-
1
-
-
84890411878
-
Resistance of digital watermarks to collusive attacks
-
IEEE Press
-
Kilian, J., Leighton, F.T., Matheson, L.R., Shamoon, T.G., Tarjan, R.E., Zane, F.s.: Resistance of digital watermarks to collusive attacks. In: ISIT 1998, IEEE Press (1998) 271
-
(1998)
ISIT
, pp. 271
-
-
Kilian, J.1
Leighton, F.T.2
Matheson, L.R.3
Shamoon, T.G.4
Tarjan, R.E.5
Zane, F.S.6
-
2
-
-
0242581588
-
-
Adelsbach, A., Sadeghi, A.R.: Advanced techniques for dispute resolving and authorship proofs on digital works. In Delp, E.J., Wong, P.W., eds.: Electronic Imaging 2003, Security and Watermarking of Multimedia Contents. 5020., The Society for Imaging Science and Technology (IS&T) and the International Society for Optical Engineering (SPIE) (2003) 677-688
-
Adelsbach, A., Sadeghi, A.R.: Advanced techniques for dispute resolving and authorship proofs on digital works. In Delp, E.J., Wong, P.W., eds.: Electronic Imaging 2003, Security and Watermarking of Multimedia Contents. Volume 5020., The Society for Imaging Science and Technology (IS&T) and the International Society for Optical Engineering (SPIE) (2003) 677-688
-
-
-
-
3
-
-
35048815999
-
-
Adelsbach, A., Pfitzmann, B., Sadeghi, A.R.: Proving ownership of digital content. [31] 126-141
-
Proving ownership of digital content
, vol.31
, pp. 126-141
-
-
Adelsbach, A.1
Pfitzmann, B.2
Sadeghi, A.R.3
-
4
-
-
84944404911
-
-
Adelsbach, A., Sadeghi, A.R.: Zero-knowledge watermark detection and proof of ownership. In: Information Hiding, IHW 2001. 2137 of LNCS., Springer, Germany (2001) 273-288
-
Adelsbach, A., Sadeghi, A.R.: Zero-knowledge watermark detection and proof of ownership. In: Information Hiding, IHW 2001. Volume 2137 of LNCS., Springer, Germany (2001) 273-288
-
-
-
-
6
-
-
0347805752
-
Protocols for watermark verification
-
Gopalakrishnan, K., Memon, N., Vora, P.: Protocols for watermark verification. In: Multimedia and Security, Workshop at ACM Multimedia. (1999) 91-94
-
(1999)
Multimedia and Security, Workshop at ACM Multimedia
, pp. 91-94
-
-
Gopalakrishnan, K.1
Memon, N.2
Vora, P.3
-
7
-
-
1442357607
-
Watermark detection with zeroknowledge disclosure
-
Adelsbach, A., Katzenbeisser, S., Sadeghi, A.R.: Watermark detection with zeroknowledge disclosure. ACM Multimedia Systems Journal, Special Issue on Multimedia Security 9 (2003) 266-278
-
(2003)
ACM Multimedia Systems Journal, Special Issue on Multimedia Security
, vol.9
, pp. 266-278
-
-
Adelsbach, A.1
Katzenbeisser, S.2
Sadeghi, A.R.3
-
8
-
-
0032688251
-
Statistical analysis of watermarking schemes for copyright protection of images
-
Hernandez, J., Perez-Gonzales, F.: Statistical analysis of watermarking schemes for copyright protection of images. In: Proceedings of the IEEE. Volume 87. (1999) 1142-1166
-
(1999)
Proceedings of the IEEE
, vol.87
, pp. 1142-1166
-
-
Hernandez, J.1
Perez-Gonzales, F.2
-
9
-
-
84947937393
-
A secure, robust watermark for multimedia
-
Information Hiding, First International Workshop, IH'96. of, Springer Verlag
-
Cox, I., Kilián, J., Leighton, T., Shamoon, T.: A secure, robust watermark for multimedia. In: Information Hiding - First International Workshop, IH'96. Volume 1174 of LNCS., Springer Verlag (1996) 175-190
-
(1996)
LNCS
, vol.1174
, pp. 175-190
-
-
Cox, I.1
Kilián, J.2
Leighton, T.3
Shamoon, T.4
-
10
-
-
0032072250
-
A dct-domain system for robust image watermarking
-
Barni, M., Bartolini, F., Cappellini, V., Piva, A.: A dct-domain system for robust image watermarking. Signal Processing - Special Issue in Copyright Protection and Access Control for Multimedia Services 66 (1998) 357-372
-
(1998)
Signal Processing - Special Issue in Copyright Protection and Access Control for Multimedia Services
, vol.66
, pp. 357-372
-
-
Barni, M.1
Bartolini, F.2
Cappellini, V.3
Piva, A.4
-
11
-
-
38549143490
-
Security engineering for zero-knowledge watermark detection
-
Montreux, Switzerland
-
Adelsbach, A., Rohe, M., Sadeghi, A.R.: Security engineering for zero-knowledge watermark detection. In: Special Session on Media Security - WIAMIS 2005, Montreux, Switzerland (2005) 13-15
-
(2005)
Special Session on Media Security - WIAMIS 2005
, pp. 13-15
-
-
Adelsbach, A.1
Rohe, M.2
Sadeghi, A.R.3
-
12
-
-
33646128241
-
-
Adelsbach, A., Rohe, M., Sadeghi, A.R.: Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme. In Dittmann, J., Katzenbeisser, S., Uhl, A., eds.: CMS 2005. 3677 of LNCS., Springer (2005) 129-139
-
Adelsbach, A., Rohe, M., Sadeghi, A.R.: Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme. In Dittmann, J., Katzenbeisser, S., Uhl, A., eds.: CMS 2005. Volume 3677 of LNCS., Springer (2005) 129-139
-
-
-
-
13
-
-
35048902439
-
An implementation of, and attacks on, zeroknowledge watermarking
-
Friedrich, J, ed, Information Hiding-6th International Workshop, IHW, of, Springer Verlag
-
Craver, S., Liu, B., Wolf, W.: An implementation of, and attacks on, zeroknowledge watermarking. In Friedrich, J., ed.: Information Hiding-6th International Workshop, IHW 2004. Volume 3200 of LNCS., Springer Verlag (2004) 1-12
-
(2004)
LNCS
, vol.3200
, pp. 1-12
-
-
Craver, S.1
Liu, B.2
Wolf, W.3
-
14
-
-
1442310343
-
Commitment schemes and zero-knowledge protocols
-
Damgård, I, ed, Lectures on data security: modern cryptology in theory and practise. of, Springer Verlag
-
Damgård, I.: Commitment schemes and zero-knowledge protocols. In Damgård, I., ed.: Lectures on data security: modern cryptology in theory and practise. Volume 1561 of LNCS. Springer Verlag (1998) 63-86
-
(1998)
LNCS
, vol.1561
, pp. 63-86
-
-
Damgård, I.1
-
15
-
-
38549147291
-
-
Master's thesis, Delft University of Technology and Philips Research Laboratories, Eindhoven
-
Jin, Y.: Zero knowledge watermark detection. Master's thesis, Delft University of Technology and Philips Research Laboratories, Eindhoven (2004)
-
(2004)
Zero knowledge watermark detection
-
-
Jin, Y.1
-
16
-
-
0031354216
-
Dct-based watermark recovering without resorting to the uncorrupted original image
-
Santa Barbara, CA, USA, IEEE
-
Piva, A., Barni, M., Bartolini, F., Cappellini, V.: Dct-based watermark recovering without resorting to the uncorrupted original image. In: Proceedings of ICIP97. Volume I., Santa Barbara, CA, USA, IEEE (1997) 520-523
-
(1997)
Proceedings of ICIP97
, vol.1
, pp. 520-523
-
-
Piva, A.1
Barni, M.2
Bartolini, F.3
Cappellini, V.4
-
18
-
-
0007751316
-
Analysis of the sensitivity attack against electronic watermarks in images
-
Aucsmith, D, ed, Information Hiding-Second International Workshop, IH'98. of, Portland Oregon, USA, Springer Verlag
-
Linnartz, J.P.M.G., van Dijk, M.: Analysis of the sensitivity attack against electronic watermarks in images. In Aucsmith, D., ed.: Information Hiding-Second International Workshop, IH'98. Volume 1525 of LNCS., Portland Oregon, USA, Springer Verlag (1998) 258-272
-
(1998)
LNCS
, vol.1525
, pp. 258-272
-
-
Linnartz, J.P.M.G.1
van Dijk, M.2
-
19
-
-
33646182640
-
The return of the sensitivity attack
-
Barni, M, Cox, I, Kalker, T, Kim, H.J, eds, Digital Watermarking: 4th International Workshop, IWDW, of, Springer
-
Comesaña, P., Pérez-Freire, L., Pérez- González, F.: The return of the sensitivity attack. In Barni, M., Cox, I., Kalker, T., Kim, H.J., eds.: Digital Watermarking: 4th International Workshop, IWDW 2005. Volume 3710 of Lecture Notes in Computer Science., Springer (2005) 260-274
-
(2005)
Lecture Notes in Computer Science
, vol.3710
, pp. 260-274
-
-
Comesaña, P.1
Pérez-Freire, L.2
Pérez- González, F.3
-
20
-
-
21844452953
-
-
Choubassi, M.E., Moulin, P.: New sensitivity analysis attack. In Delp, E.J., Wong, P.W., eds.: Security, Steganography, and Watermarking of Multimedia Contents. 5681 of Proceedings of SPIE., SPIE (2005) 734-745
-
Choubassi, M.E., Moulin, P.: New sensitivity analysis attack. In Delp, E.J., Wong, P.W., eds.: Security, Steganography, and Watermarking of Multimedia Contents. Volume 5681 of Proceedings of SPIE., SPIE (2005) 734-745
-
-
-
-
21
-
-
0033314452
-
Exploiting the cross-correlation of rgb-channels for robust watermarking of color images
-
Kobe, Japan, IEEE
-
Piva, A., Barni, M., Bartolini, F., Cappellini, V.: Exploiting the cross-correlation of rgb-channels for robust watermarking of color images. In: Proceedings of 6th IEEE International Conference on Image Processing ICIP99. Volume I., Kobe, Japan, IEEE (1999) 306-310
-
(1999)
Proceedings of 6th IEEE International Conference on Image Processing ICIP99
, vol.1
, pp. 306-310
-
-
Piva, A.1
Barni, M.2
Bartolini, F.3
Cappellini, V.4
-
22
-
-
84958774556
-
-
Damgård, I., Fujisaki, E.: A statistically-hiding integer commitment scheme based on groups with hidden order. In: ASIACRYPT. 2501 of LNCS., Springer (2002) 125-142
-
Damgård, I., Fujisaki, E.: A statistically-hiding integer commitment scheme based on groups with hidden order. In: ASIACRYPT. Volume 2501 of LNCS., Springer (2002) 125-142
-
-
-
-
23
-
-
84948973732
-
Efficient proofs that a committed number lies in an interval
-
Advances in Cryptology, EUROCRYPT, of, Springer Verlag
-
Boudot, F.: Efficient proofs that a committed number lies in an interval. In: Advances in Cryptology - EUROCRYPT '2000. Volume 1807 of LNCS., Springer Verlag (2000) 431-444
-
(2000)
LNCS
, vol.1807
, pp. 431-444
-
-
Boudot, F.1
-
24
-
-
0345058958
-
-
Lipmaa, H.: On diophantine complexity and statistical zero-knowledge arguments. In: ASIACRYPT. 2894 of LNCS., Springer (2003) 398-415
-
Lipmaa, H.: On diophantine complexity and statistical zero-knowledge arguments. In: ASIACRYPT. Volume 2894 of LNCS., Springer (2003) 398-415
-
-
-
-
25
-
-
38549147296
-
-
Lagrange, J.L.: Démonstration d'un Théorème d'Arithmétique. Nouveaux Mémoires de l'Académie royale des Sciences et Belles-Lettres de Berlin (1770) 123-
-
Lagrange, J.L.: Démonstration d'un Théorème d'Arithmétique. Nouveaux Mémoires de l'Académie royale des Sciences et Belles-Lettres de Berlin (1770) 123-
-
-
-
-
26
-
-
38549142196
-
-
Lagrange, J.L. In: Oeuvres de Lagrange. III. Gauthier-Villars (1869) 189-201
-
Lagrange, J.L. In: Oeuvres de Lagrange. Volume III. Gauthier-Villars (1869) 189-201
-
-
-
-
27
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
ACM Press
-
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the ACM CCS, ACM Press (1993) 62-73
-
(1993)
Proceedings of the ACM CCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
28
-
-
84990587369
-
-
Rabin, M.O., Shallit, J.O.: Randomized Algorithms in Number Theory. Communications on Pure and Applied Mathematics 39 (1986) S 239- S 256
-
Rabin, M.O., Shallit, J.O.: Randomized Algorithms in Number Theory. Communications on Pure and Applied Mathematics 39 (1986) S 239- S 256
-
-
-
-
31
-
-
0012085074
-
Information Hiding - 3rd International Workshop, IH'99
-
Pfitzmann, A, ed, of, Dresden, Germany, Springer Verlag
-
Pfitzmann, A., ed.: Information Hiding - 3rd International Workshop, IH'99. Volume 1768 of LNCS., Dresden, Germany, Springer Verlag (2000)
-
(2000)
LNCS
, vol.1768
-
-
-
32
-
-
0000537828
-
Efficient identification and signatures for smarte cards
-
Brassard, G, ed, Advances in Cryptology, CRYPTO. of, Springer
-
Schnorr, C.P.: Efficient identification and signatures for smarte cards. In Brassard, G., ed.: Advances in Cryptology - CRYPTO. Volume 435 of Lecture Notes in Computer Science., Springer (1989) 20-24
-
(1989)
Lecture Notes in Computer Science
, vol.435
, pp. 20-24
-
-
Schnorr, C.P.1
-
33
-
-
84957796827
-
Short proofs of knowledge for factoring
-
Imai, H, Zheng, Y, eds, Public Key Cryptography. of, Springer
-
Poupard, G., Stern, J.: Short proofs of knowledge for factoring. In Imai, H., Zheng, Y., eds.: Public Key Cryptography. Volume 1751 of Lecture Notes in Computer Science., Springer (2000) 147-166
-
(2000)
Lecture Notes in Computer Science
, vol.1751
, pp. 147-166
-
-
Poupard, G.1
Stern, J.2
|