-
2
-
-
0003302360
-
Public watermarks and resistance to tampering
-
IEEE, (Santa Barbara, California, U.S.A.), 26-29 Oct.
-
I. J. Cox and J.-P. M. G. Linnartz, "Public watermarks and resistance to tampering," in International Conference on Image Processing (ICIP'97), IEEE, (Santa Barbara, California, U.S.A.), 26-29 Oct. 1997.
-
(1997)
International Conference on Image Processing (ICIP'97)
-
-
Cox, I.J.1
Linnartz, J.-P.M.G.2
-
3
-
-
8844241681
-
Watermarking: Who cares? does it work?
-
Multimedia and Security - Workshop at ACM Multimedia'98, J. Dittmann, P. Wohlmacher, P. Horster, and R. Steinmetz, ACM, GMD - Forschungszentrum Informationstechnik GmbH, Darmstadt, Germany, (Bristol, United Kingdom), Sept.
-
E. J. Delp, "Watermarking: Who cares? does it work?," in Multimedia and Security - Workshop at ACM Multimedia'98, J. Dittmann, P. Wohlmacher, P. Horster, and R. Steinmetz, eds., GMD Report 41, pp. 123-137, ACM, GMD - Forschungszentrum Informationstechnik GmbH, Darmstadt, Germany, (Bristol, United Kingdom), Sept. 1998.
-
(1998)
GMD Report
, vol.41
, pp. 123-137
-
-
Delp, E.J.1
-
5
-
-
8844276208
-
Public policy: New on-line surveys: Digital watermarking
-
Feb.
-
B. Ellis, "Public policy: New on-line surveys: Digital watermarking," Computer Graphics 33, pp. 39-39, Feb. 1999.
-
(1999)
Computer Graphics
, vol.33
, pp. 39-39
-
-
Ellis, B.1
-
6
-
-
0343075424
-
Digital watermarking: Historical roots
-
IBM Japan, Tokyo, Japan, Apr.
-
M. Kobayashi, "Digital watermarking: Historical roots," IBM Research Report RT0199, IBM Japan, Tokyo, Japan, Apr. 1997.
-
(1997)
IBM Research Report
, vol.RT0199
-
-
Kobayashi, M.1
-
7
-
-
84957877979
-
Attacks on copyright marking systems
-
Information Hiding: Second International Workshop, D. Aucsmith, ed., Springer-Verlag, (Portland, Oregon, U.S.A.)
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Attacks on copyright marking systems," in Information Hiding: Second International Workshop, D. Aucsmith, ed., Lecture Notes in Computer Science 1525, pp. 218-238, Springer-Verlag, (Portland, Oregon, U.S.A.), 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 218-238
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
8
-
-
0032680807
-
Information hiding - A survey
-
July Special issue on protection of multimedia content
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding - a survey," Proceedings of the IEEE 87, pp. 1062-1078, July 1999. Special issue on protection of multimedia content.
-
(1999)
Proceedings of the IEEE
, vol.87
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
9
-
-
84899222977
-
Digital watermarking: An overview
-
S. Theodoridis et al., eds., Typorama Editions, (Patras, Greece)
-
G. Voyatzis, N. Nikolaidis, and I. Pitas, "Digital watermarking: an overview," in Signal processing IX, theories and applications: proceedings of Eusipco-98, Ninth European Signal Processing Conference, S. Theodoridis et al., eds., pp. 9-12, Typorama Editions, (Patras, Greece), 1998.
-
(1998)
Signal Processing IX, Theories and Applications: Proceedings of Eusipco-98, Ninth European Signal Processing Conference
, pp. 9-12
-
-
Voyatzis, G.1
Nikolaidis, N.2
Pitas, I.3
-
10
-
-
0032116585
-
A generic digital watermarking model
-
Aug.
-
J. Zhao and E. Koch, "A generic digital watermarking model," Computers and Graphics 22, pp. 397-403, Aug. 1998.
-
(1998)
Computers and Graphics
, vol.22
, pp. 397-403
-
-
Zhao, J.1
Koch, E.2
-
11
-
-
0032691819
-
Software watermarking: Models and dynamic embeddings
-
(San Antonio, TX), Jan.
-
C. Collberg and C. Thomborson, "Software watermarking: Models and dynamic embeddings," in Principles of Programming Languages, (San Antonio, TX), Jan. 1999.
-
(1999)
Principles of Programming Languages
-
-
Collberg, C.1
Thomborson, C.2
-
12
-
-
84949509764
-
Experience with software watermarking
-
J. Palsberg, S. Krishnaswamy, M. Kwon, D. Ma, Q. Shao, and Y. Zhang, "Experience with software watermarking," in Proceedings of ACSAC, 16th Annual Computer Security Applications Conference, pp. 308-316, 2000.
-
(2000)
Proceedings of ACSAC, 16th Annual Computer Security Applications Conference
, pp. 308-316
-
-
Palsberg, J.1
Krishnaswamy, S.2
Kwon, M.3
Ma, D.4
Shao, Q.5
Zhang, Y.6
-
13
-
-
77953750858
-
Natural language watermarking: Design, analysis, and a proof-of-concept implementation
-
Pittsburgh, Pennsylvania, Springer Verlag
-
M. Atallah, V. R. (with M. Crogan, C. Hempelmann, F. Kerschbaum, D. Mohamed, and S. Naik), "Natural language watermarking: Design, analysis, and a proof-of-concept implementation," in Lecture Notes in Computer Science, Proc. 4th International Information Hiding Workshop, Pittsburgh, Pennsylvania, Springer Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science, Proc. 4th International Information Hiding Workshop
-
-
Atallah, M.1
R., V.2
Crogan, M.3
Hempelmann, C.4
Kerschbaum, F.5
Mohamed, D.6
Naik, S.7
-
16
-
-
8844262766
-
On watermarking abstract semi-structures
-
Proceedings of IWDW 2003, CERIAS TR 2001-54
-
R. Sion, M. Atallah, and S. Prabhakar, "On watermarking abstract semi-structures," in Proceedings of IWDW 2003, Lecture Notes in Computer Science, CERIAS TR 2001-54, 2002.
-
(2002)
Lecture Notes in Computer Science
-
-
Sion, R.1
Atallah, M.2
Prabhakar, S.3
-
17
-
-
84957670625
-
Collusion-secure fingerprinting for digital data
-
D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," Lecture Notes in Computer Science 963, pp. 452-??, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.963
, pp. 452
-
-
Boneh, D.1
Shaw, J.2
-
18
-
-
84863688391
-
An information-theoretic approach to the design of robust digital watermarking systems
-
Phoenix, AZ
-
B. Chen and G. Wornell, "An information-theoretic approach to the design of robust digital watermarking systems," in Proc. Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), Phoenix, AZ, 1999.
-
(1999)
Proc. Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP)
-
-
Chen, B.1
Wornell, G.2
-
21
-
-
14844326110
-
Natural language watermarking and tamperproofing
-
Springer Verlag
-
M. Atallah, V. Raskin, C. F. Hempelmann, M. Karahan, R. Sion, K. E. Triezenberg, and U. Topkara, "Natural language watermarking and tamperproofing," in Lecture Notes in Computer Science, Proc. 5th International Information Hiding Workshop 2002, Springer Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science, Proc. 5th International Information Hiding Workshop 2002
-
-
Atallah, M.1
Raskin, V.2
Hempelmann, C.F.3
Karahan, M.4
Sion, R.5
Triezenberg, K.E.6
Topkara, U.7
-
22
-
-
8844262766
-
On watermarking numeric sets
-
Proceedings of IWDW 2002, CERIAS TR 2001-60, Springer-Verlag
-
R. Sion, M. Atallah, and S. Prabhakar, "On watermarking numeric sets," in Proceedings of IWDW 2002, Lecture Notes in Computer Science, CERIAS TR 2001-60, Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
-
-
Sion, R.1
Atallah, M.2
Prabhakar, S.3
-
23
-
-
33750923026
-
Power: Metrics for evaluating watermarking algorithms
-
CERIAS TR 2001-55, IEEE Computer Society Press
-
R. Sion, M. Atallah, and S. Prabhakar, "Power: Metrics for evaluating watermarking algorithms," in Proceedings of IEEE ITCC 2002, CERIAS TR 2001-55, IEEE Computer Society Press, 2002.
-
(2002)
Proceedings of IEEE ITCC 2002
-
-
Sion, R.1
Atallah, M.2
Prabhakar, S.3
-
24
-
-
8844261355
-
Analog output-stage fingerprinting in DMAT/SDMI
-
CERIAS TR 2001-53
-
R. Sion, "Analog output-stage fingerprinting in DMAT/SDMI," in Watermarking 2002, CERIAS TR 2001-53, 2002.
-
(2002)
Watermarking 2002
-
-
Sion, R.1
-
25
-
-
8844242685
-
Key pre-commitment in watermarking
-
submission for review
-
R. Sion, M. Atallah, and S. Prabhakar, "Key pre-commitment in watermarking," in (submission for review), CERIAS TR 2002-30, 2002.
-
(2002)
CERIAS TR
, vol.2002
, Issue.30
-
-
Sion, R.1
Atallah, M.2
Prabhakar, S.3
-
27
-
-
84890522850
-
Communication theory of secrecy systems
-
C. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal 28, pp. 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.1
-
28
-
-
0030384775
-
Techniques for data hiding
-
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM Systems Journal 35(3-4), pp. 313-336, 1996.
-
(1996)
IBM Systems Journal
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
29
-
-
84957887122
-
On public-key steganography in the presence of an active warden
-
S. Graver, "On public-key steganography in the presence of an active warden," in Information Hiding, pp. 355-368, 1998.
-
(1998)
Information Hiding
, pp. 355-368
-
-
Graver, S.1
-
30
-
-
84955568589
-
Information hiding terminology
-
Information hiding: first international workshop, R. Anderson, ed., Springer-Verlag
-
B. Pfitzmann, "Information hiding terminology," in Information hiding: first international workshop, R. Anderson, ed., Lecture Notes in Computer Science 1174, pp. 347-350, Springer-Verlag, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1174
, pp. 347-350
-
-
Pfitzmann, B.1
|