메뉴 건너뛰기




Volumn 4437 LNCS, Issue , 2007, Pages 26-41

A cryptographic method for secure watermark detection

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION DISSEMINATION; NETWORK SECURITY; PROBLEM SOLVING; PUBLIC KEY CRYPTOGRAPHY; VECTOR QUANTIZATION;

EID: 38049127378     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74124-4_3     Document Type: Conference Paper
Times cited : (3)

References (18)
  • 1
    • 78651071103 scopus 로고    scopus 로고
    • Zero-knowledge watermark detection and proof of ownership
    • Workshop
    • Adelsbach, A., Sadeghi, A.: Zero-knowledge watermark detection and proof of ownership. In: Information Hiding Workshop (2000)
    • (2000) Information Hiding
    • Adelsbach, A.1    Sadeghi, A.2
  • 4
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans, on Information Theory 47(4), 1423-1443 (2001)
    • (2001) IEEE Trans, on Information Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2
  • 9
    • 38049136724 scopus 로고    scopus 로고
    • Koblitz, N.: A Course in Number Theory and Cryptography. Springer, Heidelberg (1994)
    • Koblitz, N.: A Course in Number Theory and Cryptography. Springer, Heidelberg (1994)
  • 10
    • 38049129396 scopus 로고    scopus 로고
    • Kocher, P.: Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: Crypto (1996)
    • Kocher, P.: Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: Crypto (1996)
  • 12
    • 38049129397 scopus 로고    scopus 로고
    • Jaffe, J., Kocher, P., Jun, B.: Differential power analysis: Leaking secrets. In: Crypto, Springer, Heidelberg (1999)
    • Jaffe, J., Kocher, P., Jun, B.: Differential power analysis: Leaking secrets. In: Crypto, Springer, Heidelberg (1999)
  • 13
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Springer, Heidelberg
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of Eurocrypt '99, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
    • (1999) Proceedings of Eurocrypt '99 , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 14
    • 38049110438 scopus 로고    scopus 로고
    • Security of public watermarking schemes for binary sequences
    • Workshop
    • Chang, E.C., Li, Q.: Security of public watermarking schemes for binary sequences. In: Information Hiding Workshop (2002)
    • (2002) Information Hiding
    • Chang, E.C.1    Li, Q.2
  • 15
    • 0002908662 scopus 로고    scopus 로고
    • A generalisation, a simplification and some applications of paillier's probabilistic public-key system
    • Damgård, I., Jurik, M.: A generalisation, a simplification and some applications of paillier's probabilistic public-key system. In: Proc. of Public Key Cryptography (2001)
    • (2001) Proc. of Public Key Cryptography
    • Damgård, I.1    Jurik, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.