-
1
-
-
33646128241
-
Non-interactive watermark detection for a correlation-based watermarking scheme
-
Communications and Multimedia Security Berlin/Heidelberg: Springer
-
A. Adelsbach, M. Rohe, and A.-R. Sadeghi, "Non-interactive watermark detection for a correlation-based watermarking scheme," in Communications and Multimedia Security (Lecture Notes in Computer Science, vol. 3677). Berlin/Heidelberg: Springer, 2005, pp. 129-139.
-
(2005)
Lecture Notes in Computer Science
, vol.3677
, pp. 129-139
-
-
Adelsbach, A.1
Rohe, M.2
Sadeghi, A.-R.3
-
3
-
-
84947921901
-
Chameleon - A New Kind of Stream Cipher
-
Fast Software Encryption
-
R. J. Anderson and C. Manifavas, "Chameleon: a new kind of stream cipher," in Proc. 4th Int. Workshop Fast Software Encryption (FSE'97), London, 1997, pp. 107-113. (Pubitemid 127100708)
-
(1997)
Lecture Notes In Computer Science
, Issue.1267
, pp. 107-113
-
-
Anderson, R.1
Manifavas, C.2
-
5
-
-
77249117753
-
Composite signal representation for fast and storage-efficient processing of encrypted signals
-
Mar.
-
T. Bianchi, A. Piva, and M. Barni, "Composite signal representation for fast and storage-efficient processing of encrypted signals," IEEE Trans. Inform. Forensics Sec., vol. 5, no. 1, pp. 180-187, Mar. 2010.
-
(2010)
IEEE Trans. Inform. Forensics Sec
, vol.5
, Issue.1
, pp. 180-187
-
-
Bianchi, T.1
Piva, A.2
Barni, M.3
-
6
-
-
78651086488
-
A commutative digital image watermarking and encryption method in the tree structured Haar transform domain
-
M. Cancellaro, F. Battisti, M. Carli, G. Boato, F. D. Natale, and A. Neri, "A commutative digital image watermarking and encryption method in the tree structured Haar transform domain," Signal Process. Image Commun., vol. 26, no. 1, pp. 1-12, 2011.
-
(2011)
Signal Process. Image Commun
, vol.26
, Issue.1
, pp. 1-12
-
-
Cancellaro, M.1
Battisti, F.2
Carli, M.3
Boato, G.4
Natale, F.D.5
Neri, A.6
-
7
-
-
49549083913
-
Look-up table based secure client-side embedding for spread-spectrum watermarks
-
M. Celik, A. Lemma, S. Katzenbeisser, and M. van der Veen, "Look-up table based secure client-side embedding for spread-spectrum watermarks," IEEE Trans. Inform. Forensics Sec., vol. 3, no. 3, pp. 475-487, 2008.
-
(2008)
IEEE Trans. Inform. Forensics Sec
, vol.3
, Issue.3
, pp. 475-487
-
-
Celik, M.1
Lemma, A.2
Katzenbeisser, S.3
Veen Der M.Van4
-
8
-
-
80053047484
-
An asymmetric fingerprinting scheme based on Tardos codes
-
Berlin, Heidelberg
-
A. Charpentier, C. Fontaine, T. Furon, and I. Cox, "An asymmetric fingerprinting scheme based on Tardos codes," in Proc. 13th Int. Conf. Information Hiding, IH'11, Berlin, Heidelberg, 2011, pp. 43-58.
-
(2011)
Proc. 13th Int. Conf. Information Hiding, IH'11
, pp. 43-58
-
-
Charpentier, A.1
Fontaine, C.2
Furon, T.3
Cox, I.4
-
9
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
DOI 10.1109/18.923725, PII S0018944801028346
-
B. Chen and G. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inform. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001. (Pubitemid 32508483)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
10
-
-
33645680170
-
Blind Newton sensitivity attack
-
P. Comesaña, L. Pérez-Freire, and F. Pérez- González, "Blind Newton sensitivity attack," IEE Proc. Inform. Sec., vol. 153, no. 3, pp. 115, 2006.
-
(2006)
IEE Proc. Inform. Sec
, vol.153
, Issue.3
, pp. 115
-
-
Comesaña, P.1
Pérez-Freire, L.2
Pérez-González, F.3
-
11
-
-
0032625842
-
Watermarking as communications with side information
-
July
-
I. J. Cox, M. L. Miller, and A. L. McKellips, "Watermarking as communications with side information," Proc. IEEE, vol. 87, no. 7, pp. 1127-1141, July 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1127-1141
-
-
Cox, I.J.1
Miller, M.L.2
McKellips, A.L.3
-
12
-
-
84958774556
-
A statistically-hiding integer commitment scheme based on groups with hidden order
-
I. Damgård and E. Fujisaki, "A statistically-hiding integer commitment scheme based on groups with hidden order," in Proc. Advances in Cryptology-ASIACRYPT' 02, LNCS 2501, 2002, pp. 125-142.
-
(2002)
Proc. Advances in Cryptology-ASIACRYPT' 02, LNCS
, vol.2501
, pp. 125-142
-
-
Damgård, I.1
Fujisaki, E.2
-
13
-
-
70449671086
-
An efficient buyer-seller watermarking protocol based on composite signal representation
-
Princeton, NJ
-
M. Deng, T. Bianchi, A. Piva, and B. Preneel, "An efficient buyer-seller watermarking protocol based on composite signal representation," in Proc. 11th ACM Workshop Multimedia and Security, Princeton, NJ, 2009, pp. 9-18.
-
(2009)
Proc. 11th ACM Workshop Multimedia and Security
, pp. 9-18
-
-
Deng, M.1
Bianchi, T.2
Piva, A.3
Preneel, B.4
-
16
-
-
83755220834
-
Secure client-side digital watermarking using optimal key selection
-
Communication and Networking T.-H. Kim, H. Adeli, W.-C. Fang, T. Vasilakos, A. Stoica, C. Z. Patrikakis, G. Zhao, J. G. Villalba, and Y. Xiao, Eds. Berlin/Heidelberg, Germany: Springer
-
J.-J. Jiang and C.-M. Pun, "Secure client-side digital watermarking using optimal key selection," in Communication and Networking (Communications in Computer and Information Science, vol. 266), T.-H. Kim, H. Adeli, W.-C. Fang, T. Vasilakos, A. Stoica, C. Z. Patrikakis, G. Zhao, J. G. Villalba, and Y. Xiao, Eds. Berlin/Heidelberg, Germany: Springer, 2011, pp. 162-168.
-
(2011)
Communications in Computer and Information Science
, vol.266
, pp. 162-168
-
-
Jiang, J.-J.1
Pun, C.-M.2
-
17
-
-
56749170420
-
A buyer-seller watermarking protocol based on secure embedding
-
Dec
-
S. Katzenbeisser, A. Lemma, M. U. Celik, M. van der Veen, and M. Maas. "A buyer-seller watermarking protocol based on secure embedding," IEEE Trans. Inform. Forensics Sec., vol. 3, no. 4, pp. 783-786, Dec. 2008.
-
(2008)
IEEE Trans. Inform. Forensics Sec
, vol.3
, Issue.4
, pp. 783-786
-
-
Katzenbeisser, S.1
Lemma, A.2
Celik, M.U.3
Veen Der M.Van4
Maas, M.5
-
18
-
-
49949091356
-
Combining Tardos fingerprinting codes and fingercasting
-
T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds. Berlin/Heidelberg, Germany: Springer
-
S. Katzenbeisser, B. Škori, M. Celik, and A.-R. Sadeghi, "Combining Tardos fingerprinting codes and fingercasting," in Information Hiding (Lecture Notes in Computer Science, vol. 4567), T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds. Berlin/Heidelberg, Germany: Springer, 2007, pp. 294-310.
-
(2007)
Information Hiding (Lecture Notes in Computer Science
, vol.4567
, pp. 294-310
-
-
Katzenbeisser, S.1
Škori, B.2
Celik, M.3
Sadeghi, A.-R.4
-
19
-
-
77952507577
-
On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol
-
Jan. 2010
-
M. Kuribayashi, "On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol, EURASIP J. Inform. Sec., vol. 2010, pp. 1:1-1:11, Jan. 2010.
-
(2010)
EURASIP J. Inform. Sec
, pp. 11-111
-
-
Kuribayashi, M.1
-
20
-
-
28844473947
-
Fingerprinting protocol for images based on additive homomorphic property
-
DOI 10.1109/TIP.2005.859383
-
M. Kuribayashi and H. Tanaka, "Fingerprinting protocol for images based on additive homomorphic property," IEEE Trans. Image Process., vol. 14, no. 12, pp. 2129-2139, Dec. 2005. (Pubitemid 41763728)
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.12
, pp. 2129-2139
-
-
Kuribayashi, M.1
Tanaka, H.2
-
21
-
-
85032751121
-
Encrypted signal processing for privacy protection
-
R. L. Lagendijk, Z. Erkin, and M. Barni, "Encrypted signal processing for privacy protection," IEEE Signal Process. Mag., vol. 30, no. 1, pp. 82-105, 2013.
-
(2013)
IEEE Signal Process. Mag
, vol.30
, Issue.1
, pp. 82-105
-
-
Lagendijk, R.L.1
Erkin, Z.2
Barni, M.3
-
22
-
-
33845398262
-
Secure watermark embedding through partial encryption
-
Digital Watermarking - 5th International Workshop, IWDW 2006, Proceedings
-
A. Lemma, S. Katzenbeisser, M. Celik, and M. van der Veen, "Secure watermark embedding through partial encryption," in Proc. 5th Int. Conf. Digital Watermarking, IWDW'06, Berlin/Heidelberg, Germany, 2006, pp. 433-445. (Pubitemid 44891655)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS 4283
, pp. 433-445
-
-
Lemma, A.1
Katzenbeisser, S.2
Celik, M.3
Van Der Veen, M.4
-
23
-
-
84859552729
-
Joint fingerprinting and decryption with noise-resistant for vector quantization images
-
C.-Y. Lin, P. Prangjarote, L.-W. Kang, W.-L. Huang, and T.-H. Chen, "Joint fingerprinting and decryption with noise-resistant for vector quantization images," Signal Process., vol. 92, no. 9, pp. 2159-2171, 2012.
-
(2012)
Signal Process
, vol.92
, Issue.9
, pp. 2159-2171
-
-
Lin, C.-Y.1
Prangjarote, P.2
Kang, L.-W.3
Huang, W.-L.4
Chen, T.-H.5
-
24
-
-
79952971621
-
Game-theoretic strategies and equilibriums in multimedia fingerprinting social networks
-
Apr.
-
W. Lin, H. Zhao, and K. Liu, "Game-theoretic strategies and equilibriums in multimedia fingerprinting social networks," IEEE Trans. Multimedia, vol. 13, no. 2, pp. 191-205, Apr. 2011.
-
(2011)
IEEE Trans. Multimedia
, vol.13
, Issue.2
, pp. 191-205
-
-
Lin, W.1
Zhao, H.2
Liu, K.3
-
25
-
-
84863766708
-
A cryptographic method for secure watermark detection
-
Old Town Alexandria, VA 10-12 July
-
M. Malkin and T. Kalker, "A cryptographic method for secure watermark detection," in Proc. 8th Int. Workshop on Information Hiding, IH'06, Old Town Alexandria, VA, 10-12 July 2006.
-
(2006)
Proc. 8th Int. Workshop on Information Hiding, IH'06
-
-
Malkin, M.1
Kalker, T.2
-
26
-
-
0035307977
-
A buyer-seller watermarking protocol
-
DOI 10.1109/83.913598, PII S1057714901027300
-
N. Memon and P. Wong, "A buyer-seller watermarking protocol," IEEE Trans. Image Process., vol. 10, no. 4, pp. 643-649, Apr. 2001. (Pubitemid 32371598)
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.4
, pp. 643-649
-
-
Memon, N.1
Wong, P.W.2
-
27
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Advances in Cryptology-EUROCRYPT 1999 New York: Springer
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Advances in Cryptology-EUROCRYPT 1999 (Lecture Notes in Computer Science, no. 1592). New York: Springer, 1999, pp. 223-238.
-
(1999)
Lecture Notes in Computer Science
, Issue.1592
, pp. 223-238
-
-
Paillier, P.1
-
28
-
-
21844445258
-
Rational Dither Modulation: A high-rate data-hiding method invariant to gain attacks
-
DOI 10.1109/TSP.2005.855407
-
F. Perez-Gonzalez, C. Mosquera, M. Barni, and A. Abrardo, "Rational dither modulation: A high-rate data-hiding method invariant to gain attacks," IEEE Trans. Signal Process. vol. 53, no. 10, pp. 3960-3975, Oct. 2005. (Pubitemid 41638247)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.II10
, pp. 3960-3975
-
-
Perez-Gonzalez, F.1
Mosquera, C.2
Barni, M.3
Abrardo, A.4
-
29
-
-
84947921515
-
Asymmetric fingerprinting
-
B. Pfitzmann and M. Schunter, "Asymmetric fingerprinting," in Advances in Cryptology-EUROCRYPT'96 (Lecture Notes in Computer Science, no. 1070). Berlin/Heidelberg: Springer, 1996, pp. 84-95. (Pubitemid 126071056)
-
(1996)
Lecture Notes In Computer Science
, Issue.1070
, pp. 84-95
-
-
Pfitzmann, B.1
Schunter, M.2
-
30
-
-
77249113281
-
Secure client-side ST-DM watermark embedding
-
Mar.
-
A. Piva, T. Bianchi, and A. De Rosa, "Secure client-side ST-DM watermark embedding," IEEE Trans. Inform. Forensics Sec., vol. 5, no. 1, pp. 13-26, Mar. 2010.
-
(2010)
IEEE Trans. Inform. Forensics Sec
, vol.5
, Issue.1
, pp. 13-26
-
-
Piva, A.1
Bianchi, T.2
De Rosa, A.3
-
31
-
-
33645680169
-
Zeroknowledge ST-DM watermarking
-
A. Piva, V. Cappellini, D. Corazzi, A. D. Rosa, C. Orlandi, and M. Barni, "Zeroknowledge ST-DM watermarking," in Proc. Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006.
-
(2006)
Proc. Security, Steganography, and Watermarking of Multimedia Contents
, vol.8
-
-
Piva, A.1
Cappellini, V.2
Corazzi, D.3
Rosa, A.D.4
Orlandi, C.5
Barni, M.6
-
32
-
-
78650329772
-
An efficient buyer-seller watermarking protocol based on chameleon encryption
-
Digital Watermarking H.-J. Kim, S. Katzenbeisser, and A. Ho, Eds Berlin/Heidelberg, Germany: Springer
-
G. Poh and K. Martin, "An efficient buyer-seller watermarking protocol based on chameleon encryption," in Digital Watermarking (Lecture Notes in Computer Science, vol. 5450), H.-J. Kim, S. Katzenbeisser, and A. Ho, Eds., pp. 433-447. Berlin/Heidelberg, Germany: Springer, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5450
, pp. 433-447
-
-
Poh, G.1
Martin, K.2
-
33
-
-
37649018591
-
Anonymous fingerprinting with robust QIM watermarking techniques
-
J. P. Prins, Z. Erkin, and R. L. Lagendijk, "Anonymous fingerprinting with robust QIM watermarking techniques," EURASIP J. Inform. Sec., vol. 2007, pp. 13, 2007.
-
(2007)
EURASIP J. Inform. Sec
, vol.2007
, pp. 13
-
-
Prins, J.P.1
Erkin, Z.2
Lagendijk, R.L.3
-
34
-
-
78649400346
-
A provably secure anonymous buyer-seller watermarking protocol
-
Dec.
-
A. Rial, M. Deng, T. Bianchi, A. Piva, and B. Preneel, "A provably secure anonymous buyer-seller watermarking protocol," IEEE Trans. Inform. Forensics Sec., vol. 5, no. 4, pp. 920-931, Dec. 2010.
-
(2010)
IEEE Trans. Inform. Forensics Sec
, vol.5
, Issue.4
, pp. 920-931
-
-
Rial, A.1
Deng, M.2
Bianchi, T.3
Piva, A.4
Preneel, B.5
-
35
-
-
84858062033
-
A survey of H.264 AVC/SVC encryption
-
Mar.
-
T. Stutz and A. Uhl, "A survey of H.264 AVC/SVC encryption," IEEE Trans. Circuits Syst Video Technol, vol. 22, no. 3, pp. 325-339, Mar. 2012.
-
(2012)
IEEE Trans. Circuits Syst Video Technol
, vol.22
, Issue.3
, pp. 325-339
-
-
Stutz, T.1
Uhl, A.2
-
36
-
-
33750921850
-
Zero-knowledge watermark detector robust to sensitivity attacks
-
Proceedings of the Multimedia and Security Workshop 2006, MM and Sec'06
-
J. R. Troncoso-Pastoriza and F. Pérez-Gonzalez, "Zero-knowledge watermark detector robust to sensitivity attacks," in Proc. ACM Multimedia Security Workshop, 2006, pp. 97-107. (Pubitemid 44729581)
-
(2006)
Proceedings of the Multimedia and Security Workshop 2006, MM and Sec'06
, vol.2006
, pp. 97-107
-
-
Troncoso-Pastoriza, J.R.1
Perez-Gonzalez, F.2
-
37
-
-
84873926385
-
Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking
-
P. Zheng and J. Huang, "Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking," in Proc. 14th Information Hiding Conf., 2012.
-
(2012)
Proc. 14th Information Hiding Conf
-
-
Zheng, P.1
Huang, J.2
|