DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System
暂无分享,去创建一个
[1] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[2] Jian Zhao,et al. Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.
[3] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[4] Rudolf Lide,et al. Finite fields , 1983 .
[5] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[6] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[7] Eckhard Koch,et al. Towards Robust and Hidden Image Copyright Labeling , 1995 .
[8] Birgit Pfitzmann,et al. Asymmetric Fingerprinting (Extended Abstract) , 1996, EUROCRYPT.
[9] J. Massey,et al. Communications and Cryptography: Two Sides of One Tapestry , 1994 .
[10] Lawrence O'Gorman,et al. Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.
[11] David A. Kahn. The history of cryptography , 1996 .
[12] Andrew Z. Tirkel,et al. TOWARDS A ROBUST DIGITAL WATERMARK , 1995 .
[13] Gordon W. Braudaway,et al. Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.
[14] W. J. Dowling,et al. Watermarking digital images for copyright protection , 1996 .
[15] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[16] Willi Meier,et al. The Self-Shrinking Generator , 1994, EUROCRYPT.
[17] David Kahn,et al. The History of Steganography , 1996, Information Hiding.