1 |
R. G. Van Schyndel, A. z. Tirkel, and I. D. Svalbe, 'Key independent watermark detection,'in Proc, of the IEEE Intl. Conf, on Multimedia Computing and Systems, vol. 1, pp. 580-584, Florence, Italy, June 1999
DOI
|
2 |
H. Choi, K, Lee, and T. Kim, 'Transformedkey asymmetric watermarking system,' in Proc. of SPIE: Security and Watermarking of Multimedia Contents, vol. 4314, pp. 280-289, San Jose, USA, Jan. 2001
|
3 |
J. Smith and C. Dodge, 'Development in steganography,' in Workshop on Information Hiding, pp. 77-87, Dresden, Germany, Oct, 1999
|
4 |
Craver S, 'Zero knowledge watermark detection,' in International Workshop on Information Hiding (IHW'99), Lecture Notes in Computer Science 1768, pp. 101-116, 1999
DOI
|
5 |
Adelsbach A, Katzenbeisser S, Sadeghi AR, 'Cryptography meets watermarking detecting watermarks with minimal or zero knowledge disclosure,' in Proceedings of the European Signal Processing Conference (EUSIPCO' 2002), 2002
|
6 |
J. Picard and A. Robert, 'Neural Networks functions for public key watermarking,' in Workshop on Information Hiding, pp. 142-156, Pittsburgh, PA, USA, Apr, 2001
|
7 |
Craver S, Katzenbeisser S, 'Copyright protection protocols based on asymmetric watermark: The ticket concept,' in Proceedings of the 6th Conference on Communication and Multimedia Security (CMS'01), pp. 159-170, 2001
|
8 |
T. Furon and P. Duhamel, 'An asymmetric public detection watermarking technique,' in Workshop on Information Hiding, pp. 88-100, Dresden, Germany, Oct, 1999
|
9 |
Adelsbach A, Sadeghi AR, 'Zero-Knowledge watermark detection and proof of ownership,' in International Workshop on Information Hiding (IHW'2001) Lecture Notes in Computer Science 2137, pp. 273-288, 2001
DOI
ScienceOn
|