Joint Watermarking Scheme for Multiparty Multilevel DRM Architecture
暂无分享,去创建一个
Mohan S. Kankanhalli | Tony Thomas | Sabu Emmanuel | A. Venkata Subramanyam | Tony Thomas | S. Emmanuel | M. Kankanhalli | A. Subramanyam
[1] Hongxia Jin,et al. Attacks and Forensic Analysis for Multimedia Content Protection , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[2] Bernd Girod,et al. Watermarking of uncompressed and compressed video , 1998, Signal Process..
[3] Mohan S. Kankanhalli,et al. Copyright protection for MPEG-2 compressed broadcast video , 2001, IEEE International Conference on Multimedia and Expo, 2001. ICME 2001..
[4] Stefan Katzenbeisser,et al. Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks , 2008, IEEE Transactions on Information Forensics and Security.
[5] Hirofumi Muratani. Optimization and Evaluation of Randomized c-Secure CRT Code Defined on Polynomial Ring , 2004, Information Hiding.
[6] Thumrongrat Amornraksa,et al. Scrambling and key distribution scheme for digital television , 2001, Proceedings. Ninth IEEE International Conference on Networks, ICON 2001..
[7] Wu Ye,et al. Key distribution scheme based on two cryptosystems for hierarchical access control , 2006, 2006 8th International Conference Advanced Communication Technology.
[8] Stefan Katzenbeisser,et al. A Buyer–Seller Watermarking Protocol Based on Secure Embedding , 2008, IEEE Transactions on Information Forensics and Security.
[9] Wen-Tsuen Chen,et al. Secure Broadcasting Using the Secure Lock , 1989, IEEE Trans. Software Eng..
[10] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[11] Dong Hoon Lee,et al. An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control , 2002, ICISC.
[12] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[13] Alan C. Bovik,et al. Mean squared error: Love it or leave it? A new look at Signal Fidelity Measures , 2009, IEEE Signal Processing Magazine.
[14] Bart Preneel,et al. On Secure and Anonymous Buyer-Seller Watermarking Protocol , 2008, 2008 Third International Conference on Internet and Web Applications and Services.
[15] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[16] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[17] Seong Oun Hwang,et al. Modeling and implementation of digital rights , 2004, J. Syst. Softw..
[18] Nasir D. Memon,et al. A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[19] Mohan S. Kankanhalli,et al. Secure multimedia content delivery with multiparty multilevel DRM architecture , 2009, NOSSDAV '09.
[20] Charalampos Manifavas,et al. Chameleon - A New Kind of Stream Cipher , 1997, FSE.
[21] Deepa Kundur,et al. Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.
[22] Chun-I Fan,et al. Buyer-seller watermarking protocols with off-line trusted third parties , 2009, Int. J. Ad Hoc Ubiquitous Comput..
[23] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[24] Mohan S. Kankanhalli,et al. Privacy Preserving Multiparty Multilevel DRM Architecture , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.