References
- Information Hiding Lecture Notes in Computer Science v.1174 Steretching the Limits of Steganography Ross Anderson https://doi.org/10.1007/3-540-61996-8_30
- Information Hiding Lecture Notes in Computer Science v.1174 A Progress Report on Subliminal-Free Channels Mike Burmester;Yvo Desmedt;Toshiya Itoh;Kouichi Sakurai;Hiroki Shizura;Moti Yung https://doi.org/10.1007/3-540-61996-8_39
- Information Hiding Lecture Notes in Computer Science v.114 Information Hiding Therminology Bright Pfitzman
- Proc of IHW'98 Steganography An Information Hiding Lecture Notes in Computer Science C. Cachin
- Proc of IHW'98 Modeling the Security of Steganographic Systems J. Zollner;H. Federrath;H. Klimant;A. Pfitzmann;R. Piotraschke;A. Westfeld;G. Wickee;G. Wolf
- Proc of IHW'98 On Public-Key Steganography in the Presence of an Active Warden Scott Craver
- Proc of IHW'99 An Information Theoretic Approach to Steganography and Watermarking Thomas Mittelholzer
- Proceedings of ICIP 97 v.1 DCT-based watermark recovering without resorting to the uncorrupted original image A. Piva.(et al) https://doi.org/10.1109/ICIP.1997.647964
- Information Hiding Lecture Notes in Computer Science v.1768 Attacks on Steganographic Systems Andress Westfeld;Andress Pfitzmann
- IEEE Trans On Image Processing v.6 no.12 Secure spread spectrum watermarking for multimedia I. Cox(et al) https://doi.org/10.1109/83.650120
- Information Hiding Lecture Notes in Computer Science v.1174 A Secure Robust Watermark for Multimedia Software Watermarking: Models and dynamic embedding Ingemar. J. Cox;Joe. Kilian;tom Leighton; Talal Shamoon https://doi.org/10.1007/3-540-61996-8_41
- In Principles of programming Languages, POPL'99 San Antonio. TX Software Watermarking: Models and dynamic embedding C. Collberg;C. Thomborson
- Communications of the ACM v.16 no.10 A Note on the Confinement Problem Lampson. W.B https://doi.org/10.1145/362375.362389
- Dicta-93 Electronic watermark A.Z. Tirkel;G.A. Rankin;R.G. Schyndel. W.J;Ho. N.R;A. Mee; C.F. Osborne
- ACCV'95 A two-dimensional digital watermark A.Z. Tirkel;R.G. Schyndel;C.F. Osborne
- IMA Intellectual Property Project Proceedings Video-Steganography : How to secretly embed a signature in a picture K. Matsui;K. Tanaka
- IEEE International Conference on Image Processing, Stp J.K.O. Ruanaidh;W.J. Dowling;F.M. Boland
- Technical Report, NEC. Research Institute Secure spread spectrum communication for multimedia C. Cox;J. Killian;T. Leighton;T. Shamoon
- Univ. Catholique de Louvain digital Images protection techniques in a broadcast framework: an overview J. F. Delaigel;J.M. Boucqueau;J.J. Quisquater;B. Macq
- Proceedings of Intern Congress on Intellectual Property Rights for Specialized Information. Knowledge and New Technologies Embedding robust labels in to images for copyright protection J. Zhao;E. Koch
- in Advances in Cryptology-Crypto94, Lecture Notes in Computer Science v.1174 Tracing Traitors Chor. B;A. Fiat;M. Naor
- Information Hiding Lecture Notes in Computer Science v.1174 Trials of Traced Traitors Bright Pfitzmann
- Advances in Cryptology-Crypto'95. Lecture Notes in Computer Science v.963 Collusion-Secure Fingerprinting for Digital Data Dan Boneh;James Shaw
- Advances in Cryptology-EuroCrypt'96. Lecture Notes in Computer Science v.1070 Asymmetric Fingerprinting Birgit Pfitzmann;Matthias Schunter https://doi.org/10.1007/3-540-68339-9_8
- Advances in Cryptology-EuroCrypt'97. Lecture Notes in Computer Science v.1233 Anonymous Fingerprinting Michael Waidner https://doi.org/10.1007/3-540-69053-0_8
- Advances in Cryptology-Crypto'99. Lecture Notes in Computer Science v.1666 An Efficient Public Key Traitor Tracing Scheme Dan Boneh;Matthew Franklin https://doi.org/10.1007/3-540-48405-1_22
- Information Hiding Lecture Notes in Computer Science v.1768 Error-and Collusion-Secure Fingerprinting for Digital Data Hans-Jurgen Guth;Brigit Pfitzmann
- Advances in Cryptology-ASIACRYPT 2000, Kyoto. Japan. Efficient Anonymous Fingerprinting with Group Signatures Jan Camenisch
- Information Hiding Lecture Notes in Computer Science v.1768 Proving Ownership of digital Content Andre Adelsbach;Birgit Pfitzmann;Ahmad-Reza Sadeghi