-
1
-
-
33847619357
-
Lossless adaptive digital audio steganography
-
S.S. Agaian, D. Akopian, O. Caglayan, Dapos, and S.A. Souza Lossless adaptive digital audio steganography Conference Record of the 39th Asilomar Conference on Signal, Systems and Computers 2005
-
(2005)
Conference Record of the 39th Asilomar Conference on Signal, Systems and Computers
-
-
Agaian, S.S.1
Akopian, D.2
Caglayan, O.3
Dapos4
Souza, S.A.5
-
2
-
-
77956063292
-
-
Akamai, 2008. http://www.akamai.com.
-
(2008)
-
-
-
7
-
-
8344288340
-
Incentives build robustness in bittorrent
-
Berkeley, CA
-
B. Cohen Incentives build robustness in bittorrent P2P Economics Workshop Berkeley, CA 2003
-
(2003)
P2P Economics Workshop
-
-
Cohen, B.1
-
12
-
-
77956056720
-
-
P. Fabien MP3Stego 2004 http://www.petitcolas.net/fabien/steganography/ mp3steg
-
(2004)
MP3Stego
-
-
Fabien, P.1
-
15
-
-
33749506982
-
Multimedia selective encryption by means of randomized arithmetic coding
-
M. Grangetto, E. Magli, and G. Olmo Multimedia selective encryption by means of randomized arithmetic coding IEEE Transactions on Multimedia 8 5 2006 905 917
-
(2006)
IEEE Transactions on Multimedia
, vol.8
, Issue.5
, pp. 905-917
-
-
Grangetto, M.1
Magli, E.2
Olmo, G.3
-
17
-
-
77956062746
-
ITunes Plus DRM-free tracks expanding, dropping to 99 cents
-
iTunes Plus DRM-free tracks expanding, dropping to 99 cents Apple News from ARS Technica 2007
-
(2007)
Apple News from ARS Technica
-
-
-
20
-
-
11144253373
-
Video fingerprinting and encryption principles for digital rights management
-
D. Kundur, and K. Karthik Video fingerprinting and encryption principles for digital rights management Proceedings of the IEEE, vol.92, no. 6 2004 918 932
-
(2004)
Proceedings of the IEEE, vol.92, No. 6
, pp. 918-932
-
-
Kundur, D.1
Karthik, K.2
-
22
-
-
63749086261
-
A peer-to-peer architecture for live streaming with DRM
-
X. Lan, J. Xue, L. Tian, W. Hu, and N. Zheng A peer-to-peer architecture for live streaming with DRM 6th IEEE Consumer Communications and Networking Conference (CCNC) 2009 10 13
-
(2009)
6th IEEE Consumer Communications and Networking Conference (CCNC)
, pp. 10-13
-
-
Lan, X.1
Xue, J.2
Tian, L.3
Hu, W.4
Zheng, N.5
-
23
-
-
0037096996
-
A public verifiable copy protection technique for still images
-
Lee, Wei-Bin, Chen, and Tung-Her A public verifiable copy protection technique for still images Journal of Systems and Software 62 3 2002 195 204
-
(2002)
Journal of Systems and Software
, vol.62
, Issue.3
, pp. 195-204
-
-
Lee1
Wei-Bin2
Chen3
Tung-Her4
-
25
-
-
33847643270
-
Security problems with improper implementations of improved FEA-M
-
Li, Shujun, and K. Lo Security problems with improper implementations of improved FEA-M Journal of Systems and Software 80 5 2007 791 794
-
(2007)
Journal of Systems and Software
, vol.80
, Issue.5
, pp. 791-794
-
-
Li1
Shujun2
Lo, K.3
-
26
-
-
64849113652
-
An improved lossless data hiding scheme based on image VQ-index residual value coding
-
Z. Lu, J. Wang, and B. Liu An improved lossless data hiding scheme based on image VQ-index residual value coding Journal of Systems and Software 82 6 2009 1016 1024
-
(2009)
Journal of Systems and Software
, vol.82
, Issue.6
, pp. 1016-1024
-
-
Lu, Z.1
Wang, J.2
Liu, B.3
-
27
-
-
22144450367
-
New paradigms for effective multicasting and fingerprinting of entertainment media
-
W. Luh, and D. Kundur New paradigms for effective multicasting and fingerprinting of entertainment media IEEE Communications Magazine 2005 77 84
-
(2005)
IEEE Communications Magazine
, pp. 77-84
-
-
Luh, W.1
Kundur, D.2
-
28
-
-
8844263220
-
Benchmarking of image watermarking algorithms for digital rights management
-
B. Macq, J. Dittmann, and E.J. Delp Benchmarking of image watermarking algorithms for digital rights management Proceedings of the IEEE 2004
-
(2004)
Proceedings of the IEEE
-
-
MacQ, B.1
Dittmann, J.2
Delp, E.J.3
-
32
-
-
0041848575
-
Preventing piracy, reverse engineering, and tampering
-
G. Naumovich, and N. Memon Preventing piracy, reverse engineering, and tampering IEEE Computer Society 36 2003 64 71
-
(2003)
IEEE Computer Society
, vol.36
, pp. 64-71
-
-
Naumovich, G.1
Memon, N.2
-
33
-
-
11244284968
-
Robust lossless image data hiding
-
Z. Ni, Y. Shi, N. Ansari, Su, Wei, Q. Sun, and X. Lin Robust lossless image data hiding IEEE International Conference on Multimedia and Expo 2004
-
(2004)
IEEE International Conference on Multimedia and Expo
-
-
Ni, Z.1
Shi, Y.2
Ansari, N.3
Su4
Wei5
Sun, Q.6
Lin, X.7
-
35
-
-
8744220052
-
-
Experimental Computer Systems Lab, Department of Computer Science, State University of New York Stony Brook
-
G. Peng CDN: Content Distribution Network. Technical Report TR-125 2003 Experimental Computer Systems Lab, Department of Computer Science, State University of New York Stony Brook
-
(2003)
CDN: Content Distribution Network. Technical Report TR-125
-
-
Peng, G.1
-
39
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R.L. Rivest, A. Shamir, and L.A. Adleman A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM 21 2 1978
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.A.3
-
40
-
-
0018545449
-
How to share a secret
-
A. Shamir How to share a secret Communications of the ACM 22 1 1979 612 613
-
(1979)
Communications of the ACM
, vol.22
, Issue.1
, pp. 612-613
-
-
Shamir, A.1
-
50
-
-
0036474718
-
A wavelet-based watermarking algorithm for ownership verification of digital images
-
Y. Wang, J.F. Doherty, and R.E. Van-Dyck A wavelet-based watermarking algorithm for ownership verification of digital images IEEE Transactions on Image Processing 11 2 2002 77 88
-
(2002)
IEEE Transactions on Image Processing
, vol.11
, Issue.2
, pp. 77-88
-
-
Wang, Y.1
Doherty, J.F.2
Van-Dyck, R.E.3
-
52
-
-
26844567623
-
Design of integrated multimedia compression and encryption systems
-
C. -P Wu, and C. Kuo Design of integrated multimedia compression and encryption systems IEEE Transactions on Multimedia 7 2005 828 839
-
(2005)
IEEE Transactions on Multimedia
, vol.7
, pp. 828-839
-
-
C, -P.W.1
Kuo, C.2
-
53
-
-
85032751604
-
Collusion resistant fingerprint for multimedia
-
M. Wu, W. Trappe, Z.J. Wang, and K.J. Lin Collusion resistant fingerprint for multimedia IEEE Signal Processing Magazine 21 2 2004 15 27
-
(2004)
IEEE Signal Processing Magazine
, vol.21
, Issue.2
, pp. 15-27
-
-
Wu, M.1
Trappe, W.2
Wang, Z.J.3
Lin, K.J.4
-
54
-
-
15844424554
-
Efficiently self-synchronized audio watermarking for as sured audio data transmission
-
S. Wu, J. Huang, D. Huang, and Y. Shi Efficiently self-synchronized audio watermarking for as sured audio data transmission IEEE Transactions on Broadcasting 51 2005 69 76
-
(2005)
IEEE Transactions on Broadcasting
, vol.51
, pp. 69-76
-
-
Wu, S.1
Huang, J.2
Huang, D.3
Shi, Y.4
-
55
-
-
30144435965
-
Enhancing data authenticity and integrity in P2P systems
-
X. Zhang, S. Chen, and R. Sandhu Enhancing data authenticity and integrity in P2P systems IEEE Internet Computing 2005 42 49
-
(2005)
IEEE Internet Computing
, pp. 42-49
-
-
Zhang, X.1
Chen, S.2
Sandhu, R.3
-
56
-
-
63049127442
-
Collision Attacks with Budget Constraints on Key Management Schemes for Secure Multimedia Multicast
-
W. Zhu Collision Attacks with Budget Constraints on Key Management Schemes for Secure Multimedia Multicast IEEE Transactions on Multimedia 11 3 2009
-
(2009)
IEEE Transactions on Multimedia
, vol.11
, Issue.3
-
-
Zhu, W.1
|