Approaches to Multimedia and Security : Cryptographic and watermarking algorithms
暂无分享,去创建一个
[1] Jörg Schwenk,et al. Combining digital watermarks and collusion secure fingerprints for digital images , 2000, J. Electronic Imaging.
[2] X Itu,et al. Information technology-open systems interconnection-the directory: Public-key and attribute certific , 2000 .
[3] Jennifer Seberry,et al. Public Key Cryptography , 2000, Lecture Notes in Computer Science.
[4] Ralf Steinmetz,et al. Content-based digital signature for motion pictures authentication and content-fragile watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[5] Ioannis Pitas,et al. Digital image watermarking: an overview , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[6] Carlisle M. Adams,et al. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP , 1999, RFC.
[7] He Huang,et al. Securing QoS threats to RSVP messages and their countermeasures , 1999, 1999 Seventh International Workshop on Quality of Service. IWQoS'99. (Cat. No.98EX354).
[8] Fabien A. P. Petitcolas,et al. Fair benchmark for image watermarking systems , 1999, Electronic Imaging.
[9] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[10] Klara Nahrstedt,et al. Comparison of MPEG encryption algorithms , 1998, Comput. Graph..
[11] Ralf Steinmetz,et al. Interactive watermarking environments , 1998, Proceedings. IEEE International Conference on Multimedia Computing and Systems (Cat. No.98TB100241).
[12] Maurice Maes,et al. Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks , 1998, Information Hiding.
[13] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[14] Paul C. Kocher. On Certificate Revocation and Validation , 1998, Financial Cryptography.
[15] Klara Nahrstedt,et al. Watermarking methods for MPEG encoded video: towards resolving rightful ownership , 1998, Proceedings. IEEE International Conference on Multimedia Computing and Systems (Cat. No.98TB100241).
[16] Thomas Kunkelmann. Sicherheit für Videodaten , 1998 .
[17] Chien-Chang Chen,et al. Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.
[18] Jean-Paul M. G. Linnartz,et al. Public watermarks and resistance to tampering , 1997, Proceedings of International Conference on Image Processing.
[19] Lixia Zhang,et al. Resource ReSerVation Protocol (RSVP) - Version 1 Functional Specification , 1997, RFC.
[20] M. Yeung,et al. Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.
[21] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[22] John P. Oakley,et al. Storage and Retrieval for Image and Video Databases , 1993 .
[23] Ralph C. Merkle,et al. Secrecy, authentication, and public key systems , 1979 .