-
2
-
-
14844326110
-
Natural language watermarking and tamperproofing
-
2002, Springer Verlag
-
M.J. Atallah, V. Raskin, C.F. Hempelmann, M. Karahan, R. Sion, K.E. Triezenberg and U. Topkara (2002) Natural language watermarking and tamperproofing. Lecture Notes in Computer Science, Proc. 5th International Information Hiding Workshop 2002 Springer Verlag
-
(2002)
Lecture Notes in Computer Science, Proc. 5th International Information Hiding Workshop
-
-
Atallah, M.J.1
Raskin, V.2
Hempelmann, C.F.3
Karahan, M.4
Sion, R.5
Triezenberg, K.E.6
Topkara, U.7
-
4
-
-
0037960295
-
Monitoring streams—a new class of data management applications
-
D. Carney, U. Cetintemel, M. Cherniack, C. Convey, S. Lee, G. Seidman, N. Stonebraker, M. Tatbul and S. Zdonik (2002) Monitoring streams—a new class of data management applications. Proceedings of the Int. Conf. on Very Large Data Bases (VLDB)
-
(2002)
Proceedings of the Int. Conf. on Very Large Data Bases (VLDB)
-
-
Carney, D.1
Cetintemel, U.2
Cherniack, M.3
Convey, C.4
Lee, S.5
Seidman, G.6
Stonebraker, N.7
Tatbul, M.8
Zdonik, S.9
-
6
-
-
0035333687
-
Quantization index modulation; A class of provably good methods for digital watermarking and information embedding
-
B. Chen and G.W. Wornell (2001) Quantization index modulation; A class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 47(4)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.4
-
-
Chen, B.1
Wornell, G.W.2
-
7
-
-
10944243481
-
On the limits of software watermarking
-
August
-
C.C.T. Christian Colleberg and Clark Thomborson (August 1998) On the limits of software watermarking.
-
(1998)
-
-
Christian, C.C.T.1
-
14
-
-
85136006156
-
-
NASA, The Hawaii University Infrared Telescope Facility
-
NASA, The Hawaii University Infrared Telescope Facility http://irtfweb.ifa.hawaii.edu/
-
-
-
-
15
-
-
84949509764
-
Experience with software watermarking
-
J. Paslberg, S. Krishnaswamy, M. Kwon, D. Ma, Q. Shao and Y. Zhang (2000) Experience with software watermarking. Proceedings of ACSAC, 16th Annual Computer Security Applications Conference 308-316.
-
(2000)
Proceedings of ACSAC, 16th Annual Computer Security Applications Conference
, pp. 308-316
-
-
Paslberg, J.1
Krishnaswamy, S.2
Kwon, M.3
Ma, D.4
Shao, Q.5
Zhang, Y.6
-
17
-
-
0003855464
-
Applied cryptography: Protocols, algorithms and source code in c
-
John Wiley and Sons
-
B. Schneier Bruce (1996) Applied cryptography: Protocols, algorithms and source code in c. Applied Cryptography John Wiley and Sons
-
(1996)
Applied Cryptography
-
-
Schneier, B.1
-
20
-
-
84908297782
-
Audio watemarking and data embedding—current state of the art, challenges and future directions
-
J. Dittmann, P. Wohlmacher, P. Horster, R. Steinmetz (Eds), September, ACM
-
M.D. Swanson, B. Zhu and A.H. Tewfik (September 1998) Audio watemarking and data embedding—current state of the art, challenges and future directions. J. Dittmann, P. Wohlmacher, P. Horster, R. Steinmetz (Eds) Multimedia and Security Workshop at ACM Multimedia, volume 41 of GMD, Bristol, United Kingdom ACM
-
(1998)
Multimedia and Security Workshop at ACM Multimedia, volume 41 of GMD, Bristol, United Kingdom
-
-
Swanson, M.D.1
Zhu, B.2
Tewfik, A.H.3
|