-
1
-
-
0033701078
-
The water-mark copy attack
-
M. Kutter, S. Voloshynovskiy, and A. Herrigel, "The water-mark copy attack," in Proceedings of the SPIE, Security and Watermarking of Multimedia Contents II, 2000, vol. 3971.
-
(2000)
Proceedings of the SPIE, Security and Watermarking of Multimedia Contents II
, vol.3971
-
-
Kutter, M.1
Voloshynovskiy, S.2
Herrigel, A.3
-
2
-
-
0032074580
-
Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
-
S. Craver, N. Memon, B.L. Yeo, and M.M. Yeung, "Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications," IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 573-586, 1998.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 573-586
-
-
Craver, S.1
Memon, N.2
Yeo, B.L.3
Yeung, M.M.4
-
3
-
-
33744764278
-
Robust and secure image hashing
-
A. Swaminathan, Y. Mao, and M. Wu, "Robust and secure image hashing," IEEE Trans. Information Forensics and Security, vol. 1, no. 2, pp. 215-230, 2006.
-
(2006)
IEEE Trans. Information Forensics and Security
, vol.1
, Issue.2
, pp. 215-230
-
-
Swaminathan, A.1
Mao, Y.2
Wu, M.3
-
4
-
-
85008040083
-
Approximate message authentication codes for n-ary alphabets
-
R. Ge, G. R. Arce, and G. DiCrescenzo, "Approximate message authentication codes for n-ary alphabets," IEEE Trans. on Information Forensics and Security, vol. 1, no. 1, pp. 56-67, 2006.
-
(2006)
IEEE Trans. on Information Forensics and Security
, vol.1
, Issue.1
, pp. 56-67
-
-
Ge, R.1
Arce, G.R.2
DiCrescenzo, G.3
-
5
-
-
33750905324
-
Robust, short and sensitive authentication tags using secure sketch
-
Short paper
-
Q. Li and E.-C. Chang, "Robust, short and sensitive authentication tags using secure sketch," in ACM Multimedia and Security Workshop, 2006, Short paper.
-
(2006)
ACM Multimedia and Security Workshop
-
-
Li, Q.1
Chang, E.-C.2
-
6
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Eurocrypt, of
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Eurocrypt, 2004, vol. 3027 of LNCS, pp. 523-540.
-
(2004)
LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
7
-
-
84947226140
-
A perceptual audio hashing algorithm: A tool for robust audio identification and information hiding
-
Information Hiding Workshop, of
-
M.K. Mihcak and R. Venkatesan, "A perceptual audio hashing algorithm: A tool for robust audio identification and information hiding," in Information Hiding Workshop, 2001, vol. 2137 of LNCS, pp. 51-65.
-
(2001)
LNCS
, vol.2137
, pp. 51-65
-
-
Mihcak, M.K.1
Venkatesan, R.2
-
8
-
-
33747624401
-
Combining crypto with biometrics effectively
-
F. Hao, R. Anderson, and J. Daugman, "Combining crypto with biometrics effectively," IEEE Trans. Computers, vol. 55, no. 9, pp. 1081-1088, 2006.
-
(2006)
IEEE Trans. Computers
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
9
-
-
0031096505
-
Near shannon limit performance of low density parity check codes
-
D.J.C. MacKay and R.M. Neal, "Near shannon limit performance of low density parity check codes," Electronics Letters, vol. 33, no. 6, pp. 457-458, 1997.
-
(1997)
Electronics Letters
, vol.33
, Issue.6
, pp. 457-458
-
-
MacKay, D.J.C.1
Neal, R.M.2
-
10
-
-
84962074661
-
Secure biometrics via syndromes
-
E. Martinian, S. Yekhanin, and J.S. Yedidia, "Secure biometrics via syndromes," in Allerton Conf. on Communications, Control, and Computing, 2005.
-
(2005)
Allerton Conf. on Communications, Control, and Computing
-
-
Martinian, E.1
Yekhanin, S.2
Yedidia, J.S.3
-
11
-
-
52349091161
-
Secure storage of fingerprint biometrics using slepian-wolf codes
-
January
-
S.C. Draper, A. Khistiy, E. Martinianz, A. Vetro, and J.S. Yedidia, "Secure storage of fingerprint biometrics using slepian-wolf codes," in Information Theory and Applications Workshop, January 2007.
-
(2007)
Information Theory and Applications Workshop
-
-
Draper, S.C.1
Khistiy, A.2
Martinianz, E.3
Vetro, A.4
Yedidia, J.S.5
|