1 |
T. Aura, 'Practical Invisibility in Digital Communication,' Proceedings of Information Hiding Workshop, LNCS Vol. 1174, pp.265-278, Springer-Verlag, 1996
DOI
ScienceOn
|
2 |
Bloom, 'Copy Protection for DVD Video,' Proceedings of IEEE, Vol.87, No.7, July, 1999
DOI
ScienceOn
|
3 |
B. Chor, A. Fiat, M. Naor, 'Tracing Traitors,' Proceedings of Crypto'94, LNCS, Vol.839, pp.257-270, Springer-Verlag, 1994
|
4 |
N. Memon, P. W. Wong, 'Protecting Digital Media Content,' CACM, Vol.41 , No.7, pp.35-43, July, 1998
DOI
|
5 |
S. Craver, N. Memon, B. Yeo, 'Resolving Rightful Ownerships with Invisible Watermarking Techniques : Limitations, Attacks and Implications,' IEEE Journal of SAC, Vol.16, No.4, pp.573-586, May, 1998
DOI
ScienceOn
|
6 |
N. F. Johnson, S. Jajodia, 'Steganalysis of Images Created Using Current Steganography Software,' Proceedings of Information Hiding Workshop, LNCS Vol.1525, pp.273-289, Springer-Verlag, 1998
DOI
|
7 |
S. Katzenbeisser, F. A. P. Petiteolas, editor. Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, 1999
|
8 |
Eugene T. Lin, E. J. Delp, 'A Review of Data Hiding in Digital Images,' Proceedings of the Image Processing, Image Ouality, Image Capture Systems Conference'99, pp.274-278, April, 1999
|
9 |
R. C. Merkle, 'One-way Hash Functions and DES,' Proceedings of Crypto'89, LNCS Vol.435, pp.428-446, Springer-Verlag, 1989
|
10 |
M. Naor, O. Reingold, 'On the Construction Pseudorandom Permutations: Luby-Rackoff Revisited,' Journal of Cryptology, Vol.12, No.1, pp.29-66, 1999
DOI
|
11 |
E. Franz, A. Ierichow, S. Moller, A. Pfitzmann, I. Stierand, 'Computer Based Steganography : How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, At Best,' Proceedings of Information Hiding Workshop, LNCS Vol.1174, pp.7-21, Springer-Verlag, 1996
DOI
ScienceOn
|
12 |
R. J. Anderson, editor. Information hiding: first international workshop, LNCS Vol.1174, Springer-Verlag, May, 1996
|
13 |
T. ElGamal 'A Public Key Cryptosystem and A Signature Scheme Based on Discrete Logarithms,' Proceedings of Crypto'84, LNCS Vol.196, pp.10-18, Springer-Verlag, 1985
|
14 |
M. Luby, C. Rackoff, 'How to Construct Pseudorandom Permutations from Pseudorandom Functions,' SIAM Journal on Computation, Vol.17, No.2, pp.373-386, 1988
DOI
ScienceOn
|