메뉴 건너뛰기




Volumn 2939, Issue , 2004, Pages 355-369

On the insecurity of non-invertible watermarking schemes for dispute resolving

Author keywords

[No Author keywords available]

Indexed keywords

COPYRIGHTS; CRYPTOGRAPHY; DIGITAL WATERMARKING;

EID: 35048855245     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24624-4_27     Document Type: Article
Times cited : (10)

References (16)
  • 1
    • 84947903916 scopus 로고    scopus 로고
    • Proving ownership of digital content
    • Andreas Pfitzmann, editor, Information Hiding - 3rd International Workshop, IH'99, Dresden, Germany, October Springer-Verlag, Berlin Germany
    • André Adelsbach, Birgit Pfitzmann, and Ahmad-Reza Sadeghi. Proving ownership of digital content. In Andreas Pfitzmann, editor, Information Hiding - 3rd International Workshop, IH'99, volume 1768 of Lecture Notes in Computer Science, pages 126-141, Dresden, Germany, October 2000. Springer-Verlag, Berlin Germany.
    • (2000) Lecture Notes in Computer Science , vol.1768 , pp. 126-141
    • Adelsbach, A.1    Pfitzmann, B.2    Sadeghi, A.-R.3
  • 4
    • 84957670625 scopus 로고
    • Collusion-secure fingerprinting for digital data
    • Don Coppersmith, editor, Advances in Cryptology - CRYPTO '95, International Association for Cryptologic Research, Springer-Verlag, Berlin Germany
    • Dan Boneh and James Shaw. Collusion-secure fingerprinting for digital data. In Don Coppersmith, editor, Advances in Cryptology - CRYPTO '95, volume 963 of Lecture Notes in Computer Science, pages 452-465. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1995.
    • (1995) Lecture Notes in Computer Science , vol.963 , pp. 452-465
    • Boneh, D.1    Shaw, J.2
  • 6
    • 0032074580 scopus 로고    scopus 로고
    • Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
    • May
    • Scott Graver, Nasir Memon, Boon-Lock Yeo, and Minerva M. Yeung. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications, 16(4):573-586, May 1998.
    • (1998) IEEE Journal on Selected Areas in Communications , vol.16 , Issue.4 , pp. 573-586
    • Graver, S.1    Memon, N.2    Yeo, B.-L.3    Yeung, M.M.4
  • 11
    • 0031638115 scopus 로고    scopus 로고
    • Watermarking methods for MPEG encoded video: Towards resolving rightful ownership
    • Austin, Texas, USA, IEEE, IEEE, Washington Brussels Tokyo
    • Lintian Qiao and Klara Nahrstedt. Watermarking methods for MPEG encoded video: Towards resolving rightful ownership. In International Conference on Multimedia Computing and Systems (ICMCS), pages 276-285, Austin, Texas, USA, 1998. IEEE, IEEE, Washington Brussels Tokyo.
    • (1998) International Conference on Multimedia Computing and Systems (ICMCS) , pp. 276-285
    • Qiao, L.1    Nahrstedt, K.2
  • 12
    • 0032155522 scopus 로고    scopus 로고
    • Watermarking schemes and protocols for protecting rightful ownerships and customer's rights
    • Lintian Qiao and Klara Nahrstedt. Watermarking schemes and protocols for protecting rightful ownerships and customer's rights. Journal of Visual Communication and Image Representation, 9(3):194-210, 1998.
    • (1998) Journal of Visual Communication and Image Representation , vol.9 , Issue.3 , pp. 194-210
    • Qiao, L.1    Nahrstedt, K.2
  • 13
    • 0010405309 scopus 로고    scopus 로고
    • Image watermarks and counterfeit attacks: Some problems and solutions
    • Newark, NJ, USA, May New Jersey Institute of Technology
    • Mahalingam Ramkumar and Ali Akansu. Image watermarks and counterfeit attacks : Some problems and solutions. In Symposium on Content Security and Data Hiding in Digital Media, pages 102-112, Newark, NJ, USA, May 1999. New Jersey Institute of Technology.
    • (1999) Symposium on Content Security and Data Hiding in Digital Media , pp. 102-112
    • Ramkumar, M.1    Akansu, A.2
  • 14
    • 0032095654 scopus 로고    scopus 로고
    • Multimedia data-embedding and watermarking technologies
    • June
    • Mitchell D. Swanson, Mei Kobayashi, and Ahmed H. Tewfik. Multimedia data-embedding and watermarking technologies. Proceedings of the IEEE, 86(6), June 1998.
    • (1998) Proceedings of the IEEE , vol.86 , Issue.6
    • Swanson, M.D.1    Kobayashi, M.2    Tewfik, A.H.3
  • 16
    • 0031385945 scopus 로고    scopus 로고
    • On resolving rightful ownerships of digital images by invisible watermarks
    • Santa Barbara, CA, USA, October IEEE
    • Wenjun Zeng and Bede Liu. On resolving rightful ownerships of digital images by invisible watermarks. In 4th International Conference on Image Processing (ICIP), pages 552-555, Santa Barbara, CA, USA, October 1997. IEEE.
    • (1997) 4th International Conference on Image Processing (ICIP) , pp. 552-555
    • Zeng, W.1    Liu, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.