메뉴 건너뛰기




Volumn 5306, Issue , 2004, Pages 848-858

Attacking digital watermarks

Author keywords

Information Hiding; Rights Protection; Theoretical Bounds; Watermarking

Indexed keywords

ALGORITHMS; COMPUTER SCIENCE; DATA PROCESSING; DATABASE SYSTEMS; MATHEMATICAL TRANSFORMATIONS; OUTSOURCING; PROBABILITY;

EID: 8844285189     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.525201     Document Type: Conference Paper
Times cited : (6)

References (30)
  • 3
    • 8844241681 scopus 로고    scopus 로고
    • Watermarking: Who cares? does it work?
    • Multimedia and Security - Workshop at ACM Multimedia'98, J. Dittmann, P. Wohlmacher, P. Horster, and R. Steinmetz, ACM, GMD - Forschungszentrum Informationstechnik GmbH, Darmstadt, Germany, (Bristol, United Kingdom), Sept.
    • E. J. Delp, "Watermarking: Who cares? does it work?," in Multimedia and Security - Workshop at ACM Multimedia'98, J. Dittmann, P. Wohlmacher, P. Horster, and R. Steinmetz, eds., GMD Report 41, pp. 123-137, ACM, GMD - Forschungszentrum Informationstechnik GmbH, Darmstadt, Germany, (Bristol, United Kingdom), Sept. 1998.
    • (1998) GMD Report , vol.41 , pp. 123-137
    • Delp, E.J.1
  • 5
    • 8844276208 scopus 로고    scopus 로고
    • Public policy: New on-line surveys: Digital watermarking
    • Feb.
    • B. Ellis, "Public policy: New on-line surveys: Digital watermarking," Computer Graphics 33, pp. 39-39, Feb. 1999.
    • (1999) Computer Graphics , vol.33 , pp. 39-39
    • Ellis, B.1
  • 6
    • 0343075424 scopus 로고    scopus 로고
    • Digital watermarking: Historical roots
    • IBM Japan, Tokyo, Japan, Apr.
    • M. Kobayashi, "Digital watermarking: Historical roots," IBM Research Report RT0199, IBM Japan, Tokyo, Japan, Apr. 1997.
    • (1997) IBM Research Report , vol.RT0199
    • Kobayashi, M.1
  • 7
    • 84957877979 scopus 로고    scopus 로고
    • Attacks on copyright marking systems
    • Information Hiding: Second International Workshop, D. Aucsmith, ed., Springer-Verlag, (Portland, Oregon, U.S.A.)
    • F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Attacks on copyright marking systems," in Information Hiding: Second International Workshop, D. Aucsmith, ed., Lecture Notes in Computer Science 1525, pp. 218-238, Springer-Verlag, (Portland, Oregon, U.S.A.), 1998.
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 218-238
    • Petitcolas, F.A.P.1    Anderson, R.J.2    Kuhn, M.G.3
  • 8
    • 0032680807 scopus 로고    scopus 로고
    • Information hiding - A survey
    • July Special issue on protection of multimedia content
    • F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding - a survey," Proceedings of the IEEE 87, pp. 1062-1078, July 1999. Special issue on protection of multimedia content.
    • (1999) Proceedings of the IEEE , vol.87 , pp. 1062-1078
    • Petitcolas, F.A.P.1    Anderson, R.J.2    Kuhn, M.G.3
  • 10
    • 0032116585 scopus 로고    scopus 로고
    • A generic digital watermarking model
    • Aug.
    • J. Zhao and E. Koch, "A generic digital watermarking model," Computers and Graphics 22, pp. 397-403, Aug. 1998.
    • (1998) Computers and Graphics , vol.22 , pp. 397-403
    • Zhao, J.1    Koch, E.2
  • 11
    • 0032691819 scopus 로고    scopus 로고
    • Software watermarking: Models and dynamic embeddings
    • (San Antonio, TX), Jan.
    • C. Collberg and C. Thomborson, "Software watermarking: Models and dynamic embeddings," in Principles of Programming Languages, (San Antonio, TX), Jan. 1999.
    • (1999) Principles of Programming Languages
    • Collberg, C.1    Thomborson, C.2
  • 16
    • 8844262766 scopus 로고    scopus 로고
    • On watermarking abstract semi-structures
    • Proceedings of IWDW 2003, CERIAS TR 2001-54
    • R. Sion, M. Atallah, and S. Prabhakar, "On watermarking abstract semi-structures," in Proceedings of IWDW 2003, Lecture Notes in Computer Science, CERIAS TR 2001-54, 2002.
    • (2002) Lecture Notes in Computer Science
    • Sion, R.1    Atallah, M.2    Prabhakar, S.3
  • 17
    • 84957670625 scopus 로고
    • Collusion-secure fingerprinting for digital data
    • D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," Lecture Notes in Computer Science 963, pp. 452-??, 1995.
    • (1995) Lecture Notes in Computer Science , vol.963 , pp. 452
    • Boneh, D.1    Shaw, J.2
  • 22
    • 8844262766 scopus 로고    scopus 로고
    • On watermarking numeric sets
    • Proceedings of IWDW 2002, CERIAS TR 2001-60, Springer-Verlag
    • R. Sion, M. Atallah, and S. Prabhakar, "On watermarking numeric sets," in Proceedings of IWDW 2002, Lecture Notes in Computer Science, CERIAS TR 2001-60, Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science
    • Sion, R.1    Atallah, M.2    Prabhakar, S.3
  • 23
    • 33750923026 scopus 로고    scopus 로고
    • Power: Metrics for evaluating watermarking algorithms
    • CERIAS TR 2001-55, IEEE Computer Society Press
    • R. Sion, M. Atallah, and S. Prabhakar, "Power: Metrics for evaluating watermarking algorithms," in Proceedings of IEEE ITCC 2002, CERIAS TR 2001-55, IEEE Computer Society Press, 2002.
    • (2002) Proceedings of IEEE ITCC 2002
    • Sion, R.1    Atallah, M.2    Prabhakar, S.3
  • 24
    • 8844261355 scopus 로고    scopus 로고
    • Analog output-stage fingerprinting in DMAT/SDMI
    • CERIAS TR 2001-53
    • R. Sion, "Analog output-stage fingerprinting in DMAT/SDMI," in Watermarking 2002, CERIAS TR 2001-53, 2002.
    • (2002) Watermarking 2002
    • Sion, R.1
  • 25
    • 8844242685 scopus 로고    scopus 로고
    • Key pre-commitment in watermarking
    • submission for review
    • R. Sion, M. Atallah, and S. Prabhakar, "Key pre-commitment in watermarking," in (submission for review), CERIAS TR 2002-30, 2002.
    • (2002) CERIAS TR , vol.2002 , Issue.30
    • Sion, R.1    Atallah, M.2    Prabhakar, S.3
  • 27
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal 28, pp. 656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.1
  • 29
    • 84957887122 scopus 로고    scopus 로고
    • On public-key steganography in the presence of an active warden
    • S. Graver, "On public-key steganography in the presence of an active warden," in Information Hiding, pp. 355-368, 1998.
    • (1998) Information Hiding , pp. 355-368
    • Graver, S.1
  • 30
    • 84955568589 scopus 로고    scopus 로고
    • Information hiding terminology
    • Information hiding: first international workshop, R. Anderson, ed., Springer-Verlag
    • B. Pfitzmann, "Information hiding terminology," in Information hiding: first international workshop, R. Anderson, ed., Lecture Notes in Computer Science 1174, pp. 347-350, Springer-Verlag, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1174 , pp. 347-350
    • Pfitzmann, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.