417219
-
Attacks on digital watermarks: Classification, estimation-based attacks and benchmarks
-
Voloshynovskiy, S., Pereira, S., Pun, T.: Attacks on digital watermarks: classification, estimation-based attacks and benchmarks. IEEE Communications Magazine, Vol 39 (2001).
-
(2001)
IEEE Communications Magazine
, vol.39
-
-
Voloshynovskiy, S.1
Pereira, S.2
Pun, T.3
-
16
-
-
35048859617
-
-
Amenaza Technologies Limited. http://www.amenaza.com
-
-
-
|