-
1
-
-
54049151661
-
Traceable multimedia fingerprinting based on the multilevel user grouping
-
doi: 10.1109/ICME.2008.4607442
-
Y. T. Lin and J. L. Wu, "Traceable multimedia fingerprinting based on the multilevel user grouping", Proceedings of Multimedia and Expo, 2008, doi: 10.1109/ICME.2008.4607442, pp. 345-348
-
Proceedings of Multimedia and Expo, 2008
, pp. 345-348
-
-
Lin, Y.T.1
Wu, J.L.2
-
2
-
-
83455204761
-
Multimedia fingerprinting forensics for traitor tracing
-
Hindawi Publishing Corporation, ISBN 977-5945-18-6
-
K. J. Liu, W. Trappe, Z.J. Wang, M. Wu and H. Zhao, "Multimedia fingerprinting forensics for traitor tracing", EURASIP Book Series on Signal Processing and Communications, Hindawi Publishing Corporation, 2005, ISBN 977-5945-18-6
-
(2005)
EURASIP Book Series on Signal Processing and Communications
-
-
Liu, K.J.1
Trappe, W.2
Wang, Z.J.3
Wu, M.4
Zhao, H.5
-
3
-
-
0031624340
-
Reversible data mixing procedure for efficient public-key encryption
-
M. Matyas, M. Peyravian, A. Roginsky and N. Zunic, "Reversible data mixing procedure for efficient public-key encryption", Computers & Security Vol. 17, No. 3, 1998, pp. 265-272
-
(1998)
Computers & Security
, vol.17
, Issue.3
, pp. 265-272
-
-
Matyas, M.1
Peyravian, M.2
Roginsky, A.3
Zunic, N.4
-
4
-
-
78650917606
-
Leaked cables offer raw look at U.S. diplomacy
-
29.11.
-
S. Shane and A.W. Lehren, "Leaked cables offer raw look at U.S. diplomacy", New York Times, page A1, 29.11.2010
-
(2010)
New York Times
-
-
Shane, S.1
Lehren, A.W.2
-
5
-
-
84957628646
-
Scramble all, encrypt small
-
FSE □99, Springer-Verlag
-
M. Jacobsson, J.P. Stern and M. Yung, "Scramble all, encrypt small", FSE □99, LNCS 1636, Springer-Verlag, 1999, pp. 95-111
-
(1999)
LNCS
, vol.1636
, pp. 95-111
-
-
Jacobsson, M.1
Stern, J.P.2
Yung, M.3
-
7
-
-
1542673557
-
A watermarking algorithm for fingerprinting intelligence images
-
Y. Wang, J.F. Doherty and R.E. van Dyck, "A watermarking algorithm for fingerprinting intelligence images", Proceedings of Conference on Information Sciences and Systems, 2001, pp. 21-24
-
Proceedings of Conference on Information Sciences and Systems, 2001
, pp. 21-24
-
-
Wang, Y.1
Doherty, J.F.2
Van Dyck, R.E.3
-
8
-
-
13244269881
-
Lossless generalized-LSB data embedding
-
M.U. Celik, G. Sharma, A.M. Tekalp and E. Saber, "Lossless generalized-LSB data embedding", IEEE Transactions on Image Processing Vol. 14 No. 2, 2005, pp. 253-266
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.2
, pp. 253-266
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
Saber, E.4
-
9
-
-
0032095654
-
Multimedia data-embedding and watermarking technologies
-
M.D. Swanson, M. Kobayashi and A.H. Tewfik, "Multimedia data-embedding and watermarking technologies", Proceedings of IEEE Vol. 86 No. 6, 1998, pp. 1064-1087
-
(1998)
Proceedings of IEEE
, vol.86
, Issue.6
, pp. 1064-1087
-
-
Swanson, M.D.1
Kobayashi, M.2
Tewfik, A.H.3
-
10
-
-
0037399342
-
Digital fingerprinting codes: Problem statements, constructions, identification of traitors
-
A. Barg, G.R. Blakley and G.A. Kabatiansky, "Digital fingerprinting codes: problem statements, constructions, identification of traitors", IEEE Transactions on Information Theory, 2003, pp. 852-865
-
(2003)
IEEE Transactions on Information Theory
, pp. 852-865
-
-
Barg, A.1
Blakley, G.R.2
Kabatiansky, G.A.3
-
12
-
-
0000676728
-
Combining digital watermarks and collusion secure fingerprints for digital images
-
J. Dittmann, A. Behr, M. Stabenau, P. Schmitt, J. Schwenk and J. Ueberberg, "Combining digital watermarks and collusion secure fingerprints for digital images", JEI, 2000, pp. 456-467
-
(2000)
JEI
, pp. 456-467
-
-
Dittmann, J.1
Behr, A.2
Stabenau, M.3
Schmitt, P.4
Schwenk, J.5
Ueberberg, J.6
-
13
-
-
0034188648
-
Tracing traitors
-
B. Chor, A. Fiat, M. Naor and B. Pinkas, "Tracing traitors", IEEE Transactions on Information Theory, 2000, pp. 893-910
-
(2000)
IEEE Transactions on Information Theory
, pp. 893-910
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
Pinkas, B.4
|