Attacks on Copyright Marking Systems
暂无分享,去创建一个
Markus G. Kuhn | Ross J. Anderson | Fabien A. P. Petitcolas | Ross J. Anderson | F. Petitcolas | M. Kuhn
[1] Alan V. Oppenheim,et al. Discrete-Time Signal Pro-cessing , 1989 .
[2] Awj Werner Oomen,et al. A Variable-Bit-Rate Buried-Data Channel for Compact Disc , 1995 .
[3] Ahmed H. Tewfik,et al. Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[4] Bruce Schneier,et al. Protocol Interactions and the Chosen Protocol Attack , 1997, Security Protocols Workshop.
[5] Gerhard C. Langelaar,et al. Copy Protection for Multimedia Data based on Labeling Techniques , 1998 .
[6] Maurice Maes,et al. Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks , 1998, Information Hiding.
[7] Ross J. Anderson,et al. Programming Satan's Computer , 1995, Computer Science Today.
[8] W. J. Dowling,et al. Watermarking digital images for copyright protection , 1996 .
[9] Bin Zhu,et al. Robust data hiding for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.
[10] Wendy J. Holmes,et al. Speech Synthesis and Recognition , 1988 .
[11] Jean-Paul M. G. Linnartz,et al. Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.
[12] Birgit Pfitzmann,et al. Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals , 1996, Information Hiding.
[13] Thierry Pun,et al. Secure Copyright Protection Techniques for Digital Images , 1998, Information Hiding.
[14] Ross J. Anderson. Stretching the Limits of Steganography , 1996, Information Hiding.
[15] Ioannis Pitas,et al. A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[16] Ingemar J. Cox,et al. A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.
[17] Shelby Pereira,et al. Secure robust digital image watermark , 1998, Other Conferences.
[18] Eckhard Koch,et al. Towards Robust and Hidden Image Copyright Labeling , 1995 .
[19] Pamela Samuelson,et al. Copyright and digital libraries , 1995, CACM.
[20] Markus Schneider,et al. Spatial Data Types for Database Systems , 1997, Lecture Notes in Computer Science.
[21] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[22] Ross Anderson,et al. Information hiding terminology , 1996 .
[23] Ross J. Anderson. Why cryptosystems fail , 1993, CCS '93.
[24] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[25] Bernice E. Rogowitz,et al. Human Vision and Electronic Imaging II , 1997 .
[26] M. Yeung,et al. Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.
[27] Christophe De Vleeschouwer,et al. Low-cost perceptive digital picture watermarking method , 1997, Electronic Imaging.
[28] Edward J. Delp,et al. A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[29] Ingo Stierand,et al. Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best , 1996, Information Hiding.
[30] Jian Zhao,et al. Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.
[31] Reginald L. Lagendijk,et al. Robust labeling methods for copy protection of images , 1997, Electronic Imaging.
[32] Ahmed H. Tewfik,et al. Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).
[33] Ting Chen,et al. Time-scale modification of audio signals with combined harmonic and wavelet representations , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[34] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[35] Michael A. Gerzon,et al. A High-Rate Buried-Data Channel for Audio CD , 1995 .
[36] Ingemar J. Cox,et al. Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.
[37] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[38] David Aucsmith,et al. Tamper Resistant Software: An Implementation , 1996, Information Hiding.
[39] Adrian Perrig,et al. A Copyright Protection Environment for Digital Images , 1997, Verläßliche IT-Systeme.
[40] Walter Bender,et al. Echo Hiding , 1996, Information Hiding.
[41] B. P. Bogert,et al. The quefrency analysis of time series for echoes : cepstrum, pseudo-autocovariance, cross-cepstrum and saphe cracking , 1963 .
[42] Robert A. Scholtz,et al. The Origins of Spread-Spectrum Communications , 1982, IEEE Trans. Commun..
[43] Eli Biham. Fast software encryption : 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997 : proceedings , 1997, FSE 1997.
[44] R. Schafer. Echo removal by discrete generalized linear filtering. , 1969 .
[45] Jian Zhao. A WWW SERVICE TO EMBED AND PROVE DIGITAL COPYRIGHT WATERMARKS , 1996 .
[46] John P. Oakley,et al. Storage and Retrieval for Image and Video Databases , 1993 .
[47] John McHugh,et al. A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[48] Laurence Boney,et al. Tewfik and Khaled N. Hamdy, Digital Watermarks for Audio Signals , 1996 .
[49] Fabien A. P. Petitcolas,et al. Weakness of existing watermarking schemes , 1997 .
[50] Birgit Pfitzmann,et al. Trials of Traced Traitors , 1996, Information Hiding.
[51] Charalampos Manifavas,et al. Chameleon - A New Kind of Stream Cipher , 1997, FSE.