-
2
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
D. Boneh and J. Shaw, .Collusion-secure fingerprinting for digital data,. IEEE Trans. Inform. Theory, vol. 44, no. 5, pp. 1897.1905, 1998.
-
(1998)
IEEE Trans. Inform. Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
3
-
-
0038527384
-
Anticollusion fingerprinting for multimedia
-
W. Trappe, M. Wu, Z. J. Wang, and K. J. R. Liu, .Anticollusion fingerprinting for multimedia,. IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1069.1087, 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.4
, pp. 1069-1087
-
-
Trappe, W.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
-
4
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I. Cox, J. Kilian, F. Leighton, and T. Shamson, .Secure spread spectrum watermarking for multimedia,. IEEE Trans. Image Process., vol. 6, no. 5, pp. 1673.1687, 1997.
-
(1997)
IEEE Trans. Image Process.
, vol.6
, Issue.5
, pp. 1673-1687
-
-
Cox, I.1
Kilian, J.2
Leighton, F.3
Shamson, T.4
-
5
-
-
84957647748
-
Coin-based anonymous fingerprinting
-
vol. 1592 of LNCS, Springer-Verlag
-
B. Pfitzmann and A. Sadeghi, .Coin-based anonymous fingerprinting,. in Advances in Cryptology. EUROCRYPT' 99. 1999, vol. 1592 of LNCS, pp. 150.164, Springer-Verlag.
-
(1999)
Advances in Cryptology. EUROCRYPT' 99
, pp. 150-164
-
-
Pfitzmann, B.1
Sadeghi, A.2
-
6
-
-
0035307977
-
A buyer-seller watermarking protocol
-
N. Memon and P.W.Wong, .A buyer-seller watermarking protocol,. IEEE Trans. Image Process., vol. 10, no. 4, pp. 643.649, 2001.
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.4
, pp. 643-649
-
-
Memon, N.1
Wong, P.W.2
-
7
-
-
28844473947
-
Fingerprinting protocol for images based on additive homomorphic property
-
M. Kuribayashi and H. Tanaka, .Fingerprinting protocol for images based on additive homomorphic property,. IEEE Trans. Image Process., vol. 14, no. 12, pp. 2129.2139, 2005.
-
(2005)
IEEE Trans. Image Process.
, vol.14
, Issue.12
, pp. 2129-2139
-
-
Kuribayashi, M.1
Tanaka, H.2
-
8
-
-
9744242854
-
An efficient and anonymous buyer-seller watermarking protocol
-
C. Lei, P. Yu, P. Tsai, and M. Chan, .An efficient and anonymous buyer-seller watermarking protocol,. IEEE Trans. Image Process., vol. 13, no. 12, pp. 1618.1626, 2004.
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.12
, pp. 1618-1626
-
-
Lei, C.1
Yu, P.2
Tsai, P.3
Chan, M.4
-
9
-
-
84956852274
-
A new public-key cryptosystem as secure as factoring
-
vol. 1403 of LNCS, Springer-Verlag
-
T. Okamoto and S. Uchiyama, .A new public-key cryptosystem as secure as factoring,. in Advances in Crypgology. EUROCRYPT'98. 1998, vol. 1403 of LNCS, pp. 308.318, Springer-Verlag.
-
(1998)
Advances in Crypgology. EUROCRYPT'98
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
10
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
vol. 1592 of LNCS, Springer-Verlag
-
P. Paillier, .Public-key cryptosystems based on composite degree residuosity classes,. in Advances in Cryptology. EUROCRYPT'99. 1999, vol. 1592 of LNCS, pp. 223.238, Springer-Verlag.
-
(1999)
Advances in Cryptology. EUROCRYPT'99
, pp. 223-238
-
-
Paillier, P.1
-
11
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
B. Chen and G.W.Wornel, .Quantization index modulation: a class of provably good methods for digital watermarking and information embedding,. IEEE Trans. Inform. Theory, vol. 47, no. 4, pp. 1423.1443, 2001.
-
(2001)
IEEE Trans. Inform. Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornel, G.W.2
-
12
-
-
37649018591
-
Anonymous fingerprinting with robust qim watermarking techniques
-
J. P. Prins, Z. Erkin, and R. L. Lagendijk, .Anonymous fingerprinting with robust qim watermarking techniques,. EURASIP J. Inform Security, vol. 2007, no. 8, 2007.
-
(2007)
EURASIP J. Inform Security
, vol.2007
, Issue.8
-
-
Prins, J.P.1
Erkin, Z.2
Lagendijk, R.L.3
-
13
-
-
18844450187
-
Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting
-
H. Zhao, M. Wu, Z. Wang, and K. J. R. Liu, .Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting,. IEEE Trans. Image Process., vol. 14, no. 5, pp. 646.661, 2005.
-
(2005)
IEEE Trans. Image Process.
, vol.14
, Issue.5
, pp. 646-661
-
-
Zhao, H.1
Wu, M.2
Wang, Z.3
Liu, K.J.R.4
-
14
-
-
20444373301
-
Anti-collusion forensics of multimedia fingerprinting using orthogonal modulatio
-
Z. J. Wang, M. Wu, H. Zhao, W. Trappe, and K. J. R. Liu, .Anti-collusion forensics of multimedia fingerprinting using orthogonal modulatio,. IEEE Trans. Image Process., vol. 14, no. 6, pp. 804.821, 2005.
-
(2005)
IEEE Trans. Image Process.
, vol.14
, Issue.6
, pp. 804-821
-
-
Wang, Z.J.1
Wu, M.2
Zhao, H.3
Trappe, W.4
Liu, K.J.R.5
-
15
-
-
33646205903
-
Collusion secure convolutional spread spectrum fingerprinting
-
vol. 3710 of LNCS, Springer-Verlag
-
Y. Zhu, D. Feng, and W. Zou, .Collusion secure convolutional spread spectrum fingerprinting,. in Proc. IWDW2005. 2005, vol. 3710 of LNCS, pp. 67.83, Springer-Verlag.
-
(2005)
Proc. IWDW2005
, pp. 67-83
-
-
Zhu, Y.1
Feng, D.2
Zou, W.3
-
16
-
-
84937541590
-
Improved boneh-shaw content fingerprinting
-
vol. 2020 of LNCS, Springer-Verlag
-
Y. Yacobi, .Improved boneh-shaw content fingerprinting,. in Proc. CT-RSA. 2001, vol. 2020 of LNCS, pp. 378.391, Springer-Verlag.
-
(2001)
Proc. CT-RSA
, pp. 378-391
-
-
Yacobi, Y.1
-
17
-
-
84867553981
-
A generalisation, a simpli- fication and some applications of paillier's probabilistic public-key system
-
vol. 1992 of LNCS, Springer-Verlag
-
I. Damgard and Mats Jurik, .A generalisation, a simpli- fication and some applications of paillier's probabilistic public-key system,. in Proc. of PKC '01. 2001, vol. 1992 of LNCS, pp. 119.136, Springer-Verlag.
-
(2001)
Proc. of PKC '01
, pp. 119-136
-
-
Damgård, I.1
Jurik, M.2
-
18
-
-
84957002266
-
Cryptocomputing with rationals
-
vol. 2357 of LNCS, Springer-Verlag
-
P. A. Fouque, J. Stern, and G. J.Wackers, .Cryptocomputing with rationals,. in Proc. of Finalcial Cryptography. 2003, vol. 2357 of LNCS, pp. 136.146, Springer-Verlag.
-
(2003)
Proc. of Finalcial Cryptography
, pp. 136-146
-
-
Fouque, P.A.1
Stern, J.2
Wackers, G.J.3
-
19
-
-
36949019777
-
Oblivious neural network computing via homomorphic encryption
-
C. Orlandi, A. Piva, and M. Barni, .Oblivious neural network computing via homomorphic encryption,. EURASIP J. Inform. Security, vol. 2007, no. 9, 2007.
-
(2007)
EURASIP J. Inform. Security
, vol.2007
, Issue.9
-
-
Orlandi, C.1
Piva, A.2
Barni, M.3
|