An efficient buyer-seller watermarking protocol based on composite signal representation
暂无分享,去创建一个
[1] Jan Camenisch,et al. Group Signatures: Better Efficiency and New Theoretical Aspects , 2004, SCN.
[2] Zekeriya Erkin,et al. Anonymous Fingerprinting with Robust QIM Watermarking Techniques , 2007, EURASIP J. Inf. Secur..
[3] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[4] Bart Preneel,et al. Anonymous Buyer-Seller Watermarking Protocol wth Additive Homomorphism , 2008, SIGMAP.
[5] Ahmad-Reza Sadeghi,et al. Anonymous Fingerprinting with Direct Non-repudiation , 2000, ASIACRYPT.
[6] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[7] Jan Camenisch,et al. Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes , 1998, EUROCRYPT.
[8] Pierre Moulin,et al. Data-Hiding Codes , 2005, Proceedings of the IEEE.
[9] Jan Camenisch,et al. Practical Verifiable Encryption and Decryption of Discrete Logarithms , 2003, CRYPTO.
[10] Ingemar J. Cox,et al. Watermarking as communications with side information , 1999, Proc. IEEE.
[11] Stefan Katzenbeisser,et al. A Buyer–Seller Watermarking Protocol Based on Secure Embedding , 2008, IEEE Transactions on Information Forensics and Security.
[12] Stefan Katzenbeisser,et al. Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing , 2007, EURASIP J. Inf. Secur..
[13] Chin-Laung Lei,et al. An efficient and anonymous buyer-seller watermarking protocol , 2004, IEEE Transactions on Image Processing.
[14] Mauro Barni,et al. Efficient pointwise and blockwise encrypted operations , 2008, MM&Sec '08.
[15] Nasir D. Memon,et al. A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[16] Minoru Kuribayashi,et al. Fingerprinting protocol for images based on additive homomorphic property , 2005, IEEE Transactions on Image Processing.
[17] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[18] Jan Camenisch. Efficient Anonymous Fingerprinting with Group Signatures , 2000, ASIACRYPT.
[19] Jacques Stern,et al. Fair Encryption of RSA Keys , 2000, EUROCRYPT.
[20] Ivan Damgård,et al. Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions , 2000, Public Key Cryptography.
[21] Tal Rabin,et al. An efficient non-interactive statistical zero-knowledge proof system for quasi-safe prime products , 1998, CCS '98.
[22] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[23] Mihir Bellare,et al. Foundations of Group Signatures: The Case of Dynamic Groups , 2005, CT-RSA.
[24] Birgit Pfitzmann,et al. Asymmetric fingerprinting , 1996 .
[25] C. Mosquera,et al. Rational dither modulation: a high-rate data-hiding method invariant to gain attacks , 2005, IEEE Transactions on Signal Processing.