-
2
-
-
79952971621
-
Game-theoretic strategies and equilibriums in multimedia fingerprinting social networks
-
Apr.
-
W.S. Lin, H.V. Zhao, and K.J.R. Liu, "Game-theoretic strategies and equilibriums in multimedia fingerprinting social networks," IEEE Transactions on Multimedia, vol. 13, no. 2, pp. 191-205, Apr. 2011.
-
(2011)
IEEE Transactions on Multimedia
, vol.13
, Issue.2
, pp. 191-205
-
-
Lin, W.S.1
Zhao, H.V.2
Liu, K.J.R.3
-
3
-
-
85032751187
-
Secure watermarking for multimedia content protection: A review of its benefits and open issues
-
T. Bianchi and A. Piva, "Secure watermarking for multimedia content protection: A review of its benefits and open issues," Signal Processing Magazine, IEEE, vol. 30, no. 2, pp. 87-96, 2013.
-
(2013)
Signal Processing Magazine, IEEE
, vol.30
, Issue.2
, pp. 87-96
-
-
Bianchi, T.1
Piva, A.2
-
4
-
-
84947921515
-
Asymmetric fingerprinting
-
B. Pfitzmann and M. Schunter, "Asymmetric fingerprinting," in Adv. in Cryptology-EUROCRYPT'96, 1996, LNCS 1070, pp. 84-95.
-
Adv. in Cryptology-EUROCRYPT'96, 1996, LNCS
, vol.1070
, pp. 84-95
-
-
Pfitzmann, B.1
Schunter, M.2
-
5
-
-
0035307977
-
A buyer-seller watermarking protocol
-
Apr.
-
N. Memon and P. Wong, "A buyer-seller watermarking protocol," IEEE Transactions on Image Processing, vol. 10, no. 4, pp. 643-649, Apr. 2001.
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.4
, pp. 643-649
-
-
Memon, N.1
Wong, P.2
-
6
-
-
28844473947
-
Fingerprinting protocol for images based on additive homomorphic property
-
Dec.
-
M. Kuribayashi and H. Tanaka, "Fingerprinting protocol for images based on additive homomorphic property," IEEE Transactions on Image Processing, vol. 14, no. 12, pp. 2129-2139, Dec. 2005.
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.12
, pp. 2129-2139
-
-
Kuribayashi, M.1
Tanaka, H.2
-
7
-
-
37649018591
-
Anonymous fingerprinting with robust QIM watermarking techniques
-
Article ID 31340
-
J. P. Prins, Z. Erkin, and R. L. Lagendijk, "Anonymous fingerprinting with robust QIM watermarking techniques," EURASIP Journal on Information Security, vol. 2007, Article ID 31340, 13 pages, 2007.
-
(2007)
EURASIP Journal on Information Security
, vol.2007
, pp. 13
-
-
Prins, J.P.1
Erkin, Z.2
Lagendijk, R.L.3
-
8
-
-
77952507577
-
On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol
-
Jan.
-
Minoru Kuribayashi, "On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol," EURASIP J. Inf. Secur., vol. 2010, pp. 1:1-1:11, Jan. 2010.
-
(2010)
EURASIP J. Inf. Secur.
, vol.2010
, pp. 11-111
-
-
Kuribayashi, M.1
-
9
-
-
70449671086
-
An efficient buyer-seller watermarking protocol based on composite signal representation
-
Princeton, New Jersey, USA, ACM New York, NY, USA
-
Mina Deng, Tiziano Bianchi, Alessandro Piva, and Bart Preneel, "An efficient buyer-seller watermarking protocol based on composite signal representation," in Proceedings of the 11th ACM workshop on Multimedia and security, Princeton, New Jersey, USA, 2009, pp. 9-18, ACM New York, NY, USA.
-
(2009)
Proceedings of the 11th ACM Workshop on Multimedia and Security
, pp. 9-18
-
-
Deng, M.1
Bianchi, T.2
Piva, A.3
Preneel, B.4
-
10
-
-
78649400346
-
A provably secure anonymous buyer-seller watermarking protocol
-
Dec.
-
A. Rial, Mina Deng, T. Bianchi, A. Piva, and B. Preneel, "A provably secure anonymous buyer-seller watermarking protocol," IEEE Transactions on Information Forensics and Security, vol. 5, no. 4, pp. 920-931, Dec. 2010.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.4
, pp. 920-931
-
-
Rial, A.1
Deng, M.2
Bianchi, T.3
Piva, A.4
Preneel, B.5
-
11
-
-
84947921901
-
Chameleon-a new kind of stream cipher
-
Springer-Verlag, London, UK
-
R. J. Anderson and C. Manifavas, "Chameleon-a new kind of stream cipher," in Proceedings of the 4th International Workshop on Fast Software Encryption-FSE'97, London, UK, 1997, pp. 107-113, Springer-Verlag.
-
(1997)
Proceedings of the 4th International Workshop on Fast Software Encryption-FSE'97
, pp. 107-113
-
-
Anderson, R.J.1
Manifavas, C.2
-
12
-
-
49549083913
-
Look-up table based secure client-side embedding for spreadspectrum watermarks
-
M. Celik, A. Lemma, S. Katzenbeisser, and M. van der Veen, "Look-up table based secure client-side embedding for spreadspectrum watermarks," IEEE Trans. on Information Forensics and Security, vol. 3, no. 3, pp. 475-487, 2008.
-
(2008)
IEEE Trans. on Information Forensics and Security
, vol.3
, Issue.3
, pp. 475-487
-
-
Celik, M.1
Lemma, A.2
Katzenbeisser, S.3
Veen Der M.Van4
-
13
-
-
77249113281
-
Secure client-side STDM watermark embedding
-
Mar.
-
A. Piva, T. Bianchi, and A. De Rosa, "Secure client-side STDM watermark embedding," IEEE Transactions on Information Forensics and Security, vol. 5, no. 1, pp. 13-26, Mar. 2010.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.1
, pp. 13-26
-
-
Piva, A.1
Bianchi, T.2
De Rosa, A.3
-
14
-
-
84859552729
-
Joint fingerprinting and decryption with noise-resistant for vector quantization images
-
Chih-Yang Lin, Panyaporn Prangjarote, Li-Wei Kang, Wei-Lun Huang, and Tzung-Her Chen, "Joint fingerprinting and decryption with noise-resistant for vector quantization images," Signal Processing, vol. 92, no. 9, pp. 2159-2171, 2012.
-
(2012)
Signal Processing
, vol.92
, Issue.9
, pp. 2159-2171
-
-
Lin, C.1
Prangjarote, P.2
Kang, L.3
Huang, W.4
Chen, T.5
-
15
-
-
56749170420
-
A buyer-seller watermarking protocol based on secure embedding
-
Dec.
-
Stefan Katzenbeisser, Aweke Lemma, Mehmet Utku Celik, Michiel van der Veen, and Martijn Maas, "A buyer-seller watermarking protocol based on secure embedding," IEEE Trans. on Information Forensics and Security, vol. 3, no. 4, pp. 783-786, Dec. 2008.
-
(2008)
IEEE Trans. on Information Forensics and Security
, vol.3
, Issue.4
, pp. 783-786
-
-
Katzenbeisser, S.1
Lemma, A.2
Utku Celik, M.3
Van Der Veen, M.4
Maas, M.5
-
16
-
-
78650329772
-
An efficient buyer-seller watermarking protocol based on chameleon encryption
-
Hyoung-Joong Kim, Stefan Katzenbeisser, and Anthony Ho, Eds.vol. 5450 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg
-
Geong Poh and Keith Martin, "An efficient buyer-seller watermarking protocol based on chameleon encryption," in Digital Watermarking, Hyoung-Joong Kim, Stefan Katzenbeisser, and Anthony Ho, Eds., vol. 5450 of Lecture Notes in Computer Science, pp. 433-447. Springer Berlin / Heidelberg, 2009.
-
(2009)
Digital Watermarking
, pp. 433-447
-
-
Poh, G.1
Martin, K.2
-
17
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
J. Stern, Ed. number 1592 in Lecture Notes in Computer Science, Springer Verlag
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Advances in Cryptology-EUROCRYPT 1999, J. Stern, Ed. 1999, number 1592 in Lecture Notes in Computer Science, pp. 223-238, Springer Verlag.
-
(1999)
Advances in Cryptology-EUROCRYPT 1999
, pp. 223-238
-
-
Paillier, P.1
-
18
-
-
34547554409
-
Secure embedding of spread-spectrum watermarks using look-up tables
-
IEEE Press
-
M. Celik, A. Lemma, S. Katzenbeisser, and M. van der Veen, "Secure embedding of spread-spectrum watermarks using look-up tables," in International Conference on Acoustics, Speech and Signal Processing (ICASSP'07). 2007, IEEE Press.
-
(2007)
International Conference on Acoustics, Speech and Signal Processing (ICASSP'07)
-
-
Celik, M.1
Lemma, A.2
Katzenbeisser, S.3
Veen Der M.Van4
-
19
-
-
0021386096
-
Coding of real-number sequences for error correction: A digital signal processing problem
-
Jr. Marshall, T., "Coding of real-number sequences for error correction: A digital signal processing problem," IEEE J. Sel. Areas Commun., vol. 2, no. 2, pp. 381-392, 1984.
-
(1984)
IEEE J. Sel. Areas Commun.
, vol.2
, Issue.2
, pp. 381-392
-
-
Marshall Jr., T.1
-
20
-
-
0037355949
-
Complex-field coding for OFDM over fading wireless channels
-
Zhengdao Wang and G.B. Giannakis, "Complex-field coding for OFDM over fading wireless channels," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 707-720, 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.3
, pp. 707-720
-
-
Wang, Z.1
Giannakis, G.B.2
-
21
-
-
1942436689
-
Image quality assessment: From error visibility to structural similarity
-
Apr.
-
Zhou Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, "Image quality assessment: From error visibility to structural similarity," IEEE Trans. Image Process., vol. 13, no. 4, pp. 600-612, Apr. 2004.
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.4
, pp. 600-612
-
-
Wang, Z.1
Bovik, A.C.2
Sheikh, H.R.3
Simoncelli, E.P.4
|