A buyer-seller watermarking protocol
暂无分享,去创建一个
[1] Wenjun Zeng,et al. A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images , 1999, IEEE Trans. Image Process..
[2] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[3] Nasir D. Memon,et al. Protecting digital media content , 1998, CACM.
[4] Joshua R. Smith,et al. Modulation and Information Hiding in Images , 1996, Information Hiding.
[5] Sushil Jajodia,et al. Recovery of Watermarks from Distorted Images , 1999, Information Hiding.
[6] Bernd Girod,et al. Watermarking of uncompressed and compressed video , 1998, Signal Process..
[7] Ton Kalker. Digital video watermarking for DVD copy protection , 1999, Optics East.
[8] Gordon W. Braudaway,et al. Automatic recovery of invisible image watermarks from geometrically distorted images , 2000, J. Electronic Imaging.
[9] I. Pitas,et al. The use of watermarks in the protection of digital multimedia products , 1999, Proc. IEEE.
[10] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[11] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[12] Ahmed H. Tewfik,et al. Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.
[13] Jian Zhao,et al. Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.
[14] Michael J. Fischer,et al. A robust and verifiable cryptographically secure election scheme , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[15] Nasir D. Memon,et al. Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal Public Key Crypto System , 1999, Electronic Imaging.
[16] Edward J. Delp,et al. Perceptual watermarks for digital images and video , 1999, Electronic Imaging.
[17] Boon-Lock Yeo,et al. Technical trials and legal tribulations , 1998, CACM.
[18] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[19] Ingemar J. Cox,et al. Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.
[20] Jean-Paul M. G. Linnartz,et al. Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..
[21] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[22] Ingemar J. Cox,et al. Copy protection for DVD video , 1999, Proc. IEEE.
[23] Klara Nahrstedt,et al. Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights , 1998, J. Vis. Commun. Image Represent..
[24] Fernando Pérez-González,et al. Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images , 1998, IEEE J. Sel. Areas Commun..