Watermark detection schemes with high security
暂无分享,去创建一个
[1] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[2] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[3] Paul Douglas,et al. Proceedings International Conference on Information Technology: Coding and Computing , 2002, Proceedings. International Conference on Information Technology: Coding and Computing.
[4] Stefan Katzenbeisser,et al. Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure , 2002, 2002 11th European Signal Processing Conference.
[5] Ahmad-Reza Sadeghi,et al. Zero-Knowledge Watermark Detection and Proof of Ownership , 2001, Information Hiding.
[6] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[7] Nasir D. Memon,et al. Protocols for Watermark Verification , 2001, IEEE Multim..
[8] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[9] Hirotsugu Kinoshita. An image digital signature system with ZKIP for the graph isomorphism , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[10] Stefan Katzenbeisser,et al. Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept , 2001, Communications and Multimedia Security.
[11] Scott Craver. Zero Knowledge Watermark Detection , 1999, Information Hiding.
[12] Ahmad-Reza Sadeghi,et al. Advanced techniques for dispute resolving and authorship proofs on digital works , 2003, IS&T/SPIE Electronic Imaging.
[13] Stefan Katzenbeisser,et al. Watermark detection with zero-knowledge disclosure , 2003, Multimedia Systems.
[14] Ralf Steinmetz,et al. Multimedia and Security Workshop at ACM Multimedia , 1998 .