Browse > Article

안전한 컨텐츠 유통을 위한 방안 연구  

이형우 (천안대학교 정보통신학부)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Software Watermarking: Models and dynamic embedding /
[ C. Collberg;C. Thomborson ] / In Principles of programming Languages, POPL'99 San Antonio. TX
2 A Secure Robust Watermark for Multimedia Software Watermarking: Models and dynamic embedding /
[ Ingemar. J. Cox;Joe. Kilian;tom Leighton; Talal Shamoon ] / Information Hiding Lecture Notes in Computer Science   DOI
3 digital Images protection techniques in a broadcast framework: an overview /
[ J. F. Delaigel;J.M. Boucqueau;J.J. Quisquater;B. Macq ] / Univ. Catholique de Louvain
4 A Note on the Confinement Problem /
[ Lampson. W.B ] / Communications of the ACM   DOI   ScienceOn
5 Collusion-Secure Fingerprinting for Digital Data /
[ Dan Boneh;James Shaw ] / Advances in Cryptology-Crypto'95. Lecture Notes in Computer Science
6 Video-Steganography : How to secretly embed a signature in a picture /
[ K. Matsui;K. Tanaka ] / IMA Intellectual Property Project Proceedings
7 A two-dimensional digital watermark /
[ A.Z. Tirkel;R.G. Schyndel;C.F. Osborne ] / ACCV'95
8 Embedding robust labels in to images for copyright protection /
[ J. Zhao;E. Koch ] / Proceedings of Intern Congress on Intellectual Property Rights for Specialized Information. Knowledge and New Technologies
9 Tracing Traitors /
[ Chor. B;A. Fiat;M. Naor ] / in Advances in Cryptology-Crypto94, Lecture Notes in Computer Science
10 Anonymous Fingerprinting /
[ Michael Waidner ] / Advances in Cryptology-EuroCrypt'97. Lecture Notes in Computer Science   DOI
11 Proving Ownership of digital Content /
[ Andre Adelsbach;Birgit Pfitzmann;Ahmad-Reza Sadeghi ] / Information Hiding Lecture Notes in Computer Science
12 Modeling the Security of Steganographic Systems /
[ J. Zollner;H. Federrath;H. Klimant;A. Pfitzmann;R. Piotraschke;A. Westfeld;G. Wickee;G. Wolf ] / Proc of IHW'98
13 Steretching the Limits of Steganography /
[ Ross Anderson ] / Information Hiding Lecture Notes in Computer Science   DOI
14 Asymmetric Fingerprinting /
[ Birgit Pfitzmann;Matthias Schunter ] / Advances in Cryptology-EuroCrypt'96. Lecture Notes in Computer Science   DOI
15 Trials of Traced Traitors /
[ Bright Pfitzmann ] / Information Hiding Lecture Notes in Computer Science
16 A Progress Report on Subliminal-Free Channels /
[ Mike Burmester;Yvo Desmedt;Toshiya Itoh;Kouichi Sakurai;Hiroki Shizura;Moti Yung ] / Information Hiding Lecture Notes in Computer Science   DOI
17 Secure spread spectrum communication for multimedia /
[ C. Cox;J. Killian;T. Leighton;T. Shamoon ] / Technical Report, NEC. Research Institute
18 Efficient Anonymous Fingerprinting with Group Signatures /
[ Jan Camenisch ] / Advances in Cryptology-ASIACRYPT 2000, Kyoto. Japan.
19 Electronic watermark /
[ A.Z. Tirkel;G.A. Rankin;R.G. Schyndel. W.J;Ho. N.R;A. Mee; C.F. Osborne ] / Dicta-93
20 Information Hiding Therminology /
[ Bright Pfitzman ] / Information Hiding Lecture Notes in Computer Science
21 /
[ J.K.O. Ruanaidh;W.J. Dowling;F.M. Boland ] / IEEE International Conference on Image Processing, Stp
22 An Information Theoretic Approach to Steganography and Watermarking /
[ Thomas Mittelholzer ] / Proc of IHW'99
23 DCT-based watermark recovering without resorting to the uncorrupted original image /
[ A. Piva.(et al) ] / Proceedings of ICIP 97   DOI
24 Attacks on Steganographic Systems /
[ Andress Westfeld;Andress Pfitzmann ] / Information Hiding Lecture Notes in Computer Science
25 Secure spread spectrum watermarking for multimedia /
[ I. Cox(et al) ] / IEEE Trans On Image Processing   DOI   ScienceOn
26 An Efficient Public Key Traitor Tracing Scheme /
[ Dan Boneh;Matthew Franklin ] / Advances in Cryptology-Crypto'99. Lecture Notes in Computer Science   DOI
27 Error-and Collusion-Secure Fingerprinting for Digital Data /
[ Hans-Jurgen Guth;Brigit Pfitzmann ] / Information Hiding Lecture Notes in Computer Science
28 On Public-Key Steganography in the Presence of an Active Warden /
[ Scott Craver ] / Proc of IHW'98
29 An Information Hiding Lecture Notes in Computer Science /
[ C. Cachin ] / Proc of IHW'98 Steganography