메뉴 건너뛰기




Volumn 3311, Issue , 2004, Pages 264-275

Application of 'attack trees' technique to copyright protection protocols using watermarking and definition of a new transactions protocol secdp (secure distribution protocol)

Author keywords

[No Author keywords available]

Indexed keywords

FORESTRY; MOBILE SECURITY; RISK ANALYSIS; RISK ASSESSMENT; WATERMARKING;

EID: 35048855032     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30493-7_24     Document Type: Article
Times cited : (7)

References (16)
  • 1
    • 0034769637 scopus 로고    scopus 로고
    • Unified approach of asymmetric watermarking schemes. Security and watermarking of multimedia contents III
    • P.W. WONG and E. Delp, eds.
    • Furon, T., Venturini, I., Duhamel, P. Unified approach of asymmetric watermarking schemes. Security and watermarking of multimedia contents III, P.W. WONG and E. Delp, eds., Proc. SPIE, col 4314 (2001), pp 269-279.
    • (2001) Proc. SPIE , vol.4314 , pp. 269-279
    • Furon, T.1    Venturini, I.2    Duhamel, P.3
  • 3
    • 0032155522 scopus 로고    scopus 로고
    • Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights
    • Qian, L. Nahrstedt, K. Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights. Journal of Visual Communications and Image Representation, Vol. 9. No. 3 (1998) 194-202.
    • (1998) Journal of Visual Communications and Image Representation , vol.9 , Issue.3 , pp. 194-202
    • Qian, L.1    Nahrstedt, K.2
  • 4
    • 85013705270 scopus 로고    scopus 로고
    • A Buyer- Seller Watermarking Protocol
    • Electronic Proceedings. Los Angeles, USA
    • Memon, N., Wong, P. A Buyer- Seller Watermarking Protocol, IEEE Signal Processing Society. Electronic Proceedings. Los Angeles, USA (1998).
    • (1998) IEEE Signal Processing Society
    • Memon, N.1    Wong, P.2
  • 6
    • 0005943436 scopus 로고    scopus 로고
    • Modeling security threats
    • Schneier, B. Modeling security threats, Dr. Dobb's Journal (1999). http://www.schneier.com/paper-attacktrees-ddj-ft.html
    • (1999) Dr. Dobb's Journal
    • Schneier, B.1
  • 7
    • 18844415476 scopus 로고    scopus 로고
    • Copyright protection protocols for multimedia distribution based on trusted hardware
    • Cracow, Poland
    • Tomsich, P., Katzenbeisser, S.: Copyright protection protocols for multimedia distribution based on trusted hardware. PROMS 2000. Cracow, Poland (2000). Pag. 249-25
    • (2000) PROMS 2000 , pp. 249-325
    • Tomsich, P.1    Katzenbeisser, S.2
  • 10
    • 84957618930 scopus 로고    scopus 로고
    • A new watermarking method using high frequency components to guide the insertion process in the spatial domain
    • Springer Verlang, Ljubljana, Slovenia
    • Goirizelaia. I., Unzilla, J.J.: A new watermarking method using high frequency components to guide the insertion process in the spatial domain. Lectures Notes in Computer Science. Springer Verlang, Ljubljana, Slovenia (1999).
    • (1999) Lectures Notes in Computer Science
    • Goirizelaia, I.1    Unzilla, J.J.2
  • 11
    • 33644600904 scopus 로고    scopus 로고
    • Information Hiding: Techniques for steganography and digital watermarking
    • Katzenbesisser, S. Peticolas, F.A.P.: Information Hiding: techniques for steganography and digital watermarking. Artech House (2000).
    • (2000) Artech House
    • Katzenbesisser, S.1    Peticolas, F.A.P.2
  • 13
    • 84957877979 scopus 로고    scopus 로고
    • Attacks on copyright marking systems
    • Springer-Verlag, Portland Oregon, USA
    • Peticolas, F.A.P., Anderson, R.J., Jun, M.G.: Attacks on copyright marking systems. Lecture Notes in Computer Science, Vol. 1525. Springer-Verlag, Portland Oregon, USA (1998) 415-438
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 415-438
    • Peticolas, F.A.P.1    Anderson, R.J.2    Jun, M.G.3
  • 14
    • 0032074580 scopus 로고    scopus 로고
    • Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications
    • Craver, S. Memon, B., Yeo, L. Yeung, M.M.: Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications. IEEE Journal of Selected Areas in Communication, 16 (1998). 573-586.
    • (1998) IEEE Journal of Selected Areas in Communication , vol.16 , pp. 573-586
    • Craver, S.1    Memon, B.2    Yeo, L.3    Yeung, M.M.4
  • 15
    • 0035417219 scopus 로고    scopus 로고
    • Attacks on digital watermarks: Classification, estimation-based attacks and benchmarks
    • Voloshynovskiy, S., Pereira, S., Pun, T.: Attacks on digital watermarks: classification, estimation-based attacks and benchmarks. IEEE Communications Magazine, Vol 39 (2001).
    • (2001) IEEE Communications Magazine , vol.39
    • Voloshynovskiy, S.1    Pereira, S.2    Pun, T.3
  • 16
    • 35048859617 scopus 로고    scopus 로고
    • Amenaza Technologies Limited. http://www.amenaza.com


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.