-
1
-
-
18844365338
-
Watermarking relational databases
-
Hong Kong, China
-
Agrawal, R.; & Kiernan, J.; 2002. Watermarking relational databases. In Proceedings of the 28th very large data bases VLDB conference, Hong Kong, China (Vol. 28, pp. 155-166).
-
(2002)
Proceedings of the 28th Very Large Data Bases VLDB Conference
, vol.28
, pp. 155-166
-
-
Agrawal, R.1
Kiernan, J.2
-
2
-
-
3843102623
-
Reversible watermark using the difference expansion of a generalized integer transform
-
A.M. Alattar Reversible watermark using the difference expansion of a generalized integer transform IEEE Transactions on Image Processing 13 8 2004 1147 1156
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, Issue.8
, pp. 1147-1156
-
-
Alattar, A.M.1
-
3
-
-
0034509394
-
Audio watermarking: Features, applications and algorithms
-
Arnold, M. (2000). Audio watermarking: Features, applications and algorithms. In Proceedings of the 5th IEEE international conference on computer and multimedia and expo (pp. 1013-1016). (Pubitemid 33059112)
-
(2000)
IEEE International Conference on Multi-Media and Expo
, pp. 1013-1016
-
-
Arnold, M.1
-
5
-
-
0032637701
-
Copyright protection for the electronic distribution of text
-
J.T. Brassil, S. Low, and N.F. Maxemchuk Copyright protection for the electronic distribution of text Proceedings of the IEEE 87 7 1999 1181 1196
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1181-1196
-
-
Brassil, J.T.1
Low, S.2
Maxemchuk, N.F.3
-
6
-
-
13244269881
-
Lossless generalized-LSB data embedding
-
DOI 10.1109/TIP.2004.840686
-
M.U. Celik, G. Sharma, A.M. Tekalp, and E. Saber Lossless generalized-lsb data embedding IEEE Transactions on Image Processing 14 2 2005 253 266 (Pubitemid 40181983)
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.2
, pp. 253-266
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
Saber, E.4
-
7
-
-
80255141354
-
Cryptanalysis of Hwang-Chang's a time-stamp protocol for digital watermarking
-
(001-050), Issue, 2007-01-01
-
Chou, J.; Chen, Y.; & Chan, C. (2007). Cryptanalysis of Hwang-Chang's a time-stamp protocol for digital watermarking. < http://eprint.iacr.org/ 2007/004 > Cryptology ePrint Archive Vol. 2007(001-050), Issue, 2007-01-01.
-
(2007)
Cryptology EPrint Archive 2007
-
-
Chou, J.1
Chen, Y.2
Chan, C.3
-
8
-
-
0036704573
-
Watermarking, tamper-proofing, and obfuscation: Tools for software protection
-
C.S. Collberg, and C. Thomborson Watermarking, tamper-proofing, and obfuscation: Tools for software protection IEEE Transactions on Software Engineering 28 8 2002 735 746
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.8
, pp. 735-746
-
-
Collberg, C.S.1
Thomborson, C.2
-
9
-
-
33845420452
-
Watermarking is not cryptography
-
Digital Watermarking - 5th International Workshop, IWDW 2006, Proceedings
-
Cox, I. J.; Doerr, G.; & Furon, T. (2006). Watermarking is not cryptography. In Proceedings of the 5th international workshop, IWDW 2006 Jeju Island, Korea, November 8-10, 2006 (Vol. 4283, pp. 1-15). (Pubitemid 44891621)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4283
, pp. 1-15
-
-
Cox, I.J.1
Doerr, G.2
Furon, T.3
-
10
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
PII S1057714997084601
-
I.J. Cox, J. Kilian, T. Leighton, and T.G. Shamoon Secure spread spectrum watermarking for multimedia IEEE Transaction Image Processing 6 12 1997 1673 1687 (Pubitemid 127770522)
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
11
-
-
0032074580
-
Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
-
PII S0733871698011056
-
S. Craver, N. Memon, B.L. Yeo, and M.M. Yeung Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications IEEE Journal of Selected Areas in Communications 16 4 1998 573 586 (Pubitemid 128564975)
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 573-586
-
-
Craver, S.1
Memon, N.2
Yeo, B.-L.3
Yeung, M.M.4
-
12
-
-
84863234873
-
Reversible and blind database watermarking using difference expansion
-
January 2008
-
Gupta, G.; & Pieprzyk, J. (2008). Reversible and blind database watermarking using difference expansion. In Proceedings of the eForensics, January 2008 (pp. 1-6).
-
(2008)
Proceedings of the EForensics
, pp. 1-6
-
-
Gupta, G.1
Pieprzyk, J.2
-
13
-
-
0032072064
-
Watermarking of uncompressed and compressed video
-
PII S0165168497000115
-
F. Hartung, and B. Girod Watermarking of uncompressed and compressed video Signal Processing 66 3 1998 283 301 (Pubitemid 128430590)
-
(1998)
Signal Processing
, vol.66
, Issue.3
, pp. 283-301
-
-
Hartung, F.1
Girod, B.2
-
14
-
-
0003308762
-
Internet x.509 public key infrastructure certificate and crl profile
-
January 1999
-
Housley, R.; Ford, W.; Polk, W.; & Solo, D. (1999). Internet x.509 public key infrastructure certificate and crl profile. RFC 2459. January 1999.
-
(1999)
RFC
, vol.2459
-
-
Housley, R.1
Ford, W.2
Polk, W.3
Solo, D.4
-
18
-
-
18844420548
-
Tamper detection and localization for categorical data using fragile watermarks
-
DRM 2004: Proceedings of the Fourth ACM Workshop on Digital Rights Management
-
Li, Y.; Guo, H.; & Jajodia, S. (2004). Tamper detection and localization for categorical data using fragile watermarks. In Proceedings of the 4th ACM workshop on digital rights management DRM'04 (pp. 73-82). (Pubitemid 40681761)
-
(2004)
DRM 2004: Proceedings of the Fourth ACM Workshop on Digital Rights Management
, pp. 73-82
-
-
Li, Y.1
Guo, H.2
Jajodia, S.3
-
19
-
-
50549096535
-
A multiple-bits watermark for relational data
-
Y. Li, H. Guo, and S. Wang A multiple-bits watermark for relational data Journal of Database Management 19 3 2008 1 21
-
(2008)
Journal of Database Management
, vol.19
, Issue.3
, pp. 1-21
-
-
Li, Y.1
Guo, H.2
Wang, S.3
-
20
-
-
0032680807
-
Information hiding - A survey
-
special issue on protection of multimedia content
-
F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn Information hiding - A survey Proceedings of the IEEE 87 7 1999 1062 1078 special issue on protection of multimedia content
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
29
-
-
0035791606
-
Circular interpretation of histogram for reversible watermarking
-
France, October 2001
-
Vleeschouwer, C. D.; Delaigle, J. E.; & Macq, B. (2001). Circular interpretation of histogram for reversible watermarking. In Proceedings of the IEEE 4th workshop on multimedia signal processing, France, October 2001 (pp. 345-350).
-
(2001)
Proceedings of the IEEE 4th Workshop on Multimedia Signal Processing
, pp. 345-350
-
-
Vleeschouwer, C.D.1
Delaigle, J.E.2
MacQ, B.3
-
30
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
DOI 10.1109/83.951543, PII S1057714901082094
-
P.W. Wong, and N. Memon Secret and public key image watermarking schemes for image authentication and ownership verification IEEE Transactions on Image Processing 10 2001 1593 1601 (Pubitemid 32981831)
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
|