-
1
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox, I. J., Kilian, J., Leighton, T. F., and Shamoon, T., Secure spread spectrum watermarking for multimedia, IEEE Trans. Image Process., 6, 1673, 1997.
-
(1997)
IEEE Trans. Image Process.
, vol.6
, pp. 1673
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.F.3
Shamoon, T.4
-
2
-
-
0033701079
-
Countermeasures for unintentional and intentional video watermarking attacks
-
Wong, P. W. and Delp, E. J., Eds., SPIE Proceedings, Vol. 3971, SPIE
-
Deguillaume, F., Csurka, G., and Pun, T., Countermeasures for unintentional and intentional video watermarking attacks, in IS&T/SPIE’s 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, 3971, Wong, P. W. and Delp, E. J., Eds., SPIE Proceedings, Vol. 3971, SPIE, 2000.
-
(2000)
IS&T/SPIE’s 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II
, vol.3971
-
-
Deguillaume, F.1
Csurka, G.2
Pun, T.3
-
3
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
Boneh, D. and Shaw, J., Collusion-secure fingerprinting for digital data, IEEE Trans.Inf. Theory, 44, 1897, 1998.
-
(1998)
IEEE Trans.Inf. Theory
, vol.44
, pp. 1897
-
-
Boneh, D.1
Shaw, J.2
-
4
-
-
0003987443
-
-
CRC Press, Boca Raton, FL
-
Stinson, D. R., Cryptography Theory and Practice, CRC Press, Boca Raton, FL, 1995, p. 24.
-
(1995)
Cryptography Theory and Practice
, pp. 24
-
-
Stinson, D.R.1
-
5
-
-
0038527384
-
Anti-collusion fingerprinting for multimedia
-
Trappe, W., Wu, M., Wang, Z. J., and Liu, K. J. R., Anti-collusion fingerprinting for multimedia, IEEE Trans. Signal Process., 51, 1069, 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, pp. 1069
-
-
Trappe, W.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
-
6
-
-
0036293565
-
-
presented at IEEE International Conference on Acoustics, Speech, and Signal Processing (ICAPSS '02), Orlando, FL
-
Trappe, W., Wu, M., and Liu, K. J. R., Collusion-resistant fingerprinting for multimedia, presented at IEEE International Conference on Acoustics, Speech, and Signal Processing (ICAPSS '02), Orlando, FL, 2002, Vol. 4, p. 3309.
-
(2002)
Collusion-resistant fingerprinting for multimedia
, vol.4
, pp. 3309
-
-
Trappe, W.1
Wu, M.2
Liu, K.J.R.3
-
7
-
-
85056065847
-
-
Institute for Systems Research, University of Maryland, Baltimore
-
Trappe, W., Wu, M., and Liu, K.J.R., Anti-collusion Fingerprinting for Multimedia. Technical Research Report, Institute for Systems Research, University of Maryland, Baltimore, 2002.
-
(2002)
Anti-collusion Fingerprinting for Multimedia. Technical Research Report
-
-
Trappe, W.1
Wu, M.2
Liu, K.J.R.3
-
8
-
-
84937053497
-
-
presented European Signal Processing Conference (EUSIPCO 2000), Tampere, Finland
-
Su, J. K., Eggers, J. J., and Girod, B., Capacity of Digital Watermarks Subjected to an Optimal Collusion Attack, presented European Signal Processing Conference (EUSIPCO 2000), Tampere, Finland, 2000.
-
(2000)
Capacity of Digital Watermarks Subjected to an Optimal Collusion Attack
-
-
Su, J.K.1
Eggers, J.J.2
Girod, B.3
-
9
-
-
34047228408
-
Nonlinear Collusion Attacks on Independent Fingerprints for Multimedia
-
Speech, and Signal Processing (ICASSP '03), Hong Kong
-
Zhao, H., Wu, M., Wang, Z. J., and Liu K. J. R., Nonlinear Collusion Attacks on Independent Fingerprints for Multimedia, in Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '03), Hong Kong, 2003.
-
(2003)
Proceedings of IEEE International Conference on Acoustics
-
-
Zhao, H.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
-
10
-
-
84947921515
-
Asymmetric fingerprinting
-
Maurer, U. M., Ed., Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
Pfitzmann, B. and Schunter, M., Asymmetric fingerprinting, in Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Maurer, U. M., Ed., Lecture Notes in Computer Science, Vol. 1070, Springer-Verlag, Berlin, 1996, p. 84.
-
(1996)
Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques
, vol.1070
, pp. 84
-
-
Pfitzmann, B.1
Schunter, M.2
-
11
-
-
84957353052
-
Anonymous Fingerprinting
-
International Conference on the Theory and Application of Cryptographic Techniques, Fumy, W., Ed., Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
Pfitzmann, B. and Waidner, M., Anonymous Fingerprinting, in Advances in cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Fumy, W., Ed., Lecture Notes in Computer Science, Vol. 1233, Springer-Verlag, Berlin, 1997, p. 88.
-
(1997)
Advances in cryptology - EUROCRYPT '97
, vol.1233
, pp. 88
-
-
Pfitzmann, B.1
Waidner, M.2
-
12
-
-
0034188648
-
Tracing traitors
-
Chor B., Fiat, A., Naor, M., and Pinkas, B., Tracing traitors, IEEE Trans. Inf. Theory, 46, 893, 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, pp. 893
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
Pinkas, B.4
-
13
-
-
84957663275
-
Watercasting: Distributed watermarking of multicast media
-
Risa, L. and Fdida, S., Eds., Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
Brown, I., Perkins, C., and Crowcroft, J., Watercasting: Distributed watermarking of multicast media, in First International Workshop on Networked Group Communication '99, Risa, L. and Fdida, S., Eds., Lecture Notes in Computer Science, Vol. 1736, Springer-Verlag, Berlin, 1999, p. 286.
-
(1999)
First International Workshop on Networked Group Communication '99
, vol.1736
, pp. 286
-
-
Brown, I.1
Perkins, C.2
Crowcroft, J.3
-
14
-
-
0037151693
-
WHIM: Watermarking multicast video with a hierarchy of intermediaries
-
Judge, P. and Ammar, M., WHIM: Watermarking multicast video with a hierarchy of intermediaries, IEEE Commn. Mag., 39, 699, 2002.
-
(2002)
IEEE Commn. Mag.
, vol.39
, pp. 699
-
-
Judge, P.1
Ammar, M.2
-
15
-
-
1542673557
-
A watermarking algorithm for fingerprinting intelligence images
-
Baltimore, MD
-
Wang, Y., Doherty, J. F., and Van Dyck, R., E., A watermarking algorithm for fingerprinting intelligence images, in Proceedings of Conference on Information Sciences and Systems, Baltimore, MD, 2001.
-
(2001)
Proceedings of Conference on Information Sciences and Systems
-
-
Wang, Y.1
Doherty, J.F.2
Van Dyck, R.E.3
-
16
-
-
84957610906
-
A note on the limits of collusion-resistant watermarks
-
Stern, J., Ed., Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
Ergun, F., Kilian, J., and Kumar, R., A note on the limits of collusion-resistant watermarks, in Advances in Cryptology-EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Stern, J., Ed., Lecture Notes in Computer Science, Vol. 1592, Springer-Verlag, Berlin, 1999, p. 140.
-
(1999)
Advances in Cryptology-EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques
, vol.1592
, pp. 140
-
-
Ergun, F.1
Kilian, J.2
Kumar, R.3
-
17
-
-
84959043688
-
Collusion secure q-ary fingerprinting for perceptual content
-
Sander, T., Ed., Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
Safavi-Naini, R. and Wang, Y., Collusion secure q-ary fingerprinting for perceptual content, in Security and Privacy in Digital Rights Management ACM CCS-8 Workshop DRM 2001, Sander, T., Ed., Lecture Notes in Computer Science, Vol. 2320, Springer-Verlag, Berlin, 2002, p. 57.
-
(2002)
Security and Privacy in Digital Rights Management ACM CCS-8 Workshop DRM 2001
, vol.2320
, pp. 57
-
-
Safavi-Naini, R.1
Wang, Y.2
-
18
-
-
0036028058
-
Cryptographic methods for collusion-secure fingerprinting of digital data
-
Biehl, I. and Mayer, B., Cryptographic methods for collusion-secure fingerprinting of digital data, Computers Electr. Eng., 28, 59, 2002.
-
(2002)
Computers Electr. Eng.
, vol.28
, pp. 59
-
-
Biehl, I.1
Mayer, B.2
-
19
-
-
0000676728
-
Combining digital watermarks and collusion secure fingerprints for digital images
-
Dittmann, J., Behr, A., Stabenau, M., Schmitt, P., Schwenk, J., and Ueberberg, J., Combining digital watermarks and collusion secure fingerprints for digital images, SPIE J. Electron. Imaging, 9, 456, 2000.
-
(2000)
SPIE J. Electron. Imaging
, vol.9
, pp. 456
-
-
Dittmann, J.1
Behr, A.2
Stabenau, M.3
Schmitt, P.4
Schwenk, J.5
Ueberberg, J.6
-
23
-
-
0003773164
-
-
CRC Press, Boia Raton, FL
-
Linder, C. C. and Rodger, C. A., Design Theory, CRC Press, Boia Raton, FL, 1997.
-
(1997)
Design Theory
-
-
Linder, C.C.1
Rodger, C.A.2
-
24
-
-
0003938168
-
-
CRC Press, Boca Raton, FL
-
Colbourn, C. J. and Dinitz, J. H., The CRC Handbook of Combinatorial Designs, CRC Press, Boca Raton, FL, 1996.
-
(1996)
The CRC Handbook of Combinatorial Designs
-
-
Colbourn, C.J.1
Dinitz, J.H.2
-
25
-
-
0032072279
-
Image adaptive watermarking using visual models
-
Podilchuk, C. and Zeng, W., Image adaptive watermarking using visual models, IEEE J. Selected Areas Commn., 16, 525, 1998.
-
(1998)
IEEE J. Selected Areas Commn.
, vol.16
, pp. 525
-
-
Podilchuk, C.1
Zeng, W.2
-
26
-
-
84947921901
-
Chameleon - A new kind of stream cipher
-
Biham, E., Ed., Lecture Notes in Computer Science, Springer-Verlag
-
Anderson, R. and Manifavas, C., Chameleon - A new kind of stream cipher, in Fast Software Encryption 4th International Workshop, Biham, E., Ed., Lecture Notes in Computer Science, Vol. 1267, Springer-Verlag, 1997, p. 107.
-
(1997)
Fast Software Encryption 4th International Workshop
, vol.1267
, pp. 107
-
-
Anderson, R.1
Manifavas, C.2
|