-
1
-
-
0035307977
-
A buyer-seller watermarking protocol
-
Apr
-
N. Memon and P. Wang, "A buyer-seller watermarking protocol," IEEE Trans. Image Process., vol. 10, no. 4, pp. 643-649, Apr. 2001.
-
(2001)
IEEE Trans. Image Process
, vol.10
, Issue.4
, pp. 643-649
-
-
Memon, N.1
Wang, P.2
-
2
-
-
35248849802
-
-
H. Ju, H.-Y. Kim, D. Lee, and J. Lim, An anonymous buyer-seller watermarking protocol with, anonymity control, in Information Security and Cryptology, ser. Lect. Notes Comput. Sci. Berlin, Germany: Springer, 2002, 2587, pp. 421-432.
-
H. Ju, H.-Y. Kim, D. Lee, and J. Lim, "An anonymous buyer-seller watermarking protocol with, anonymity control," in Information Security and Cryptology, ser. Lect. Notes Comput. Sci. Berlin, Germany: Springer, 2002, vol. 2587, pp. 421-432.
-
-
-
-
3
-
-
0242372124
-
-
J.-J. Choi, K. Sakurai, and J.-H. Park, Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party, in Proc. 1st Int. Conf. Applied Cryptography and Network Security, ser. Lect. Notes Comput. Sci. Berlin, Germany: Springer, 2003, 2846, pp. 265-279.
-
J.-J. Choi, K. Sakurai, and J.-H. Park, "Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party," in Proc. 1st Int. Conf. Applied Cryptography and Network Security, ser. Lect. Notes Comput. Sci. Berlin, Germany: Springer, 2003, vol. 2846, pp. 265-279.
-
-
-
-
4
-
-
23944484484
-
-
J.-G. Choi and J.-H. Park, A generalization of an anonymous buyer-seller watermarking protocol and its application to mobile communications, in Proc. 3rd Int. Workshop Digital Watermarking, ser. Lect. Notes Comput. Sci. Berlin, Germany: Springer, 2004, 3304, pp. 232-243.
-
J.-G. Choi and J.-H. Park, "A generalization of an anonymous buyer-seller watermarking protocol and its application to mobile communications," in Proc. 3rd Int. Workshop Digital Watermarking, ser. Lect. Notes Comput. Sci. Berlin, Germany: Springer, 2004, vol. 3304, pp. 232-243.
-
-
-
-
5
-
-
56749084074
-
An efficient and anonymous buyer-seller watermarking protocol
-
Apr
-
C. Lei, P. Yu, P. Tsai, and M. Chan, "An efficient and anonymous buyer-seller watermarking protocol," IEEE Trans. Image. Process., vol. 10, no. 4, pp. 643-649, Apr. 2004.
-
(2004)
IEEE Trans. Image. Process
, vol.10
, Issue.4
, pp. 643-649
-
-
Lei, C.1
Yu, P.2
Tsai, P.3
Chan, M.4
-
6
-
-
28844473947
-
Fingerprinting protocol for images based on additive homomorphic property
-
Dec
-
M. Kuribayashi and H. Tanaka, "Fingerprinting protocol for images based on additive homomorphic property," IEEE Trans. Image. Process., vol. 14, no. 12, pp. 2129-2139, Dec. 2005.
-
(2005)
IEEE Trans. Image. Process
, vol.14
, Issue.12
, pp. 2129-2139
-
-
Kuribayashi, M.1
Tanaka, H.2
-
7
-
-
34548079525
-
Watermarking protocol for web context
-
Sep
-
F. Frattolillo, "Watermarking protocol for web context," IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 350-363, Sep. 2007.
-
(2007)
IEEE Trans. Inf. Forensics Security
, vol.2
, Issue.3
, pp. 350-363
-
-
Frattolillo, F.1
-
8
-
-
11144253373
-
Video fingerprinting and encryption principles for digital rights management
-
Jun
-
D. Kundur, "Video fingerprinting and encryption principles for digital rights management," Proc. IEEE, vol. 92, no. 6, pp. 918-932, Jun. 2004.
-
(2004)
Proc. IEEE
, vol.92
, Issue.6
, pp. 918-932
-
-
Kundur, D.1
-
9
-
-
33746371748
-
-
A. Adelsbach, U. Huber, and A.-R. Sadeghi, Fingercasting-joint fingerprinting and decryption of broadcast messages, in Proc. 11th Australasian Conf Information Security Privacy, ser. Lect. Notes Comput. Sci. Berlin, Germany: Springer, 2006, 4058, pp. 136-147.
-
A. Adelsbach, U. Huber, and A.-R. Sadeghi, "Fingercasting-joint fingerprinting and decryption of broadcast messages," in Proc. 11th Australasian Conf Information Security Privacy, ser. Lect. Notes Comput. Sci. Berlin, Germany: Springer, 2006, vol. 4058, pp. 136-147.
-
-
-
-
10
-
-
33845398262
-
-
A. Lemma, S. Katzenbeisser, M. Celik, and M. van der Veen, Secure watermark embedding through partial encryption, in Proc. 5th Int. Workshop Digital Watermarking, ser. Lect. Notes Comput. Sci. Berlin, Germany: Springer, 2006, 4283, pp. 433-445.
-
A. Lemma, S. Katzenbeisser, M. Celik, and M. van der Veen, "Secure watermark embedding through partial encryption," in Proc. 5th Int. Workshop Digital Watermarking, ser. Lect. Notes Comput. Sci. Berlin, Germany: Springer, 2006, vol. 4283, pp. 433-445.
-
-
-
-
11
-
-
34547554409
-
Secure embedding of spread spectrum watermarks using look-up-tables
-
M. Celik, A. Lemma, S. Katzenbeisser, and M. van der Veen, "Secure embedding of spread spectrum watermarks using look-up-tables," in Proc. IEEE Int. Conf. Acoustics, Speech Signal Processing, 2007, pp. 153-156.
-
(2007)
Proc. IEEE Int. Conf. Acoustics, Speech Signal Processing
, pp. 153-156
-
-
Celik, M.1
Lemma, A.2
Katzenbeisser, S.3
van der Veen, M.4
-
13
-
-
4344565049
-
-
D. Kirovski, H. Malvar, and Y. Yacobi, A dual watermark-fingerprint system, IEEE Multimedia, 11, no. 3, pp. 59-73, Jul.-Sep. 2004, also see U.S. patent application 2005/0 660 550.
-
D. Kirovski, H. Malvar, and Y. Yacobi, "A dual watermark-fingerprint system," IEEE Multimedia, vol. 11, no. 3, pp. 59-73, Jul.-Sep. 2004, (also see U.S. patent application 2005/0 660 550.
-
-
-
|