Which directions for asymmetric watermarking?
暂无分享,去创建一个
[1] T. Furon,et al. Robustness of asymmetric watermarking technique , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[2] Stefan Katzenbeisser,et al. Copyright Protection Protocols Based on Asymmetric Watermarking , 2001 .
[3] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[4] Pierre Duhamel,et al. An Asymmetric Public Detection Watermarking Technique , 1999, Information Hiding.
[5] Scott Craver. Zero Knowledge Watermark Detection , 1999, Information Hiding.
[6] Jean-Jacques Quisquater,et al. Biometrics, Access Control, Smart Cards: A not so Simple Combination , 2000, CARDIS.
[7] Bernd Girod,et al. Public key watermarking by eigenvectors of linear transforms , 2000, 2000 10th European Signal Processing Conference.
[8] Bernd Girod,et al. Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.
[9] Bernd Girod,et al. Asymmetric Watermarking Schemes , 2000 .
[10] Martin F. H. Schuurmans,et al. Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.
[11] Imants D. Svalbe,et al. Key independent watermark detection , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[12] David Naccache,et al. How to Copyright a Function? , 1999, Public Key Cryptography.
[13] Stefan Katzenbeisser,et al. Security analysis of public key watermarking schemes , 2001, SPIE Optics + Photonics.