-
1
-
-
0035391983
-
Digital watermarking: Algorithms and applications
-
C. I. Podilchuk, E. J. Delp, Digital watermarking: algorithms and applications, IEEE Signal Processing Magazin, vol. 18, n. 4, pp. 33-46, 2001.
-
(2001)
IEEE Signal Processing Magazin
, vol.18
, Issue.4
, pp. 33-46
-
-
Podilchuk, C.I.1
Delp, E.J.2
-
2
-
-
79958073308
-
A simple fingerprinting scheme for large user groups
-
Defa Hu, Qiaoliang Li, A simple fingerprinting scheme for large user groups, Frontiers of Computer Science in China, vol. 5, n. 2, pp. 163-168, 2011.
-
(2011)
Frontiers of Computer Science In China
, vol.5
, Issue.2
, pp. 163-168
-
-
Defa, H.1
Li, Q.2
-
3
-
-
81255178830
-
Bandwidth efficient anti-collusion digital fingerprinting scheme
-
Yan Feng, Xiliang Zeng, Bandwidth efficient anti-collusion digital fingerprinting scheme, International Review on Computers and Software (IRECOS), vol. 6, n. 3, pp. 393-399, 2011.
-
(2011)
International Review On Computers and Software (IRECOS)
, vol.6
, Issue.3
, pp. 393-399
-
-
Feng, Y.1
Zeng, X.2
-
4
-
-
77951894620
-
Asymmetric fingerprinting based on 1-out-of-n oblivious transfer
-
Defa Hu, Qiaoliang Li, Asymmetric fingerprinting based on 1-out-of-n oblivious transfer, IEEE Communications Letters, vol. 14, n. 5, pp. 453-455, 2010.
-
(2010)
IEEE Communications Letters
, vol.14
, Issue.5
, pp. 453-455
-
-
Defa, H.1
Li, Q.2
-
5
-
-
77955954793
-
Bandwidth efficient asymmetric fingerprinting based on one-out-of-two oblivious transfer
-
Defa Hu, Qiaoliang Li, Bandwidth efficient asymmetric fingerprinting based on one-out-of-two oblivious transfer, International Journal of Information and Computer Security, vol. 4, n. 2, pp. 152-163, 2010.
-
(2010)
International Journal of Information and Computer Security
, vol.4
, Issue.2
, pp. 152-163
-
-
Defa, H.1
Li, Q.2
-
6
-
-
63149122821
-
-
D. Konar, C. Mazumdar, A survey of some fair exchange protocols, International Review on Computers and Software (IRECOS), vol. 2. n. 5, pp. 486-499, 2007.
-
(2007)
A Survey of Some Fair Exchange Protocols, International Review On Computers and Software (IRECOS)
, vol.2
, Issue.5
, pp. 486-499
-
-
Konar, D.1
Mazumdar, C.2
-
7
-
-
49549083913
-
Lookup-table-based secure client-side embedding for spread-spectrum watermarks
-
M. U. Celik, et al., Lookup-table-based secure client-side embedding for spread-spectrum watermarks, IEEE Transactions on Information Forensics and Security, vol. 3, n. 3, pp. 475-487, 2008.
-
(2008)
IEEE Transactions On Information Forensics and Security
, vol.3
, Issue.3
, pp. 475-487
-
-
Celik, M.U.1
-
8
-
-
1542643713
-
A DCT-based MPEG-2 transparent scrambling algorithm
-
Ci Wang, Hong-Bin Yu, Meng Zheng, A DCT-based MPEG-2 transparent scrambling algorithm, IEEE Transactions on Consumer Electronics, vol. 49, n. 4, 2003, 1208-1213.
-
(2003)
IEEE Transactions On Consumer Electronics
, vol.49
, Issue.4
, pp. 1208-1213
-
-
Ci, W.1
Hong-Bin, Y.2
Zheng, M.3
-
9
-
-
43949123848
-
Optimal probabilistic fingerprint codes
-
G. Tardos, Optimal probabilistic fingerprint codes. Journal of the ACM, vol. 55, n. 2, pp. 1-24, 2008.
-
(2008)
Journal of the ACM
, vol.55
, Issue.2
, pp. 1-24
-
-
Tardos, G.1
-
10
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I. J. Cox, J. Kilian, F. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol. 6, n. 12, pp. 1673-168, 1998.
-
(1998)
IEEE Transactions On Image Processing
, vol.6
, Issue.12
, pp. 168-1673
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.3
Shamoon, T.4
|