-
2
-
-
85032763736
-
-
European Broadcasting Union and Union Européenne de Radio Télévision, May
-
Watermarking - Call for Systems, European Broadcasting Union and Union Européenne de Radio Télévision, May 2000.
-
(2000)
Watermarking - Call for Systems
-
-
-
3
-
-
0033686483
-
Fundamental performance limits of power-spectrum condition-compliant watermarks
-
San Jose, CA, Jan. 24-26
-
J.K. Su and B. Girod, "Fundamental performance limits of power-spectrum condition-compliant watermarks," in Proc. Electronic Imaging '99, Security and Watermarking of Multimedia Contents II, vol. 3971. San Jose, CA, Jan. 24-26, 2000, pp. 314-325.
-
(2000)
Proc. Electronic Imaging '99, Security and Watermarking of Multimedia Contents II
, vol.3971
, pp. 314-325
-
-
Su, J.K.1
Girod, B.2
-
4
-
-
0033701078
-
Watermark copy attack
-
San Jose, CA, Jan. 24-26
-
M. Kutter, "Watermark copy attack," in Proc. Electronic Imaging '99, Security and Watermarking of Multimedia Contents II, vol. 3971. San Jose, CA, Jan. 24-26, 2000, pp. 371-380.
-
(2000)
Proc. Electronic Imaging '99, Security and Watermarking of Multimedia Contents II
, vol.3971
, pp. 371-380
-
-
Kutter, M.1
-
5
-
-
84957877979
-
Attacks on copyright marking systems
-
Second Workshop on Information Hiding D. Aucsmith, Ed. Portland, OR, Apr. 14-17
-
F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, "Attacks on copyright marking systems," in Second Workshop on Information Hiding (Lecture Notes in Computer Science, vol. 1525), D. Aucsmith, Ed. Portland, OR, Apr. 14-17, 1998, pp. 218-238.
-
(1998)
Lecture Notes Computer Science
, vol.1525
, pp. 218-238
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
6
-
-
0033601691
-
A fair benchmark for image watermarking systems
-
San Jose, CA, Jan. 25-27
-
M. Kutter and F.A.P. Petitcolas, "A fair benchmark for image watermarking systems," in Proc. Electronic Imaging '99, Security and Watermarking of Multimedia Contents, vol. 3657. San Jose, CA, Jan. 25-27, 1999, pp. 226-239.
-
(1999)
Proc. Electronic Imaging '99, Security and Watermarking of Multimedia Contents
, vol.3657
, pp. 226-239
-
-
Kutter, M.1
Petitcolas, F.A.P.2
-
7
-
-
0006382127
-
-
German Information Security Agency (Zentralstelle für Sicherheit in der Informationstechnik) on behalf of the German Government, Köln: Bundesanzeiger
-
IT-Security Criteria, "Criteria for the evaluation of trustworthiness of information technology systems," German Information Security Agency (Zentralstelle für Sicherheit in der Informationstechnik) on behalf of the German Government, Köln: Bundesanzeiger, 1989.
-
(1989)
Criteria for the Evaluation of Trustworthiness of Information Technology Systems
-
-
-
8
-
-
84947900806
-
Secure copyright protection techniques for digital images
-
Second Workshop on Information Hiding D. Aucsmith, Ed. Portland, OR, Apr. 16-18
-
A. Herrigel, et al., "Secure copyright protection techniques for digital images," in Second Workshop on Information Hiding (Lecture Notes in Computer Science, vol. 1525), D. Aucsmith, Ed. Portland, OR, Apr. 16-18, 1998, pp. 218-238.
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 218-238
-
-
Herrigel, A.1
-
9
-
-
0032656890
-
Copy protection for D.V.D. video
-
July
-
J.A. Bloom, I.J. Cox, T. Kalker, J.-P.M.G. Linnartz, M.L. Miller, and C.B.S. Traw, "Copy protection for D.V.D. video," Proc. IEEE, vol. 87, pp. 1267-1276, July 1999.
-
(1999)
Proc. IEEE
, vol.87
, pp. 1267-1276
-
-
Bloom, J.A.1
Cox, I.J.2
Kalker, T.3
Linnartz, J.-P.M.G.4
Miller, M.L.5
Traw, C.B.S.6
-
10
-
-
0002949261
-
Fingerprinting
-
S.C. Katzenbeisser et al., Eds. Norwood, MA: Artech House, Dec.
-
J.-H. Lee, "Fingerprinting," in Information Hiding Techniques for Steganography and Digital Watermarking, S.C. Katzenbeisser et al., Eds. Norwood, MA: Artech House, Dec. 1999, pp. 175-190.
-
(1999)
Information Hiding Techniques for Steganography and Digital Watermarking
, pp. 175-190
-
-
Lee, J.-H.1
-
11
-
-
84980388463
-
If one watermark is good, are more better?
-
Phoenix, AZ, 15-19 Mar.
-
F. Mintzer and G.W. Braudaway, "If one watermark is good, are more better?" in Proc. Int. Conf. Acoustics, Speech and Signal Processing (ICASSP'99), Phoenix, AZ, 15-19 Mar. 1999, vol. 4, pp. 2067-2070.
-
(1999)
Proc. Int. Conf. Acoustics, Speech and Signal Processing (ICASSP'99)
, vol.4
, pp. 2067-2070
-
-
Mintzer, F.1
Braudaway, G.W.2
-
12
-
-
0007751316
-
Analysis of the sensitivity attack against electronic watermarks in images
-
Second Workshop on Information Hiding, D. Aucsmith, Ed. Portland, OR, 25-27 Apr.
-
J.-P.M.G. Linnartz and M. van Dijk, "Analysis of the sensitivity attack against electronic watermarks in images," in Second Workshop on Information Hiding (Lecture Notes in Computer Science, vol. 1525), D. Aucsmith, Ed. Portland, OR, 25-27 Apr. 1998, pp. 218-238.
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 218-238
-
-
Linnartz, J.-P.M.G.1
Van Dijk, M.2
-
13
-
-
0000608018
-
Transaction security system
-
D.G. Abraham et al., "Transaction security system," IBM Syst. J., vol. 30, no. 2, pp. 206-229, 1991.
-
(1991)
IBM Syst. J.
, vol.30
, Issue.2
, pp. 206-229
-
-
Abraham, D.G.1
-
14
-
-
0003185688
-
La cryptographie militaire
-
Jan.
-
A. Kerckhoffs, "La cryptographie militaire," J. Sciences Militaires, vol. 9, pp. 5-38, Jan. 1883.
-
(1883)
J. Sciences Militaires
, vol.9
, pp. 5-38
-
-
Kerckhoffs, A.1
-
15
-
-
0005019117
-
Watermarking in the real world: An application to DVD
-
Bristol, U.K., Sept. 12-13
-
M.L. Miller, I.J. Cox, and J.A. Bloom, "Watermarking in the real world: An application to DVD," in Proc. Multimedia and Security - Workshop at ACM Multimedia '98, Bristol, U.K., Sept. 12-13, 1998, pp. 71-76.
-
(1998)
Proc. Multimedia and Security - Workshop at ACM Multimedia '98
, pp. 71-76
-
-
Miller, M.L.1
Cox, I.J.2
Bloom, J.A.3
-
16
-
-
33749601649
-
Principles of steganography
-
S.C. Katzenbeisser et al., Eds. Norwood, MA: Artech House, Dec.
-
S.C. Katzenbeisser, "Principles of steganography," in Information Hiding Techniques for Steganography and Digital Watermarking, S.C. Katzenbeisser et al., Eds. Norwood, MA: Artech House, Dec. 1999, pp. 30-31.
-
(1999)
Information Hiding Techniques for Steganography and Digital Watermarking
, pp. 30-31
-
-
Katzenbeisser, S.C.1
-
17
-
-
85032783529
-
-
http://www.cl.cam.ac.uk/~fapp2/watermarking/stirmark/
-
-
-
|