-
1
-
-
0032155522
-
Watermarking schemes and protocols for protecting rightful ownerships and customer's rights
-
L. Qiao and K. Nahrstedt, " Watermarking schemes and protocols for protecting rightful ownerships and customer's rights., " J. Visual Commun. Image Represent 9 (3), 194-210 (1998).
-
(1998)
J. Visual Commun. Image Represent
, vol.9
, Issue.3
, pp. 194-210
-
-
Qiao, L.1
Nahrstedt, K.2
-
2
-
-
0035307977
-
A buyer-seller watermarking protocol
-
N. Memon and P. W. Wong, " A buyer-seller watermarking protocol., " IEEE Trans. Image Process. 10 (4), 643-649 (2001).
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.4
, pp. 643-649
-
-
Memon, N.1
Wong, P.W.2
-
3
-
-
9744242854
-
An efficient and anonymous buyer-seller watermarking protocol
-
C.-L. Lei, P.-L. Yu, P.-L. Tsai, and M.-H. Chan, " An efficient and anonymous buyer-seller watermarking protocol., " IEEE Trans. Image Process. 13 (12), 1618-1626 (2004).
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.12
, pp. 1618-1626
-
-
Lei, C.-L.1
Yu, P.-L.2
Tsai, P.-L.3
Chan, M.-H.4
-
4
-
-
0035472066
-
Protocols for watermark verification
-
K. Gopalakrishnan, N. Memon, and P. L. Vora, " Protocols for watermark verification., " IEEE Multimedia 8 (4), 66-70 (2001).
-
(2001)
IEEE Multimedia
, vol.8
, Issue.4
, pp. 66-70
-
-
Gopalakrishnan, K.1
Memon, N.2
Vora, P.L.3
-
6
-
-
0037851028
-
An asymmetric watermarking method
-
T. Furon and P. Duhamel, " An asymmetric watermarking method., " IEEE Trans. Signal Process. 51 (4), 981-995 (2003).
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.4
, pp. 981-995
-
-
Furon, T.1
Duhamel, P.2
-
7
-
-
1442357607
-
Watermark detection with zero-knowledge disclosure
-
A. Adelsbach, S. Katzenbeisser, and A.-R. Sadeghi, " Watermark detection with zero-knowledge disclosure., " ACM Multimedia Syst. J. 9 (3), 266-278 (2003).
-
(2003)
ACM Multimedia Syst. J.
, vol.9
, Issue.3
, pp. 266-278
-
-
Adelsbach, A.1
Katzenbeisser, S.2
Sadeghi, A.-R.3
-
8
-
-
28844473947
-
Fingerprinting protocol for images based on additive homomorphic property
-
M. Kuribayashi and H. Tanaka, " Fingerprinting protocol for images based on additive homomorphic property., " IEEE Trans. Image Process. 14 (12), 2129-2139 (2005).
-
(2005)
IEEE Trans. Image Process.
, vol.14
, Issue.12
, pp. 2129-2139
-
-
Kuribayashi, M.1
Tanaka, H.2
-
9
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystem
-
R. Rivest, A. Shamir, and L. Adelman, " A method for obtaining digital signatures and public key cryptosystem., " Commun. ACM 21 (2), 120-126 (1978).
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adelman, L.3
-
10
-
-
84956852274
-
A new public-key cryptosystem as secure as factoring
-
T. Okamoto and S. Uchiyama, " A new public-key cryptosystem as secure as factoring., " in Proc. Eurocrypt 1403, 308-318 (1998).
-
(1998)
Proc. Eurocrypt
, vol.1403
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
11
-
-
84942550998
-
Public key cryptosystems based on composite degree residuosity classes
-
P. Paillier, " Public key cryptosystems based on composite degree residuosity classes., " in Proc. Eurocrypt'99, LNCS 1592, 223-238 (1999).
-
(1999)
Proc. Eurocrypt'99
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
12
-
-
9744279131
-
Robust image-adaptive data hiding using erasure and error correction
-
K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, " Robust image-adaptive data hiding using erasure and error correction., " IEEE Trans. Image Process. 13 (12), 1627-1639 (2004).
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.12
, pp. 1627-1639
-
-
Solanki, K.1
Jacobsen, N.2
Madhow, U.3
Manjunath, B.S.4
Chandrasekaran, S.5
|