Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement
暂无分享,去创建一个
[1] Andreas Uhl,et al. Robust Hash Functions for Visual Data: An Experimental Comparison , 2003, IbPRIA.
[2] M. Trimeche,et al. Digital rights management for visual content in mobile applications , 2004, First International Symposium on Control, Communications and Signal Processing, 2004..
[3] Edward J. Delp,et al. Benchmarking of image watermarking algorithms for digital rights management , 2004, Proceedings of the IEEE.
[4] Iskender Agi,et al. An empirical study of secure MPEG video transmissions , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.
[5] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[6] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[7] Ramarathnam Venkatesan,et al. New Iterative Geometric Methods for Robust Perceptual Image Hashing , 2001, Digital Rights Management Workshop.
[8] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[9] Anastasios Tefas,et al. A benchmarking protocol for watermarking methods , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[10] Edward J. Delp,et al. Perceptual watermarks for digital images and video , 1999, Electronic Imaging.
[11] Markus G. Kuhn,et al. Information hiding-A survey : Identification and protection of multimedia information , 1999 .
[12] Nazim Fatès,et al. Public automated web-based evaluation service for watermarking schemes: StirMark benchmark , 2001, IS&T/SPIE Electronic Imaging.
[13] Vishal Monga,et al. Image Authentication Under Geometric Attacks Via Structure Matching , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[14] Min Wu,et al. Collusion-resistant fingerprinting for multimedia , 2004 .
[15] Renato Ianella. Open Digital Rights Language (ODRL) , 2007 .
[16] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[17] Kannan Ramchandran,et al. Dither-based secure image hashing using distributed coding , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[18] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[19] Jiri Fridrich,et al. Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[20] Vishal Monga,et al. Robust perceptual image hashing using feature points , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[21] Chi-Hung Chi,et al. Survey on the Technological Aspects of Digital Rights Management , 2004, ISC.
[22] Frank Hartung,et al. Watermarking of multimedia content for m-commerce applications , 2000 .
[23] Larry Korba,et al. Towards Meeting the Privacy Challenge: Adapting DRM , 2002, Digital Rights Management Workshop.
[24] Cordelia Schmid,et al. A performance evaluation of local descriptors , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[25] Thierry Pun,et al. Second Generation Benchmarking and Application Oriented Evaluation , 2001, Information Hiding.
[26] Min Wu,et al. Collusion-resistant fingerprinting for multimedia , 2002, IEEE Signal Processing Magazine.
[27] Neil J. Hurley,et al. A framework for soft hashing and its application to robust image hashing , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[28] Edward J. Delp,et al. Communications approach to image steganography , 2002, IS&T/SPIE Electronic Imaging.
[29] Stefan Katzenbeisser,et al. Watermarking schemes provably secure against copy and ambiguity attacks , 2003, DRM '03.
[30] Ramarathnam Venkatesan,et al. Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..