-
1
-
-
85032752384
-
Digital watermarking for DVD video copy protection
-
Sep
-
M. Maes, T. Kalker, J.-P. Linnartz, J. Talstra, F. Depovere, and J. Haitsma, "Digital watermarking for DVD video copy protection," IEEE Signal Process. Mag., vol. 17, no. 5, pp. 47-57, Sep. 2000.
-
(2000)
IEEE Signal Process. Mag
, vol.17
, Issue.5
, pp. 47-57
-
-
Maes, M.1
Kalker, T.2
Linnartz, J.-P.3
Talstra, J.4
Depovere, F.5
Haitsma, J.6
-
2
-
-
85032751517
-
Digital rights management in consumer electronics products
-
Feb
-
W. Jonker and J.-P. Linnartz, "Digital rights management in consumer electronics products," IEEE Signal Process. Mag., vol. 21, no. 2, pp. 82-91, Feb. 2004.
-
(2004)
IEEE Signal Process. Mag
, vol.21
, Issue.2
, pp. 82-91
-
-
Jonker, W.1
Linnartz, J.-P.2
-
3
-
-
49549109669
-
-
Chicago man arrested for criminal copyright infringement in connection with prohibited release of major motion pictures, many prior to their theatrical release, U.S. Dept. Justice Press Release, 2004 [Online]. Available: http://www.justice.gov/criminal/cybercrime/spragueArrest.htm.
-
"Chicago man arrested for criminal copyright infringement in connection with prohibited release of major motion pictures, many prior to their theatrical release," U.S. Dept. Justice Press Release, 2004 [Online]. Available: http://www.justice.gov/criminal/cybercrime/spragueArrest.htm.
-
-
-
-
4
-
-
49549103163
-
-
Digital cinema system specification V1.1, Digital Cinema Initiatives, LLC, 2007 [Online]. Available: http://www.dci-movies.com/ DCI_DCinema_System_Spec_v1_1.pdf, Std
-
"Digital cinema system specification V1.1," Digital Cinema Initiatives, LLC, 2007 [Online]. Available: http://www.dci-movies.com/ DCI_DCinema_System_Spec_v1_1.pdf, Std
-
-
-
-
5
-
-
30844455362
-
Electronic content delivery and forensic watermarking
-
Dec
-
M. van der Veen, A. Lemma, and T. Kalker, "Electronic content delivery and forensic watermarking," ACM Multimedia Syst. J., vol. 11, no. 2, Dec. 2005.
-
(2005)
ACM Multimedia Syst. J
, vol.11
, Issue.2
-
-
van der Veen, M.1
Lemma, A.2
Kalker, T.3
-
6
-
-
36348943848
-
A method and apparatus for generating multiple watermarked copies of an information signal
-
J. Crowcroft, C. Perkins, and I. Brown, "A method and apparatus for generating multiple watermarked copies of an information signal," WO Patent/56059, 2000.
-
(2000)
WO Patent/56059
-
-
Crowcroft, J.1
Perkins, C.2
Brown, I.3
-
8
-
-
49549121884
-
-
J. Benaloh, Key compression and its application to digital finger-printing, Microsoft Res., Tech. Rep., 2000, see also U.S. 6 886 098.
-
J. Benaloh, "Key compression and its application to digital finger-printing," Microsoft Res., Tech. Rep., 2000, see also U.S. 6 886 098.
-
-
-
-
9
-
-
84904254949
-
Large scale distributed watermarking of multicast media through encryption
-
R. Parviainen and P. Parnes, "Large scale distributed watermarking of multicast media through encryption," in Proc. IFIP TC6 TC11, 2001, pp. 149-158.
-
(2001)
Proc. IFIP TC6 TC11
, pp. 149-158
-
-
Parviainen, R.1
Parnes, P.2
-
10
-
-
33750560169
-
Attacks and forensic analysis for multimedia content protection
-
presented at the, Amsterdam, The Netherlands
-
H. Jin and J. Lotspiech, "Attacks and forensic analysis for multimedia content protection," presented at the Int. Conf. Multimedia Expo., Amsterdam, The Netherlands, 2005.
-
(2005)
Int. Conf. Multimedia Expo
-
-
Jin, H.1
Lotspiech, J.2
-
11
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
Sep
-
D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," IEEE Trans. Inf. Theory, vol. 44, no. 5, pp. 1897-1905, Sep. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
13
-
-
4544310181
-
A secure multicast protocol with copyright protection
-
Apr
-
H. Chu, L. Qiao, and K. Nahrstedt, "A secure multicast protocol with copyright protection," ACM Comp. Commun. Rev., vol. 32, no. 2, pp. 42-60, Apr. 2002.
-
(2002)
ACM Comp. Commun. Rev
, vol.32
, Issue.2
, pp. 42-60
-
-
Chu, H.1
Qiao, L.2
Nahrstedt, K.3
-
14
-
-
11144253373
-
Video fingerprinting and encryption principles for digital rights management
-
Jun
-
D. Kundur and K. Karthik, "Video fingerprinting and encryption principles for digital rights management," Proc. IEEE, vol. 92, no. 6, pp. 918-932, Jun. 2004.
-
(2004)
Proc. IEEE
, vol.92
, Issue.6
, pp. 918-932
-
-
Kundur, D.1
Karthik, K.2
-
15
-
-
33845398262
-
Secure watermark embedding through partial encryption
-
A. Lemma, S. Katzenbeisser, M. Celik, and M. van der Veen, "Secure watermark embedding through partial encryption," in Proc. Int. Workshop Digital Watermarking, 2006, vol. 4283, pp. 433-445.
-
(2006)
Proc. Int. Workshop Digital Watermarking
, vol.4283
, pp. 433-445
-
-
Lemma, A.1
Katzenbeisser, S.2
Celik, M.3
van der Veen, M.4
-
16
-
-
84947921901
-
Chameleon - A new kind of stream cipher
-
London, U.K
-
R. J. Anderson and C. Manifavas, "Chameleon - A new kind of stream cipher," in Proc. 4th Int. Workshop Fast Software Encryption, London, U.K., 1997, pp. 107-113.
-
(1997)
Proc. 4th Int. Workshop Fast Software Encryption
, pp. 107-113
-
-
Anderson, R.J.1
Manifavas, C.2
-
17
-
-
33746371748
-
Fingercasting - Joint fingerprinting and decryption of broadcast messages
-
A. Adelsbach, U. Huber, and A.-R. Sadeghi, "Fingercasting - Joint fingerprinting and decryption of broadcast messages," in Proc. 11th Australasian Conf. Information Security Privacy, 2006, vol. 4058, pp. 136-147.
-
(2006)
Proc. 11th Australasian Conf. Information Security Privacy
, vol.4058
, pp. 136-147
-
-
Adelsbach, A.1
Huber, U.2
Sadeghi, A.-R.3
-
18
-
-
0042826822
-
Independent component analysis: Algorithms and applications
-
A. Hyvärinen and E. Oja, "Independent component analysis: Algorithms and applications," Neural Netw., vol. 13, no. 4-5, pp. 411-430, 2000.
-
(2000)
Neural Netw
, vol.13
, Issue.4-5
, pp. 411-430
-
-
Hyvärinen, A.1
Oja, E.2
-
19
-
-
0000230675
-
Attacks on copyright marking systems
-
Portland, OR, Apr
-
F. Petitcolas, R. Anderson, and M. Kuhn, "Attacks on copyright marking systems," in Proc. Information Hiding, 2nd Int. Workshop, Portland, OR, Apr. 1998, pp. 219-239.
-
(1998)
Proc. Information Hiding, 2nd Int. Workshop
, pp. 219-239
-
-
Petitcolas, F.1
Anderson, R.2
Kuhn, M.3
-
22
-
-
0023364252
-
Real-valued fast fourier transform algorithms
-
Jun
-
H. Sorensen, D. Jones, M. Heideman, and C. Burrus, "Real-valued fast fourier transform algorithms," IEEE Trans. Signal Process., vol. SP-35, no. 6, pp. 849-863, Jun. 1987.
-
(1987)
IEEE Trans. Signal Process
, vol.SP-35
, Issue.6
, pp. 849-863
-
-
Sorensen, H.1
Jones, D.2
Heideman, M.3
Burrus, C.4
|