Digital rights management for digital cinema
暂无分享,去创建一个
[1] Harry L. Van Trees,et al. Detection, Estimation, and Modulation Theory, Part I , 1968 .
[2] Lev Vaitzblit. A High-Resolution Video Server for Cinema of the Future , 1995, IEEE Multim..
[3] Josh Benaloh,et al. Key Compression and its Application to Digital Fingerprinting , 2001 .
[4] Amos Fiat,et al. Dynamic Traitor Training , 1999, CRYPTO.
[5] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[6] Sean W. Smith,et al. Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.
[7] Ahmed H. Tewfik,et al. Robust audio watermarking using perceptual masking , 1998, Signal Process..
[8] Bernd Girod,et al. Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.
[9] Ingemar J. Cox,et al. A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.
[10] Rosario Gennaro,et al. How to Sign Digital Streams , 1997, CRYPTO.
[11] Jean-Paul M. G. Linnartz,et al. Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.
[12] Darko Kirovski,et al. Robust spread-spectrum audio watermarking , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[13] A. E. Bell. The dynamic digital disk , 1999 .
[14] Edward J. Delp,et al. An overview of multimedia content protection in consumer electronics devices , 2001, Signal Process. Image Commun..
[15] Birgit Pfitzmann,et al. Error- and Collusion-Secure Fingerprinting for Digital Data , 1999, Information Hiding.
[16] Steven A. Morley. Making Digital Cinema Actually Happen – What it Takes and Who's Going to Do It , 1998 .
[17] Joseph A. O'Sullivan,et al. Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.
[18] Jean-Jacques Quisquater,et al. Integrated fingerprinting in secure digital cinema projection , 2001, Optics + Photonics.
[19] Derrick Grover,et al. The Protection of Computer Software: Its Technology and Application , 1992 .
[20] J. van Leeuwen,et al. Information Hiding , 1999, Lecture Notes in Computer Science.
[21] Joe Kilian,et al. A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.
[22] Bennet S. Yee,et al. Using Secure Coprocessors , 1994 .
[23] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[24] Markus G. Kuhn. Attacks on Pay-TV Access Control Systems , 1997 .
[25] Marcus Peinado. Digital Rights Management in a Multimedia Environment , 2002 .
[26] Xin Wang,et al. XrML -- eXtensible rights Markup Language , 2002, XMLSEC '02.
[27] Bernd Girod,et al. Power-spectrum condition for energy-efficient watermarking , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[28] Cherié L. Weible,et al. The Internet Movie Database , 2001 .
[29] Darko Kirovski,et al. Robust Covert Communication over a Public Audio Channel Using Spread Spectrum , 2001, Information Hiding.
[30] C. Brendan S. Traw. Protecting Digital Content within the Home , 2001, Computer.
[31] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[32] H. V. Trees. Detection, Estimation, And Modulation Theory , 2001 .
[33] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[34] Ioannis Pitas,et al. Robust audio watermarking in the time domain , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[35] Madhu Sudan,et al. Decoding of Reed Solomon Codes beyond the Error-Correction Bound , 1997, J. Complex..
[36] O. Antoine,et al. Theory of Error-correcting Codes , 2022 .
[37] Amos Fiat,et al. Dynamic Traitor Tracing , 2001, Journal of Cryptology.
[38] P. D. Lubell. A coming attraction: digital cinema , 2000 .
[39] Walter Bender,et al. Echo Hiding , 1996, Information Hiding.
[40] Gregory W. Wornell,et al. Digital watermarking and information embedding using dither modulation , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[41] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[42] Avishai Wool. Key management for encrypted broadcast , 1998, CCS '98.
[43] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[44] D. P. Maher,et al. Music on the Internet and the intellectual property protection problem , 1997, ISIE '97 Proceeding of the IEEE International Symposium on Industrial Electronics.
[45] Ingemar J. Cox,et al. Copy protection for DVD video , 1999, Proc. IEEE.
[46] James H. Burrows,et al. Secure Hash Standard , 1995 .
[47] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data (Extended Abstract) , 1995, CRYPTO.
[48] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[49] T.D.C. Little. Multimedia at work: A high-resolution video server for cinema of the future , 1995, IEEE MultiMedia.