-
1
-
-
20744446893
-
Advances in digital video content protection
-
Jan
-
E. I. Lin, A. M. Eskicioglu, R. L. Lagendijk, and E. J. Delp, "Advances in digital video content protection," Proc. IEEE, vol. 93, no. 1, pp. 171-183, Jan. 2005.
-
(2005)
Proc. IEEE
, vol.93
, Issue.1
, pp. 171-183
-
-
Lin, E.I.1
Eskicioglu, A.M.2
Lagendijk, R.L.3
Delp, E.J.4
-
2
-
-
33751521640
-
A secure and robust authentication scheme for video transcoding
-
Oct
-
Q. Sun, D. He, and Q. Tian, "A secure and robust authentication scheme for video transcoding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 10, pp. 1232-1244, Oct. 2006.
-
(2006)
IEEE Trans. Circuits Syst. Video Technol
, vol.16
, Issue.10
, pp. 1232-1244
-
-
Sun, Q.1
He, D.2
Tian, Q.3
-
3
-
-
34250017964
-
Commutative encryption and watermarking in compressed video data
-
Jun
-
S. Lian, Z. Liu, Z. Ren, and H. Wang, "Commutative encryption and watermarking in compressed video data," IEEE Circuits Syst. Video Technol., vol. 17, no. 6, pp. 774-778, Jun. 2007.
-
(2007)
IEEE Circuits Syst. Video Technol
, vol.17
, Issue.6
, pp. 774-778
-
-
Lian, S.1
Liu, Z.2
Ren, Z.3
Wang, H.4
-
4
-
-
0032656890
-
Copy protection for digital video
-
Jul
-
J. A. Bloom, I. J. Cox, T. Kalker, J. P. Linnartz, M. L. Miller, and C. B. Traw, "Copy protection for digital video," Proc. IEEE, vol. 87, no. 7, pp. 1267-1276, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1267-1276
-
-
Bloom, J.A.1
Cox, I.J.2
Kalker, T.3
Linnartz, J.P.4
Miller, M.L.5
Traw, C.B.6
-
5
-
-
11144253373
-
Video fingerprinting and encryption principles for digital rights management
-
Jun
-
D. Kundur and K. Karthik, "Video fingerprinting and encryption principles for digital rights management," Proc. IEEE, vol. 92, no. 6, pp. 918-932, Jun. 2004.
-
(2004)
Proc. IEEE
, vol.92
, Issue.6
, pp. 918-932
-
-
Kundur, D.1
Karthik, K.2
-
6
-
-
78649879843
-
Secure distribution scheme for compressed data streams
-
Oct
-
S. Lian, Z. Liu, Z. Ren, and H. Wang, "Secure distribution scheme for compressed data streams," in Proc. IEEE Conf. Image Process. (ICIP 2006), Oct. 2006, pp. 1953-1956.
-
(2006)
Proc. IEEE Conf. Image Process. (ICIP 2006)
, pp. 1953-1956
-
-
Lian, S.1
Liu, Z.2
Ren, Z.3
Wang, H.4
-
7
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
Sep
-
D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," IEEE Trans. Inf. Theory, vol. 44, no. 5, pp. 1897-1905, Sep. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
8
-
-
85032751604
-
Collusion-resistant fingerprinting for multimedia
-
Mar
-
M. Wu, W. Trappe, Z. J. Wang, and R. Liu, "Collusion-resistant fingerprinting for multimedia," IEEE Signal Process. Mag., pp. 15-27, Mar. 2004.
-
(2004)
IEEE Signal Process. Mag
, pp. 15-27
-
-
Wu, M.1
Trappe, W.2
Wang, Z.J.3
Liu, R.4
-
9
-
-
20444458352
-
Short n-secure fingerprinting code for image
-
W. Kim and Y. Sun, "Short n-secure fingerprinting code for image," in Proc. Int. Conf. Image Process., 2004, pp. 2167-2170.
-
(2004)
Proc. Int. Conf. Image Process
, pp. 2167-2170
-
-
Kim, W.1
Sun, Y.2
-
10
-
-
33646766143
-
Linear combination collusion attack and its application on an anti-collusion fingerprinting
-
Y. Wu, "Linear combination collusion attack and its application on an anti-collusion fingerprinting," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., 2005, vol. 2, pp. 13-16.
-
(2005)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process
, vol.2
, pp. 13-16
-
-
Wu, Y.1
-
11
-
-
33845439916
-
Desynchronization in compression process for collusion resilient video fingerprint
-
Z. Liu, S. Lian, R. Wang, and Z. Ren, "Desynchronization in compression process for collusion resilient video fingerprint," in Proc. Int. Workshop Digital Watermarking (IWDW2006), 2006, pp. 308-322.
-
(2006)
Proc. Int. Workshop Digital Watermarking (IWDW2006)
, pp. 308-322
-
-
Liu, Z.1
Lian, S.2
Wang, R.3
Ren, Z.4
-
12
-
-
84947921901
-
Chamleon-A new kind of stream cipher
-
Berlin, Germany: Springer-Verlag
-
R. Anderson and C. Manifavas, "Chamleon-A new kind of stream cipher," in Lecture Notes in Computer Science, Fast Software Encryption. Berlin, Germany: Springer-Verlag, 1997, pp. 107-113.
-
(1997)
Lecture Notes in Computer Science, Fast Software Encryption
, pp. 107-113
-
-
Anderson, R.1
Manifavas, C.2
-
13
-
-
33845398262
-
Secure watermark embedding through partial encryption
-
A. N. Lemma, S. Katzenbeisser, M. U. Celik, and M. V. Veen, "Secure watermark embedding through partial encryption," in Proc. Int. Workshop Digital Watermarking (IWDW 2006), 2006, vol. 4283, pp. 433-445.
-
(2006)
Proc. Int. Workshop Digital Watermarking (IWDW 2006)
, vol.4283
, pp. 433-445
-
-
Lemma, A.N.1
Katzenbeisser, S.2
Celik, M.U.3
Veen, M.V.4
-
14
-
-
33746989201
-
Secure advanced video coding based on selective encryption algorithms
-
May
-
S. Lian, Z. Liu, Z. Ren, and H. Wang, "Secure advanced video coding based on selective encryption algorithms," IEEE Trans. Consumer Electron., vol. 52, no. 2, pp. 621-629, May 2006.
-
(2006)
IEEE Trans. Consumer Electron
, vol.52
, Issue.2
, pp. 621-629
-
-
Lian, S.1
Liu, Z.2
Ren, Z.3
Wang, H.4
-
16
-
-
0034270707
-
Embedding image watermarks in DC components
-
Sep
-
J. Huang, Y. Q. Shi, and Y. Shi, "Embedding image watermarks in DC components," IEEE Trans. Circuits Syst. Video Technol., vol. 10, no. 6, pp. 974-979, Sep. 2000.
-
(2000)
IEEE Trans. Circuits Syst. Video Technol
, vol.10
, Issue.6
, pp. 974-979
-
-
Huang, J.1
Shi, Y.Q.2
Shi, Y.3
-
17
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Dec
-
I. Cox, J. Kilian, F. Leighton, and F. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Process
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.1
Kilian, J.2
Leighton, F.3
Shamoon, F.4
|