Digital rights management for digital cinema
暂无分享,去创建一个
[1] Dan. Collusion-Secure Fingerprinting for Digital Data , 2002 .
[2] Ahmed H. Tewfik,et al. Robust audio watermarking using perceptual masking , 1998, Signal Process..
[3] Ingemar J. Cox,et al. A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.
[4] Gregory W. Wornell,et al. Digital watermarking and information embedding using dither modulation , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[5] Josh Benaloh,et al. Key Compression and its Application to Digital Fingerprinting , 2001 .
[6] Jean-Paul M. G. Linnartz,et al. Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.
[7] Lev Vaitzblit. A High-Resolution Video Server for Cinema of the Future , 1995, IEEE Multim..
[8] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[9] Markus G. Kuhn. Attacks on Pay-TV Access Control Systems , 1997 .
[10] Darko Kirovski,et al. Robust Covert Communication over a Public Audio Channel Using Spread Spectrum , 2001, Information Hiding.
[11] Bernd Girod,et al. Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.
[12] Birgit Pfitzmann,et al. Error- and Collusion-Secure Fingerprinting for Digital Data , 1999, Information Hiding.
[13] Darko Kirovski,et al. Robust spread-spectrum audio watermarking , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[14] Ioannis Pitas,et al. Robust audio watermarking in the time domain , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[15] Joseph A. O'Sullivan,et al. Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.
[16] Madhu Sudan,et al. Decoding of Reed Solomon Codes beyond the Error-Correction Bound , 1997, J. Complex..
[17] Walter Bender,et al. Echo Hiding , 1996, Information Hiding.
[18] Derrick Grover,et al. The Protection of Computer Software: Its Technology and Application , 1992 .
[19] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[20] D. P. Maher,et al. Music on the Internet and the intellectual property protection problem , 1997, ISIE '97 Proceeding of the IEEE International Symposium on Industrial Electronics.
[21] P. D. Lubell. A coming attraction: digital cinema , 2000 .
[22] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[23] Xin Wang,et al. XrML -- eXtensible rights Markup Language , 2002, XMLSEC '02.
[24] Bernd Girod,et al. Power-spectrum condition for energy-efficient watermarking , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[25] Joe Kilian,et al. A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.
[26] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .