1 |
Software Watermarking: Models and dynamic embedding
/
|
2 |
A Secure Robust Watermark for Multimedia Software Watermarking: Models and dynamic embedding
/
DOI |
3 |
digital Images protection techniques in a broadcast framework: an overview
/
|
4 |
A Note on the Confinement Problem
/
DOI ScienceOn |
5 |
Anonymous Fingerprinting
/
DOI |
6 |
Collusion-Secure Fingerprinting for Digital Data
/
|
7 |
Video-Steganography : How to secretly embed a signature in a picture
/
|
8 |
A two-dimensional digital watermark
/
|
9 |
Embedding robust labels in to images for copyright protection
/
|
10 |
Tracing Traitors
/
|
11 |
Modeling the Security of Steganographic Systems
/
|
12 |
Steretching the Limits of Steganography
/
DOI |
13 |
Asymmetric Fingerprinting
/
DOI |
14 |
Trials of Traced Traitors
/
|
15 |
A Progress Report on Subliminal-Free Channels
/
DOI |
16 |
Secure spread spectrum communication for multimedia
/
|
17 |
Proving Ownership of digital Content
/
|
18 |
Efficient Anonymous Fingerprinting with Group Signatures
/
|
19 |
Electronic watermark
/
|
20 |
Information Hiding Therminology
/
|
21 |
An Information Theoretic Approach to Steganography and Watermarking
/
|
22 |
DCT-based watermark recovering without resorting to the uncorrupted original image
/
DOI |
23 |
Attacks on Steganographic Systems
/
|
24 |
Secure spread spectrum watermarking for multimedia
/
DOI ScienceOn |
25 |
An Efficient Public Key Traitor Tracing Scheme
/
DOI |
26 |
Error-and Collusion-Secure Fingerprinting for Digital Data
/
|
27 |
On Public-Key Steganography in the Presence of an Active Warden
/
|
28 |
/
|
29 |
An Information Hiding Lecture Notes in Computer Science
/
|